General

  • Target

    NEAS.5cfd37f9531d619fab105eb49fb1cd3c9b38adbaab1cd6f7c546b5189f5a4b08exe_JC.exe

  • Size

    378KB

  • Sample

    231006-reg95aee62

  • MD5

    5124c07a0005a2ccaff0c64785c38e19

  • SHA1

    5db66b13d17a5807ecb1b64557642e0c038803e6

  • SHA256

    5cfd37f9531d619fab105eb49fb1cd3c9b38adbaab1cd6f7c546b5189f5a4b08

  • SHA512

    0fe2570a6426ff1626c1808f1f57ce54ec23e36de41f49def8160b0a486d31b9028d7dc64034fb13200187a97d17e38d06d582c547be83d416a8f6714fb340e2

  • SSDEEP

    6144:4UNjlV2Iz/n26fV0CHy79V/R1VCgeD3m6LILUyj9MNrlmMJy64H4fqu:4UYIThfV0k09V/jeyGmjeNrlmM8lu

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Targets

    • Target

      NEAS.5cfd37f9531d619fab105eb49fb1cd3c9b38adbaab1cd6f7c546b5189f5a4b08exe_JC.exe

    • Size

      378KB

    • MD5

      5124c07a0005a2ccaff0c64785c38e19

    • SHA1

      5db66b13d17a5807ecb1b64557642e0c038803e6

    • SHA256

      5cfd37f9531d619fab105eb49fb1cd3c9b38adbaab1cd6f7c546b5189f5a4b08

    • SHA512

      0fe2570a6426ff1626c1808f1f57ce54ec23e36de41f49def8160b0a486d31b9028d7dc64034fb13200187a97d17e38d06d582c547be83d416a8f6714fb340e2

    • SSDEEP

      6144:4UNjlV2Iz/n26fV0CHy79V/R1VCgeD3m6LILUyj9MNrlmMJy64H4fqu:4UYIThfV0k09V/jeyGmjeNrlmM8lu

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • UAC bypass

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Modifies boot configuration data using bcdedit

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks