General

  • Target

    160ad15742e34779c030c0736a6a61dc2b85ff7a2341b2c82cc8e144c9019384

  • Size

    909KB

  • Sample

    231024-l4n63sdh84

  • MD5

    9cd0140130128c33d25656c066220dfd

  • SHA1

    d4efc947c2b684c194d565926be9996a3428b095

  • SHA256

    160ad15742e34779c030c0736a6a61dc2b85ff7a2341b2c82cc8e144c9019384

  • SHA512

    66f73320cebfe8c7ae9e01d4bca5845ce7008e9cde0f3d56be6d25f5a815a17ca09c195681d21a3c4f12fdd84673f7ee506ce0cae89d7737924ee0e68d9aff8c

  • SSDEEP

    12288:wkyI1m4TaksDM2dAEAqyYCJ41oVls5pFR8SLaSNsTeM3KukimOvch:3So2dATqyYCJ4gC58SHel

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Extracted

Family

smokeloader

Botnet

up3

Targets

    • Target

      160ad15742e34779c030c0736a6a61dc2b85ff7a2341b2c82cc8e144c9019384

    • Size

      909KB

    • MD5

      9cd0140130128c33d25656c066220dfd

    • SHA1

      d4efc947c2b684c194d565926be9996a3428b095

    • SHA256

      160ad15742e34779c030c0736a6a61dc2b85ff7a2341b2c82cc8e144c9019384

    • SHA512

      66f73320cebfe8c7ae9e01d4bca5845ce7008e9cde0f3d56be6d25f5a815a17ca09c195681d21a3c4f12fdd84673f7ee506ce0cae89d7737924ee0e68d9aff8c

    • SSDEEP

      12288:wkyI1m4TaksDM2dAEAqyYCJ41oVls5pFR8SLaSNsTeM3KukimOvch:3So2dATqyYCJ4gC58SHel

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Stops running service(s)

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks