General
-
Target
6531b801cc6cbf4139616803f9d43e9b886eed6c9ca82b86bb9c461c50f673a0
-
Size
4.9MB
-
Sample
230825-fz1reshd24
-
MD5
3d7e315d68b9e21a5515158144d4c589
-
SHA1
82d8748e2f02b74f73e10177030108d9ab0217f7
-
SHA256
6531b801cc6cbf4139616803f9d43e9b886eed6c9ca82b86bb9c461c50f673a0
-
SHA512
6df2de3afea84fe5c2f12f6d95bfb57ac5120a0c62b419449c7171023f31bd140776f104aa16d3ea6c26c23fdb2c5f37a863faa7caa214836ad3d5355ffbd7d5
-
SSDEEP
98304:ZGhiQrGkLDRgEi8qouBe2MBX25lWu2SkP4datub79STff8O:gikVgyXUlW6kPWatu/gff
Static task
static1
Malware Config
Extracted
amadey
3.83
45.9.74.80/0bjdn2Z/index.php
Extracted
smokeloader
pub5
Extracted
smokeloader
up3
Extracted
smokeloader
2022
http://taibi.at/tmp/
http://01stroy.ru/tmp/
http://mal-net.com/tmp/
http://gromograd.ru/tmp/
http://kingpirate.ru/tmp/
Targets
-
-
Target
6531b801cc6cbf4139616803f9d43e9b886eed6c9ca82b86bb9c461c50f673a0
-
Size
4.9MB
-
MD5
3d7e315d68b9e21a5515158144d4c589
-
SHA1
82d8748e2f02b74f73e10177030108d9ab0217f7
-
SHA256
6531b801cc6cbf4139616803f9d43e9b886eed6c9ca82b86bb9c461c50f673a0
-
SHA512
6df2de3afea84fe5c2f12f6d95bfb57ac5120a0c62b419449c7171023f31bd140776f104aa16d3ea6c26c23fdb2c5f37a863faa7caa214836ad3d5355ffbd7d5
-
SSDEEP
98304:ZGhiQrGkLDRgEi8qouBe2MBX25lWu2SkP4datub79STff8O:gikVgyXUlW6kPWatu/gff
-
Glupteba payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Stops running service(s)
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1