Resubmissions

29-09-2023 04:37

230929-e8xkpafg8t 10

28-09-2023 21:03

230928-zv99vafh23 10

General

  • Target

    03765cd4acad61f85cb2237a6f6f9b8dd98774aa492c8439a2343d14b5c7d01e

  • Size

    6MB

  • Sample

    230928-zv99vafh23

  • MD5

    693ddcc7a32e6309f3fed8faf71d058c

  • SHA1

    5e2b63d183edfd56d7aa8b81dff4bfd093e3760a

  • SHA256

    03765cd4acad61f85cb2237a6f6f9b8dd98774aa492c8439a2343d14b5c7d01e

  • SHA512

    23364792a17118952a82ef73c672237bda2523b2bd35617aaebb502d592174039660eb885aa59c2a40b5e3c0b315bd7731597719b78d821817c3993fb0d69c40

  • SSDEEP

    196608:DWeBipf+AgWSmIql5oigGrCWrcUO0NAoGqv8N1uFMx5fBO:XBip0puoivdD5NAoGqv8N1Lx5f

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Targets

    • Target

      03765cd4acad61f85cb2237a6f6f9b8dd98774aa492c8439a2343d14b5c7d01e

    • Size

      6MB

    • MD5

      693ddcc7a32e6309f3fed8faf71d058c

    • SHA1

      5e2b63d183edfd56d7aa8b81dff4bfd093e3760a

    • SHA256

      03765cd4acad61f85cb2237a6f6f9b8dd98774aa492c8439a2343d14b5c7d01e

    • SHA512

      23364792a17118952a82ef73c672237bda2523b2bd35617aaebb502d592174039660eb885aa59c2a40b5e3c0b315bd7731597719b78d821817c3993fb0d69c40

    • SSDEEP

      196608:DWeBipf+AgWSmIql5oigGrCWrcUO0NAoGqv8N1uFMx5fBO:XBip0puoivdD5NAoGqv8N1Lx5f

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Scheduled Task/Job

1
T1053

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks