General

  • Target

    5b26522436f02ab63249cda95ffb462e3050087390e125f7ff09ca2eff57ce10

  • Size

    351KB

  • Sample

    230414-xgzvvacg3z

  • MD5

    f110e700a0b712ffbdf30a92d19aa729

  • SHA1

    70b770f739154c1b530bb6d39cdcf7464eb309a1

  • SHA256

    5b26522436f02ab63249cda95ffb462e3050087390e125f7ff09ca2eff57ce10

  • SHA512

    4e6ebdd5a4d99b365fb095d35cfb7bcf623a44e37f0047cfd2655c3d96bfeae5a816eb9a3f8d7fe1bfea2513473a88be928566dd6ea81dbbbf025aef810fa8e4

  • SSDEEP

    6144:4VPvgO/gf9ExCH2FISoy1gWanKx3Bhv6nhbbSPt:4VPh/g1CCH2SSoZ7n+Bhvqb

Malware Config

Extracted

Family

smokeloader

Botnet

pub4

Extracted

Family

smokeloader

Version

2022

C2

http://aapu.at/tmp/

http://poudineh.com/tmp/

http://firsttrusteedrx.ru/tmp/

http://kingpirate.ru/tmp/

rc4.i32
rc4.i32

Extracted

Family

rhadamanthys

C2

http://179.43.142.201/img/favicon.png

Targets

    • Target

      5b26522436f02ab63249cda95ffb462e3050087390e125f7ff09ca2eff57ce10

    • Size

      351KB

    • MD5

      f110e700a0b712ffbdf30a92d19aa729

    • SHA1

      70b770f739154c1b530bb6d39cdcf7464eb309a1

    • SHA256

      5b26522436f02ab63249cda95ffb462e3050087390e125f7ff09ca2eff57ce10

    • SHA512

      4e6ebdd5a4d99b365fb095d35cfb7bcf623a44e37f0047cfd2655c3d96bfeae5a816eb9a3f8d7fe1bfea2513473a88be928566dd6ea81dbbbf025aef810fa8e4

    • SSDEEP

      6144:4VPvgO/gf9ExCH2FISoy1gWanKx3Bhv6nhbbSPt:4VPh/g1CCH2SSoZ7n+Bhvqb

    • Detect rhadamanthys stealer shellcode

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks