General

  • Target

    0dedb7c4d5933503c02632086983d1c12c0b60347fbd204aac965a4e110693eb

  • Size

    965KB

  • Sample

    231011-v8yqraeb23

  • MD5

    77f6f283ace9e70f475830b7a72c64bf

  • SHA1

    65680f476c3a9534f398e91f7a65cfc54420fae4

  • SHA256

    0dedb7c4d5933503c02632086983d1c12c0b60347fbd204aac965a4e110693eb

  • SHA512

    c81cc02b47959d13182f658d0c0871d369ec104c4a6a01ceefb1cda110913d8616a3b3210a62b54331a72fd67094adf2c9ad9b71fa65db2294169693a14b0b19

  • SSDEEP

    12288:wiGGWAVpsx7UgJCSkZZ7gFsRfIByCZeEAQ+ni5SZYzu99D2TUPRVxRnI:Y2psxIgJCSkjwQCyCse+ncpu1nI

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
1
0x4b3b02b6
rc4.i32
1
0x6ea683ed

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain
1
006700e5a2ab05704bbb0c589b88924d

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Extracted

Family

redline

Botnet

pixelscloud

C2

85.209.176.171:80

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Targets

    • Target

      0dedb7c4d5933503c02632086983d1c12c0b60347fbd204aac965a4e110693eb

    • Size

      965KB

    • MD5

      77f6f283ace9e70f475830b7a72c64bf

    • SHA1

      65680f476c3a9534f398e91f7a65cfc54420fae4

    • SHA256

      0dedb7c4d5933503c02632086983d1c12c0b60347fbd204aac965a4e110693eb

    • SHA512

      c81cc02b47959d13182f658d0c0871d369ec104c4a6a01ceefb1cda110913d8616a3b3210a62b54331a72fd67094adf2c9ad9b71fa65db2294169693a14b0b19

    • SSDEEP

      12288:wiGGWAVpsx7UgJCSkZZ7gFsRfIByCZeEAQ+ni5SZYzu99D2TUPRVxRnI:Y2psxIgJCSkjwQCyCse+ncpu1nI

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detected google phishing page

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.