General

  • Target

    5f13e2514b1e67f56efde32fc9a63ca689cce8d36cc6322e112339d79f835448

  • Size

    514KB

  • Sample

    230719-pcvfkaeh2y

  • MD5

    1f225f9a8c88e1b7a7ea43317f6f2cbd

  • SHA1

    bb73f54513fd500af859ec571364b2f98d7a040d

  • SHA256

    5f13e2514b1e67f56efde32fc9a63ca689cce8d36cc6322e112339d79f835448

  • SHA512

    686144e4727349617077f15b2e00f5ae984d8ef7df788177dc284aa7c8c8e13f661a2cabe08e5a6b5f51cc663a9aeb529396b7334854c06f5dbd7f769999a32a

  • SSDEEP

    6144:KSy+bnr+Tp0yN90QEEN8USzC4CWWusZh2nov+fpAzPEZtcQ0a1Bv43ZFhk9da4PY:2Mrfy90S8lz6ZbZsJXWDa1943ZQab

Malware Config

Extracted

Family

amadey

Version

3.85

C2

77.91.68.3/home/love/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

nasa

C2

77.91.68.68:19071

Attributes
  • auth_value

    6da71218d8a9738ea3a9a78b5677589b

Targets

    • Target

      5f13e2514b1e67f56efde32fc9a63ca689cce8d36cc6322e112339d79f835448

    • Size

      514KB

    • MD5

      1f225f9a8c88e1b7a7ea43317f6f2cbd

    • SHA1

      bb73f54513fd500af859ec571364b2f98d7a040d

    • SHA256

      5f13e2514b1e67f56efde32fc9a63ca689cce8d36cc6322e112339d79f835448

    • SHA512

      686144e4727349617077f15b2e00f5ae984d8ef7df788177dc284aa7c8c8e13f661a2cabe08e5a6b5f51cc663a9aeb529396b7334854c06f5dbd7f769999a32a

    • SSDEEP

      6144:KSy+bnr+Tp0yN90QEEN8USzC4CWWusZh2nov+fpAzPEZtcQ0a1Bv43ZFhk9da4PY:2Mrfy90S8lz6ZbZsJXWDa1943ZQab

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks