General

  • Target

    file

  • Size

    426KB

  • Sample

    231010-zcvfnsbf43

  • MD5

    325ab212c5d7eedf0706fc1d3667e1b1

  • SHA1

    767fe89bf7c14a395b88e8f5df908517859d4c40

  • SHA256

    f1fe205719d6a3d54daf0ce295917867a243cbaf4b52a25d605a9991249869c9

  • SHA512

    6d2f4b58e2f119cedf6b6f6905de6251990d51359b7f90d0cfa74ea236892d8bbb1112e52109d6c5e073b666dbbcd4762089a68994e2e2be3e14f0513c4269d3

  • SSDEEP

    6144:KZy+bnr+bp0yN90QEj4fWKdSuLafw2U52GFEt3s4zYtOpAgwwd0aORIZyp8Er7:rMrby90J3OSuL35+2GYtOpAgwwduaq

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Extracted

Family

redline

Botnet

pixelscloud

C2

85.209.176.171:80

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

magia

C2

77.91.124.55:19071

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Targets

MITRE ATT&CK Enterprise v15

Tasks