General

  • Target

    NEAS.fe4f8b33ff60d985d2f5d380316ea4ce24694023bb908a2dca98a35a7ca6cdf6exe_JC.exe

  • Size

    1.3MB

  • Sample

    231014-p5krtsec7v

  • MD5

    69445da1d6ebf1dba7baefe1faa8ffcf

  • SHA1

    eb3fef3975837a4e710f80a7507ce32917d9bc9a

  • SHA256

    fe4f8b33ff60d985d2f5d380316ea4ce24694023bb908a2dca98a35a7ca6cdf6

  • SHA512

    e6d5bf6ba621d59923796f09bf9be5e0dbb1a196666ba3847d13b31f401ca6cb8cbf07ad09fa60eb4261f1ac7956a074157e1fbe2dccafa66828e6733673604e

  • SSDEEP

    24576:MyNctQBOSXo4XhUbBt2vO0Pvcyrv0DekWTtDfqm4ZPMSak:7cQB84XheBtSJP0yrsaz9q

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
1
0x4b3b02b6
rc4.i32
1
0x6ea683ed

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain
1
006700e5a2ab05704bbb0c589b88924d

Extracted

Family

amadey

Version

3.83

C2

http://5.42.65.80/8bmeVwqx/index.php

Attributes
  • install_dir

    207aa4515d

  • install_file

    oneetx.exe

  • strings_key

    3e634dd0840c68ae2ced83c2be7bf0d4

rc4.plain
1
07c6bc37dc50874878dcb010336ed906

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Extracted

Family

xworm

Version

5.0

C2

157.254.223.19:8000

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot6440201303:AAFWK8ktoaf4BhwoOKOZW85fYC_jmgFy5fw/sendMessage?chat_id=1734472346

Targets

    • Target

      NEAS.fe4f8b33ff60d985d2f5d380316ea4ce24694023bb908a2dca98a35a7ca6cdf6exe_JC.exe

    • Size

      1.3MB

    • MD5

      69445da1d6ebf1dba7baefe1faa8ffcf

    • SHA1

      eb3fef3975837a4e710f80a7507ce32917d9bc9a

    • SHA256

      fe4f8b33ff60d985d2f5d380316ea4ce24694023bb908a2dca98a35a7ca6cdf6

    • SHA512

      e6d5bf6ba621d59923796f09bf9be5e0dbb1a196666ba3847d13b31f401ca6cb8cbf07ad09fa60eb4261f1ac7956a074157e1fbe2dccafa66828e6733673604e

    • SSDEEP

      24576:MyNctQBOSXo4XhUbBt2vO0Pvcyrv0DekWTtDfqm4ZPMSak:7cQB84XheBtSJP0yrsaz9q

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detect Xworm Payload

    • Detected google phishing page

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Downloads MZ/PE file

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.