General

  • Target

    80c36406fe9a8324d37956f431da269a69b7a484de1da5f5a9bb443511000fb3

  • Size

    351KB

  • Sample

    230414-25vy1scc63

  • MD5

    dd92fadb1366eeefbfad93998b731223

  • SHA1

    4b14337001a0f7a861d93654c1b185932ba575aa

  • SHA256

    80c36406fe9a8324d37956f431da269a69b7a484de1da5f5a9bb443511000fb3

  • SHA512

    fcfa44082098f3dfdeb2ea0a54653d50f632f89e792a0edef58d2737dd17bb2bb2b4714bd03324421524c337d896dbf408cd0eeef7783ea9376705572d7be0c9

  • SSDEEP

    6144:stN90xWixziSqsI3MuVXZcknsD04oxSQU/dXxi:stsxVQSqscMuM0vD3

Malware Config

Extracted

Family

smokeloader

Botnet

pub4

Extracted

Family

smokeloader

Version

2022

C2

http://aapu.at/tmp/

http://poudineh.com/tmp/

http://firsttrusteedrx.ru/tmp/

http://kingpirate.ru/tmp/

rc4.i32
rc4.i32

Extracted

Family

rhadamanthys

C2

http://179.43.142.201/img/favicon.png

Targets

    • Target

      80c36406fe9a8324d37956f431da269a69b7a484de1da5f5a9bb443511000fb3

    • Size

      351KB

    • MD5

      dd92fadb1366eeefbfad93998b731223

    • SHA1

      4b14337001a0f7a861d93654c1b185932ba575aa

    • SHA256

      80c36406fe9a8324d37956f431da269a69b7a484de1da5f5a9bb443511000fb3

    • SHA512

      fcfa44082098f3dfdeb2ea0a54653d50f632f89e792a0edef58d2737dd17bb2bb2b4714bd03324421524c337d896dbf408cd0eeef7783ea9376705572d7be0c9

    • SSDEEP

      6144:stN90xWixziSqsI3MuVXZcknsD04oxSQU/dXxi:stsxVQSqscMuM0vD3

    • Detect rhadamanthys stealer shellcode

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks