General

  • Target

    dfe6d20f85672985c03e9fe34b0541a362140d62b455128502fbb3ca64e26b82

  • Size

    1.1MB

  • Sample

    231008-pp53tsca3z

  • MD5

    af0c9e541951f417ac45fd73285ea547

  • SHA1

    bd7092fe5b8575d97644c0f2f82c55038e583225

  • SHA256

    dfe6d20f85672985c03e9fe34b0541a362140d62b455128502fbb3ca64e26b82

  • SHA512

    8803456d35a15ecaf9dfe1bc18677093a6d8fa822b807386ccd3780f712da2745792bc0ba17b8577437961c7be53800b3d83969d42b2fbdf9ac179302f140149

  • SSDEEP

    24576:SyrQSQU9qOkUdyg/rvdvODgeUEi7LsVB1MJzFcTeATXlU:5lQU8OkUdyg/rvdvODasVnM/cCAh

Malware Config

Extracted

Family

redline

Botnet

magia

C2

77.91.124.55:19071

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Targets

    • Target

      dfe6d20f85672985c03e9fe34b0541a362140d62b455128502fbb3ca64e26b82

    • Size

      1.1MB

    • MD5

      af0c9e541951f417ac45fd73285ea547

    • SHA1

      bd7092fe5b8575d97644c0f2f82c55038e583225

    • SHA256

      dfe6d20f85672985c03e9fe34b0541a362140d62b455128502fbb3ca64e26b82

    • SHA512

      8803456d35a15ecaf9dfe1bc18677093a6d8fa822b807386ccd3780f712da2745792bc0ba17b8577437961c7be53800b3d83969d42b2fbdf9ac179302f140149

    • SSDEEP

      24576:SyrQSQU9qOkUdyg/rvdvODgeUEi7LsVB1MJzFcTeATXlU:5lQU8OkUdyg/rvdvODasVnM/cCAh

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks