General

  • Target

    9d0ed01a625165d3d974f018400f6ffb354b1151ab6dfde032f49c0bdd5707d1

  • Size

    1.2MB

  • Sample

    231006-hb3xzsbf45

  • MD5

    ea7e83d83566d5aeceef44caf31cc59d

  • SHA1

    9b34772419446851c5336c50331790a99139d885

  • SHA256

    9d0ed01a625165d3d974f018400f6ffb354b1151ab6dfde032f49c0bdd5707d1

  • SHA512

    1286a30d55e7a81f205703b07929a480009d468c4798a4b59a5ed09b86bd1a273781c05215c92cdc381a065fb643e1be1ba4e1e9ffccdeead146e5bb7b081f20

  • SSDEEP

    24576:jIfBznnRHmCciIqCoN7FLpn7oVIX6NS2zZ5hAhd9B4wN/a+aHZyp5:UfBznnAiIqCWZNqzZghdfNi7Z45

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Targets

    • Target

      9d0ed01a625165d3d974f018400f6ffb354b1151ab6dfde032f49c0bdd5707d1

    • Size

      1.2MB

    • MD5

      ea7e83d83566d5aeceef44caf31cc59d

    • SHA1

      9b34772419446851c5336c50331790a99139d885

    • SHA256

      9d0ed01a625165d3d974f018400f6ffb354b1151ab6dfde032f49c0bdd5707d1

    • SHA512

      1286a30d55e7a81f205703b07929a480009d468c4798a4b59a5ed09b86bd1a273781c05215c92cdc381a065fb643e1be1ba4e1e9ffccdeead146e5bb7b081f20

    • SSDEEP

      24576:jIfBznnRHmCciIqCoN7FLpn7oVIX6NS2zZ5hAhd9B4wN/a+aHZyp5:UfBznnAiIqCWZNqzZghdfNi7Z45

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • UAC bypass

    • Downloads MZ/PE file

    • Stops running service(s)

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks