General

  • Target

    73423b603a3a819764da2d2892a610a1.bin

  • Size

    1.9MB

  • Sample

    230629-byh3rsbf47

  • MD5

    b517a75d3c6cddef0713564d119eb04a

  • SHA1

    3dba8440999ee47bae92d7f9550711d2ad1f1d4d

  • SHA256

    8fa9ec90f894f9ca123c9d54b149d35b578f8570ee6d196938b2e5029475dec0

  • SHA512

    db78fe308eb2e700bca860e2d6a14f0dceb177304a1440778d7b00925212fb56bcb6654e10b90c3b9d9c27428db4a6345c5f577cf22d060e38c22478bc9b9805

  • SSDEEP

    24576:3llAPFkcxgSd4q1zDlqy4MR/sD6vsHhmTtddmVQiT0PIhdrwbOgyZGwq1mlY5y2l:3YdbgSrDp/sukHhut/7iBpwUByOf2s7K

Malware Config

Extracted

Family

redline

Botnet

smoke

C2

83.97.73.131:19071

Attributes
  • auth_value

    aaa47198b84c95fcce9397339e8af9d4

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Targets

    • Target

      63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe

    • Size

      3.9MB

    • MD5

      73423b603a3a819764da2d2892a610a1

    • SHA1

      37894a72f197b0d45c66b686bb29bf059329310e

    • SHA256

      63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4

    • SHA512

      e2620d5f6cbadb5ef99cf1fd72a2761fca78c54bbaa1d8b7412a8dcb2b04368b3fb8ab34ae1fd50beecfbb32f500c6f10f09166c06a2e6c500dc43194cc62ff7

    • SSDEEP

      98304:fj/xb0tfRGDCgVG+Rf74pVwX+5DEpraStT:fdQtRGzVGeT4pVwX+5DEdaS1

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks