General

  • Target

    f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75

  • Size

    1.3MB

  • Sample

    231014-mwyk8aef34

  • MD5

    3c980fce67b5dc379aa4c3169c02a2eb

  • SHA1

    68f70d8fcd519506d6fe1695f1f39d7804ef52ff

  • SHA256

    f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75

  • SHA512

    466a94b952d0100081af2ddf332465224240a85874d763f8253be57c4fcfcf6d0f805b689d7cd5a9d5a1224c5b0362e35838fc1569531bbed4f7ef57eee01b9d

  • SSDEEP

    24576:siuBtZbTvdsmgJBMvsj8uJxvZSPJmGH+8bk+WUXJpQ2tSrqUheqbgr:7uBfvAz8k8uJnUbH3bk+NXJ22tShekgr

Malware Config

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

http://77.91.124.1/theme/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Targets

    • Target

      f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75

    • Size

      1.3MB

    • MD5

      3c980fce67b5dc379aa4c3169c02a2eb

    • SHA1

      68f70d8fcd519506d6fe1695f1f39d7804ef52ff

    • SHA256

      f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75

    • SHA512

      466a94b952d0100081af2ddf332465224240a85874d763f8253be57c4fcfcf6d0f805b689d7cd5a9d5a1224c5b0362e35838fc1569531bbed4f7ef57eee01b9d

    • SSDEEP

      24576:siuBtZbTvdsmgJBMvsj8uJxvZSPJmGH+8bk+WUXJpQ2tSrqUheqbgr:7uBfvAz8k8uJnUbH3bk+NXJ22tShekgr

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks