General

  • Target

    3481e519a886d3970e852d0513034efd0c9d71481b70533ca3c6b92ec83c1d50

  • Size

    13.3MB

  • Sample

    231009-1wwnhsgf6z

  • MD5

    5b93c5a39aa96f661dc53b4eda00e3fb

  • SHA1

    ccc61ea8e58ed309c96ae19a3cdda3973168e128

  • SHA256

    3481e519a886d3970e852d0513034efd0c9d71481b70533ca3c6b92ec83c1d50

  • SHA512

    bb3b30bf62be5c3ab8c8fa041c503a888c47b33c7db11443459c85f6f6ac70eb3d3cff1faccc18b092fdcde5b44b937dfa08e9aaf7de57c3da31c4fc57437523

  • SSDEEP

    196608:YJ53FaC5MGewrlcf7qE4C11FO4Pt651rdH1cfdSp3+JHmeNFSutuomP+3B:YJ5wWDewrGefCAKw5efdM3+EepupP8

Malware Config

Extracted

Family

stealc

C2

http://5.42.65.39

Attributes
  • url_path

    /bed95ea4798a5204.php

rc4.plain

Extracted

Family

smokeloader

Botnet

up3

Targets

    • Target

      3481e519a886d3970e852d0513034efd0c9d71481b70533ca3c6b92ec83c1d50

    • Size

      13.3MB

    • MD5

      5b93c5a39aa96f661dc53b4eda00e3fb

    • SHA1

      ccc61ea8e58ed309c96ae19a3cdda3973168e128

    • SHA256

      3481e519a886d3970e852d0513034efd0c9d71481b70533ca3c6b92ec83c1d50

    • SHA512

      bb3b30bf62be5c3ab8c8fa041c503a888c47b33c7db11443459c85f6f6ac70eb3d3cff1faccc18b092fdcde5b44b937dfa08e9aaf7de57c3da31c4fc57437523

    • SSDEEP

      196608:YJ53FaC5MGewrlcf7qE4C11FO4Pt651rdH1cfdSp3+JHmeNFSutuomP+3B:YJ5wWDewrGefCAKw5efdM3+EepupP8

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Stealc

      Stealc is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks