General

  • Target

    76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c

  • Size

    5.2MB

  • Sample

    230824-d25r2shg27

  • MD5

    9c855d5d046d35dfc97390d152d232df

  • SHA1

    b49d95ca1a0effb8712b9da18fd2d1b899c4a8e1

  • SHA256

    76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c

  • SHA512

    37a3ed53216acb5db135ab58ff70bfe7b77250eb7b2d9600de85a41ffdb5a97739f2f0ea4beb48829969a46842846a1fa1afc8ff8f2aff5e10fdd98897f1a705

  • SSDEEP

    98304:KzKfNdcaXAmMCF5Cj7BspbyTBZWI2Oe85ppe9lYIM//cmCGd:ik/lMCFa9spm2crpeQI/m

Malware Config

Extracted

Family

amadey

Version

3.83

C2

5.42.65.80/8bmeVwqx/index.php

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c

    • Size

      5.2MB

    • MD5

      9c855d5d046d35dfc97390d152d232df

    • SHA1

      b49d95ca1a0effb8712b9da18fd2d1b899c4a8e1

    • SHA256

      76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c

    • SHA512

      37a3ed53216acb5db135ab58ff70bfe7b77250eb7b2d9600de85a41ffdb5a97739f2f0ea4beb48829969a46842846a1fa1afc8ff8f2aff5e10fdd98897f1a705

    • SSDEEP

      98304:KzKfNdcaXAmMCF5Cj7BspbyTBZWI2Oe85ppe9lYIM//cmCGd:ik/lMCFa9spm2crpeQI/m

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Stops running service(s)

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks