General

  • Target

    b1003b910355b4a0ef5ee0bc887bc1a76d4b6cbffcaebfa74748d0d12d3b9a38

  • Size

    1.5MB

  • Sample

    231101-rqtgjaba66

  • MD5

    9f2ef6f9061b9b824b6cb1aa8692bd3e

  • SHA1

    8a41c8837334c3faf3600a13216017bb96372b95

  • SHA256

    63b8573f2eac7d8c75a262cd9825296e7ee71c07025453c366100a9b4449831e

  • SHA512

    71d22888591d7b2b9a9e3fb9155b319a943f7ff99e51991edb42979eac35f8c1039d60e33bfdefe0e33357187dfd291df35d0459da0dcd06505ccd7d60bd6bf6

  • SSDEEP

    49152:YdFq41UdUARHwtmzlpVKsA/aeicefUExAIsjHLaE:j4KUAr7YnyVcetxngraE

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain

Targets

    • Target

      b1003b910355b4a0ef5ee0bc887bc1a76d4b6cbffcaebfa74748d0d12d3b9a38

    • Size

      1.5MB

    • MD5

      08343869ec9cbc12aadda90e3b2a8415

    • SHA1

      5ee6fbbc8eae76bd228912ce0afb32adc88710dd

    • SHA256

      b1003b910355b4a0ef5ee0bc887bc1a76d4b6cbffcaebfa74748d0d12d3b9a38

    • SHA512

      6138d3172e2da8bfb2cf7ca864a4e91884c51e6b43847086d6d2dbaa6076a1568bdc7a57868dc8cbd867e8e939a80cb2a28b98fa8186399b1d518a8fa1c7c491

    • SSDEEP

      49152:A+YEm41de+rRwtcl8hKrI7v3WvG+Ex4IsfHLa:Jm4fe+vl8U87eix/ira

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks