General

  • Target

    93a2f0d67e7ed860a1faaa1a397f5155df7efe9b3eb41d4b18ab778d4104967a

  • Size

    1.4MB

  • Sample

    231112-mnb29aeh5y

  • MD5

    5b5beee770e72d77976e0199441df920

  • SHA1

    ca10f2e25907a35e296b0fa927ad4bfe9fbf10e5

  • SHA256

    93a2f0d67e7ed860a1faaa1a397f5155df7efe9b3eb41d4b18ab778d4104967a

  • SHA512

    1a844b82f356aa7829eac4731d5dd4b52134f0c569013b8d0e43e681f48ee2d91d005e607e8fb8f7484c64a34caa398d3e32d6a8425c2edd02e461c2ac10eaa8

  • SSDEEP

    24576:sypyOnk8cesIscSuGP9DDntJcvUmNhC7jGcW5XovBYPPY/65muuq:bs0keblvGhjTwg3AoJK7X

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://5.42.92.190/fks/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Extracted

Family

stealc

C2

http://77.91.68.247

Attributes
  • url_path

    /c36258786fdc16da.php

rc4.plain

Extracted

Family

smokeloader

Botnet

up3

Targets

    • Target

      93a2f0d67e7ed860a1faaa1a397f5155df7efe9b3eb41d4b18ab778d4104967a

    • Size

      1.4MB

    • MD5

      5b5beee770e72d77976e0199441df920

    • SHA1

      ca10f2e25907a35e296b0fa927ad4bfe9fbf10e5

    • SHA256

      93a2f0d67e7ed860a1faaa1a397f5155df7efe9b3eb41d4b18ab778d4104967a

    • SHA512

      1a844b82f356aa7829eac4731d5dd4b52134f0c569013b8d0e43e681f48ee2d91d005e607e8fb8f7484c64a34caa398d3e32d6a8425c2edd02e461c2ac10eaa8

    • SSDEEP

      24576:sypyOnk8cesIscSuGP9DDntJcvUmNhC7jGcW5XovBYPPY/65muuq:bs0keblvGhjTwg3AoJK7X

    • Detect Mystic stealer payload

    • Detect ZGRat V1

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Stops running service(s)

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks