General

  • Target

    2dfa5d838324f9bd9a86bdccd1a855ea.bin

  • Size

    144KB

  • Sample

    231011-t97jlscc92

  • MD5

    b0564dc7ae7409926a5a2237e5dc99b2

  • SHA1

    0fe0bdf62b645ffbc6bf710341f2444587209698

  • SHA256

    4c3f3bd9dae44e1bc2fd15bc3c5ce97839639f430b529a97d2b12453d0227358

  • SHA512

    beb579f9e65b275d30bc004e1f71e5ac4aa224477c9ff1a9366c71bfefd63256656bea80d13aff31d5399afd8d27743b9f68c5578e973484afbb953160d56c00

  • SSDEEP

    3072:3PxJfXgPx4YQwcMG59JoCWA91b/sokI4D0cVtkpRnrzkQ:355XmncMQ93SLD0SGTnr9

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain

Extracted

Family

redline

Botnet

pixelscloud

C2

85.209.176.171:80

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Targets

    • Target

      78210fa6dc7c7e8d9ad31767e978bb97ef5e7099228762043c2ed6e0f742d033.exe

    • Size

      239KB

    • MD5

      2dfa5d838324f9bd9a86bdccd1a855ea

    • SHA1

      0b2ed9b85bcea4b4dc629b8a71706f4ef8b48918

    • SHA256

      78210fa6dc7c7e8d9ad31767e978bb97ef5e7099228762043c2ed6e0f742d033

    • SHA512

      61760287b98a061307ebf6b3a55e3e9d849c4a44064d889c98fbb43bb8682df9e8c86dfaf3ad5637d5431ce2755cdc6f14d0cedef933d9f6f52a3e08a4b650b6

    • SSDEEP

      6144:9Q46fuYXChoQTjlFgLuCY1dRuAOneE8Kdw8y0:9hYzXChdTbv1buDdw8y

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detects Healer an antivirus disabler dropper

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks