General
-
Target
ab21328770b2e3105de50a9ee532d1a771e555eb7ca6bd8c36c3d2a4bcf15b07
-
Size
155KB
-
Sample
231011-rk73qsce8t
-
MD5
c396791f4b0e63963b9e51f88cb5a130
-
SHA1
eedf5c1752aae5dd49d231ba57d201ec019b8065
-
SHA256
744742e2b2b9a39792ff42a142cd0ff12bc0de489f807c6912a06cf29c4dd52d
-
SHA512
fea6f1a83c436a35f297d47af5849c4288e8f44b1da270dca8d2fbc80390079c8535621a4ba572922729313a0796ef3a516a4646a04483449d7fe8ab5a037134
-
SSDEEP
3072:ECzKYaCnKKGPoOAAjh0Cmikgphrob64j402zjKr3jH4F:El7CKKGkAjTmZgpUjK03jYF
Static task
static1
Behavioral task
behavioral1
Sample
ab21328770b2e3105de50a9ee532d1a771e555eb7ca6bd8c36c3d2a4bcf15b07.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ab21328770b2e3105de50a9ee532d1a771e555eb7ca6bd8c36c3d2a4bcf15b07.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
redline
pixelscloud
85.209.176.171:80
Extracted
redline
@ytlogsbot
185.216.70.238:37515
Extracted
smokeloader
up3
Extracted
redline
breha
77.91.124.55:19071
Extracted
redline
kukish
77.91.124.55:19071
Targets
-
-
Target
ab21328770b2e3105de50a9ee532d1a771e555eb7ca6bd8c36c3d2a4bcf15b07
-
Size
254KB
-
MD5
a0c2678e6378d8f1b5a418495d1f75fd
-
SHA1
d9095bf8da670e0385d9fbddf518f0a8887e0c80
-
SHA256
ab21328770b2e3105de50a9ee532d1a771e555eb7ca6bd8c36c3d2a4bcf15b07
-
SHA512
57055ebad4d5c1f14b85d85b8ef36f2948e088ad5980bb4f7fc75ab6a33d5b951beaa4ffe4c9fa9c229ab528db08d996effa8f8dc18a1cbf63730bd97ba7f62c
-
SSDEEP
3072:IHi9JhofnxjpYn2U1GA0B+t+ieyOR/VCY0rJ25o3BcJTcVVeosbVFlb9eAg0Fujz:IqD2Lr/V90d2WxjV/hAOo3KeoPGCV
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect rhadamanthys stealer shellcode
-
Detects Healer an antivirus disabler dropper
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SectopRAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
3Modify Registry
6Scripting
1Subvert Trust Controls
1Install Root Certificate
1