General

  • Target

    816914f2d8ba0f6bac41a9e9e275b88930edeea9b7981b7c1748d6441f202402

  • Size

    164KB

  • Sample

    230715-jfkgwahb98

  • MD5

    9817df86680063737f60dc0031f479a6

  • SHA1

    fd7142007513d566f5c198741857e9563396e65b

  • SHA256

    816914f2d8ba0f6bac41a9e9e275b88930edeea9b7981b7c1748d6441f202402

  • SHA512

    0ebf0369114702f666aedbc69cb243c43df72e50b75f3990268e0d55b2b548f4ade014fb73b940a88eae430e4de82e490f3c7412dadb8c4965d371335ac7f4b8

  • SSDEEP

    1536:O0RWWxh0n1DOLNFA8lTMn1dixihQm6+HHDAnQHcql9ZrK4HSAq+b+et7Q04u0DM5:OALdTM1i+YQvl9tK0SPe2LvDM5AX

Malware Config

Extracted

Family

smokeloader

Botnet

summ

Extracted

Family

smokeloader

Version

2022

C2

http://stalagmijesarl.com/

http://ukdantist-sarl.com/

http://cpcorprotationltd.com/

rc4.i32
rc4.i32

Extracted

Family

lumma

C2

gstatic-node.io

Targets

    • Target

      816914f2d8ba0f6bac41a9e9e275b88930edeea9b7981b7c1748d6441f202402

    • Size

      164KB

    • MD5

      9817df86680063737f60dc0031f479a6

    • SHA1

      fd7142007513d566f5c198741857e9563396e65b

    • SHA256

      816914f2d8ba0f6bac41a9e9e275b88930edeea9b7981b7c1748d6441f202402

    • SHA512

      0ebf0369114702f666aedbc69cb243c43df72e50b75f3990268e0d55b2b548f4ade014fb73b940a88eae430e4de82e490f3c7412dadb8c4965d371335ac7f4b8

    • SSDEEP

      1536:O0RWWxh0n1DOLNFA8lTMn1dixihQm6+HHDAnQHcql9ZrK4HSAq+b+et7Q04u0DM5:OALdTM1i+YQvl9tK0SPe2LvDM5AX

    • Detect rhadamanthys stealer shellcode

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks