General

  • Target

    9c7fd9118c667663ed8834d11c9a3f840602c9ce5f30f904b9cdd7b8cfa1bbb2.zip

  • Size

    465KB

  • Sample

    231022-vksvlabc5z

  • MD5

    43376f0256517880940b5d14bdfe3994

  • SHA1

    731dde07bdfcf7f5beffe7dafcca96e5755c0ae8

  • SHA256

    c227b68bcd0e90d1c4cedac0d50cad752cb02262cb74575171f6e25ca51ff85c

  • SHA512

    7ecb5c359dfd13b554695f81d1db6527730e17f314b427c8451d89be2848b732e5650bdd199a4bf5c6c319d80347a0a41b738357d73db7336c6c56336c6faf9d

  • SSDEEP

    12288:U1Df6WPPwzjidzQdxROOV6eJpyAyQemlp32F2WRgzOY0cP5jiAw:U9rP8idzALVTufmlAFuO1cJiAw

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

homed

C2

109.107.182.133:19084

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain

Extracted

Family

redline

Botnet

kinder

C2

109.107.182.133:19084

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Targets

    • Target

      9c7fd9118c667663ed8834d11c9a3f840602c9ce5f30f904b9cdd7b8cfa1bbb2.exe

    • Size

      509KB

    • MD5

      a94053ce5a28e7a0af4b19a7d86d3bdc

    • SHA1

      9606b92b3d1eb8068566fb311875aa3c621dbaa1

    • SHA256

      9c7fd9118c667663ed8834d11c9a3f840602c9ce5f30f904b9cdd7b8cfa1bbb2

    • SHA512

      54fc0cae6040d5967b315d99a6897c4cda6c92332b8002476789be77c5a2a46ff29a53f77bfae6afaaeecb4dcd51986de953e3f753907fa42616b7f52e64f783

    • SSDEEP

      12288:5Mr1y90RpSAqeofcSHpBg0PzkQfhm8ZStnQKWceSUfd:gy+p1ofcYpiQkQfpZStnQKWcbUfd

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks