General

  • Target

    73e66b42e44dc48abc9af6dfef222863d746a7efa7d55a64384ad91650326809

  • Size

    1.4MB

  • Sample

    231111-z9tweacd35

  • MD5

    955ef0b7f7c102fa3f61583f298ae982

  • SHA1

    422263a920460fb5b1a799af175482a67a733d31

  • SHA256

    73e66b42e44dc48abc9af6dfef222863d746a7efa7d55a64384ad91650326809

  • SHA512

    4f6359a549aa47657865931d0bbb9b4f344bcb3afbf08e28e4b6983e8a4783ac769d12f774b86eb01c67cbaccb57ce8f85c57aaa35af05717572f4ad4756442c

  • SSDEEP

    24576:Ay33reRVA+v+97Rtkfe1IsqbNGqEwDhe4ipRYp4ObnHwz7O2P92xGsqZ2:H338m+v+ye25ZGg1e4iI+WQJ92xR

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://5.42.92.190/fks/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Extracted

Family

stealc

C2

http://77.91.68.247

Attributes
  • url_path

    /c36258786fdc16da.php

rc4.plain

Extracted

Family

smokeloader

Botnet

up3

Targets

    • Target

      73e66b42e44dc48abc9af6dfef222863d746a7efa7d55a64384ad91650326809

    • Size

      1.4MB

    • MD5

      955ef0b7f7c102fa3f61583f298ae982

    • SHA1

      422263a920460fb5b1a799af175482a67a733d31

    • SHA256

      73e66b42e44dc48abc9af6dfef222863d746a7efa7d55a64384ad91650326809

    • SHA512

      4f6359a549aa47657865931d0bbb9b4f344bcb3afbf08e28e4b6983e8a4783ac769d12f774b86eb01c67cbaccb57ce8f85c57aaa35af05717572f4ad4756442c

    • SSDEEP

      24576:Ay33reRVA+v+97Rtkfe1IsqbNGqEwDhe4ipRYp4ObnHwz7O2P92xGsqZ2:H338m+v+ye25ZGg1e4iI+WQJ92xR

    • Detect Mystic stealer payload

    • Detect ZGRat V1

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Stops running service(s)

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks