General

  • Target

    SecuriteInfo.com.Variant.Zusy.457078.5822.1990.exe

  • Size

    350KB

  • Sample

    230415-dzrgmsed51

  • MD5

    448f489ab8ce71cb24c4ed44e2a151cf

  • SHA1

    44ce7712652ddc9e21d2c9965ee4e6a53a05b1ce

  • SHA256

    306839eeb37080b5d6e7d32ab0b261995877e9d143e91d1d1e06cdf636bcea28

  • SHA512

    f93f88bcb35cb729224f810a1443415336971a9fa0f705500d44301ff4cdbba03bfdfc10732f5caf09fb97eb82ba6717c975ab7b4b28a125f0b5a0e40739f524

  • SSDEEP

    6144:hL8RcVR3Bk+HT7H8wOcZHnoUvQGU9Dxi:hLzVFu+z7H3OcxnTU9Y

Malware Config

Extracted

Family

smokeloader

Botnet

pub4

Extracted

Family

smokeloader

Version

2022

C2

http://aapu.at/tmp/

http://poudineh.com/tmp/

http://firsttrusteedrx.ru/tmp/

http://kingpirate.ru/tmp/

rc4.i32
rc4.i32

Extracted

Family

rhadamanthys

C2

http://179.43.142.201/img/favicon.png

Targets

    • Target

      SecuriteInfo.com.Variant.Zusy.457078.5822.1990.exe

    • Size

      350KB

    • MD5

      448f489ab8ce71cb24c4ed44e2a151cf

    • SHA1

      44ce7712652ddc9e21d2c9965ee4e6a53a05b1ce

    • SHA256

      306839eeb37080b5d6e7d32ab0b261995877e9d143e91d1d1e06cdf636bcea28

    • SHA512

      f93f88bcb35cb729224f810a1443415336971a9fa0f705500d44301ff4cdbba03bfdfc10732f5caf09fb97eb82ba6717c975ab7b4b28a125f0b5a0e40739f524

    • SSDEEP

      6144:hL8RcVR3Bk+HT7H8wOcZHnoUvQGU9Dxi:hLzVFu+z7H3OcxnTU9Y

    • Detect rhadamanthys stealer shellcode

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks