General

  • Target

    25b0f934a3df024b1a982afbd082cbe8683da911c7660c0d68094e2078b1430e

  • Size

    347KB

  • Sample

    230416-jhnbjshd77

  • MD5

    c441b42d9f7a3382f0f9407c8815b4e5

  • SHA1

    362f403e55a0fd98a88332a185ce90de5e8986c3

  • SHA256

    25b0f934a3df024b1a982afbd082cbe8683da911c7660c0d68094e2078b1430e

  • SHA512

    fdea6438373c817cba5e35655aedb5922cee34223da9b698d13a6dab9f9694f5868236f6eddca5570e480111d3fb1f64f046764ce7b5d75af867fb27d5f6d337

  • SSDEEP

    3072:I6rLNSpQbbhQ0WVG04st+1YdYacOqaL4uLWlc4EzVHw5T0G5y5aXr81MetljUeXe:3rvBFQGDst+M1TY5EzkTh8ntllVe

Malware Config

Extracted

Family

smokeloader

Botnet

pub4

Extracted

Family

smokeloader

Version

2022

C2

http://aapu.at/tmp/

http://poudineh.com/tmp/

http://firsttrusteedrx.ru/tmp/

http://kingpirate.ru/tmp/

rc4.i32
rc4.i32

Extracted

Family

rhadamanthys

C2

http://179.43.142.201/img/favicon.png

Targets

    • Target

      25b0f934a3df024b1a982afbd082cbe8683da911c7660c0d68094e2078b1430e

    • Size

      347KB

    • MD5

      c441b42d9f7a3382f0f9407c8815b4e5

    • SHA1

      362f403e55a0fd98a88332a185ce90de5e8986c3

    • SHA256

      25b0f934a3df024b1a982afbd082cbe8683da911c7660c0d68094e2078b1430e

    • SHA512

      fdea6438373c817cba5e35655aedb5922cee34223da9b698d13a6dab9f9694f5868236f6eddca5570e480111d3fb1f64f046764ce7b5d75af867fb27d5f6d337

    • SSDEEP

      3072:I6rLNSpQbbhQ0WVG04st+1YdYacOqaL4uLWlc4EzVHw5T0G5y5aXr81MetljUeXe:3rvBFQGDst+M1TY5EzkTh8ntllVe

    • Detect rhadamanthys stealer shellcode

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Deletes itself

    • Executes dropped EXE

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks