General

  • Target

    8e2250e4bfca311f733166f8efc5aa7ae8af382f6ec4b00bb7fa7c782c4ac50c

  • Size

    1.2MB

  • Sample

    231013-n4tsnshb8y

  • MD5

    75469f0fb2ec18baf4f6d7bf9bd9c77b

  • SHA1

    ab30531e3c35bb70e2ae846bf919c2ecb83120f6

  • SHA256

    0066c0880ff8b9f2e79d8546011cfb21ce24c1bb57d6af5fa2e14a6075d4eca5

  • SHA512

    3de33cc7e29a9785b9d52e5aefca663be32b3938f959fceb4acecf9101e50e47893883676c41e6e5c3a42b8c24223eb9912cdbc30b7617043e803500b2c113d3

  • SSDEEP

    24576:U+yJYyYDQa+VW4IEiPx7lZUIBtKV1JwMUiiKLzH3kv+AgfyPKknEeT3YGYdPuRj:K+zOVWzRx7lZPBtkaSL4v+AgfA53IdP0

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Extracted

Family

redline

Botnet

pixelscloud

C2

85.209.176.171:80

Targets

    • Target

      8e2250e4bfca311f733166f8efc5aa7ae8af382f6ec4b00bb7fa7c782c4ac50c

    • Size

      1.3MB

    • MD5

      f51f4b013f50935de63004231ff215ac

    • SHA1

      acb35c3c9d52804a46b817413675fcb97eb8347b

    • SHA256

      8e2250e4bfca311f733166f8efc5aa7ae8af382f6ec4b00bb7fa7c782c4ac50c

    • SHA512

      733c16238e9e0861c5d5944cf66d108d1f2c4b032b33e1f20c3ef2a3f3b2cc1939de83af075781c869c6fcd1a0f21b9d821e56b0db3ecf05617e557b8f8790b1

    • SSDEEP

      24576:0yR/69Eq+VC4sE0xTRlZUIBH451nwCgiiKJznv6Ag7F2UnEeFDYTl4RW:Ds6VCRPTRlZPBHosSJDv6AgfcTl4

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detected google phishing page

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks