Resubmissions

05-04-2023 07:25

230405-h87mfaed2x 10

04-04-2023 22:20

230404-183btscc4v 10

General

  • Target

    cfgtbvh.exe

  • Size

    237KB

  • Sample

    230405-h87mfaed2x

  • MD5

    51b3cddd75069bda9deb36fd539442e2

  • SHA1

    a5183c20f329a3ea3726ce2c8300b0f2654ab531

  • SHA256

    f0098ef0f31aa50b097bfb3ac7e420c518a697394a0ffed54640a55045263fa9

  • SHA512

    50e78682a53f0ef631e7faaf2892057b35e5895afee8d8520f2a3a49f99e239912bef67e8ebe70b099528b5a1753a06aad0675bc3dec64b9a2e7b605ced2d06c

  • SSDEEP

    6144:DL3v+mWnRzxvqRYwqgft1rSVsMAdaV/BaW:D7v+myRtqRYRgX20di/F

Malware Config

Extracted

Family

smokeloader

Botnet

pub4

Extracted

Family

smokeloader

Version

2022

C2

http://aapu.at/tmp/

http://poudineh.com/tmp/

http://firsttrusteedrx.ru/tmp/

http://kingpirate.ru/tmp/

rc4.i32
rc4.i32

Extracted

Family

bumblebee

Botnet

inst

C2

194.15.216.247:443

23.106.215.141:443

104.168.244.96:443

51.83.255.85:443

192.119.81.86:443

rc4.plain

Targets

    • Target

      cfgtbvh.exe

    • Size

      237KB

    • MD5

      51b3cddd75069bda9deb36fd539442e2

    • SHA1

      a5183c20f329a3ea3726ce2c8300b0f2654ab531

    • SHA256

      f0098ef0f31aa50b097bfb3ac7e420c518a697394a0ffed54640a55045263fa9

    • SHA512

      50e78682a53f0ef631e7faaf2892057b35e5895afee8d8520f2a3a49f99e239912bef67e8ebe70b099528b5a1753a06aad0675bc3dec64b9a2e7b605ced2d06c

    • SSDEEP

      6144:DL3v+mWnRzxvqRYwqgft1rSVsMAdaV/BaW:D7v+myRtqRYRgX20di/F

    • BumbleBee

      BumbleBee is a webshell malware written in C++.

    • Detect rhadamanthys stealer shellcode

    • Detects win.bumblebee.

      Detects BumbleBee Payload.

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Accesses Microsoft Outlook profiles

    • Suspicious use of NtCreateThreadExHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks