General

  • Target

    f77fcb060bb5c5ec234c9147279f5f9f258f2b70d6ade092435f1de3b844391e

  • Size

    515KB

  • Sample

    230719-jqkkmagf22

  • MD5

    da3db809b7d76b4584d143cd61dcb8fc

  • SHA1

    6a676f9673d080f6aaf5b3af0d7be5edc9f76457

  • SHA256

    f77fcb060bb5c5ec234c9147279f5f9f258f2b70d6ade092435f1de3b844391e

  • SHA512

    57d8b1ac1a0c7e46a9c8aae7cbe124869c65228c0e3c8eec8676713db852f986be8d52a4d2788c53d2cd6f2227c5b2e3509c9d06916986d65e4198b0e076d310

  • SSDEEP

    6144:Kyy+bnr+3p0yN90QEb/wFpNXkTyaH13utCL1Bh5BxKl5zIjBMxKxxQ4c3l59Y/fi:uMrLy90RwrQxH13EUfBMxwcCjK+wD

Malware Config

Extracted

Family

amadey

Version

3.85

C2

77.91.68.3/home/love/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

roma

C2

77.91.68.56:19071

Attributes
  • auth_value

    f099c2cf92834dbc554a94e1456cf576

Targets

    • Target

      f77fcb060bb5c5ec234c9147279f5f9f258f2b70d6ade092435f1de3b844391e

    • Size

      515KB

    • MD5

      da3db809b7d76b4584d143cd61dcb8fc

    • SHA1

      6a676f9673d080f6aaf5b3af0d7be5edc9f76457

    • SHA256

      f77fcb060bb5c5ec234c9147279f5f9f258f2b70d6ade092435f1de3b844391e

    • SHA512

      57d8b1ac1a0c7e46a9c8aae7cbe124869c65228c0e3c8eec8676713db852f986be8d52a4d2788c53d2cd6f2227c5b2e3509c9d06916986d65e4198b0e076d310

    • SSDEEP

      6144:Kyy+bnr+3p0yN90QEb/wFpNXkTyaH13utCL1Bh5BxKl5zIjBMxKxxQ4c3l59Y/fi:uMrLy90RwrQxH13EUfBMxwcCjK+wD

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks