General

  • Target

    NEAS.2ec38e243300bfc0bdfad247b8ace213cbd2ecf262d35f4998c7aeda53b706fa_JC.exe

  • Size

    1.7MB

  • Sample

    231007-nfmpfsbc6v

  • MD5

    80aee637ac4f1b05d23937e24795184a

  • SHA1

    9964f904fb318aab17865cb18dcbd49f9716632a

  • SHA256

    2ec38e243300bfc0bdfad247b8ace213cbd2ecf262d35f4998c7aeda53b706fa

  • SHA512

    58b0543ed3dd47565f9b3cf7b602428af8b4d8dbdc7035a08a92039812a46e604b6ae300783f80027faf8fc00b6ceb3566fe385dd6baed6fa3717edcd1c102b6

  • SSDEEP

    24576:AO9MlG1SB8U8uxrL7M+DzimIFH22zjQb2OWOLG4Yj1JtGinKje0LtQRhmlFS+aU9:ACr188U8GrnfIFv4f4DhnqQSroNmPuhk

Malware Config

Extracted

Family

amadey

Version

3.89

C2

http://193.42.32.29/9bDc8sQ/index.php

Attributes
  • install_dir

    1ff8bec27e

  • install_file

    nhdues.exe

  • strings_key

    2efe1b48925e9abf268903d42284c46b

rc4.plain

Extracted

Family

smokeloader

Version

2022

C2

https://utah-saints.com/search.php

https://atlanta-newspaper.com/search.php

rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

0024

Targets

    • Target

      NEAS.2ec38e243300bfc0bdfad247b8ace213cbd2ecf262d35f4998c7aeda53b706fa_JC.exe

    • Size

      1.7MB

    • MD5

      80aee637ac4f1b05d23937e24795184a

    • SHA1

      9964f904fb318aab17865cb18dcbd49f9716632a

    • SHA256

      2ec38e243300bfc0bdfad247b8ace213cbd2ecf262d35f4998c7aeda53b706fa

    • SHA512

      58b0543ed3dd47565f9b3cf7b602428af8b4d8dbdc7035a08a92039812a46e604b6ae300783f80027faf8fc00b6ceb3566fe385dd6baed6fa3717edcd1c102b6

    • SSDEEP

      24576:AO9MlG1SB8U8uxrL7M+DzimIFH22zjQb2OWOLG4Yj1JtGinKje0LtQRhmlFS+aU9:ACr188U8GrnfIFv4f4DhnqQSroNmPuhk

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • UAC bypass

    • Downloads MZ/PE file

    • Stops running service(s)

    • Drops startup file

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks