General

  • Target

    56ca31b83106dffdddee0755abbb3233d16b546e0f7c15478622478e23b394c8

  • Size

    1.4MB

  • Sample

    231112-pvpyssfh77

  • MD5

    06fa5c4f7e339a7453b70b6c7948f657

  • SHA1

    bcdbaf0e1f92006ac2d041665886be4bb680996d

  • SHA256

    56ca31b83106dffdddee0755abbb3233d16b546e0f7c15478622478e23b394c8

  • SHA512

    3276139fa0a37bac55141fb2d736778067f8ef9a4992004979329fcd0d1f39a63e942c7e91fb19271784eb0f41c3183496b653450d056ebd09ee028ef4db4289

  • SSDEEP

    24576:nyidxRvHftYdFGQF03I3eaIsiqiGFjpDaHnajpziTcT0amV6MNSSBSl1gj6WV0d:yidxAFGQEeeh1vGLyna8TcT0amESkg

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://5.42.92.190/fks/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Extracted

Family

stealc

C2

http://77.91.68.247

Attributes
  • url_path

    /c36258786fdc16da.php

rc4.plain

Extracted

Family

smokeloader

Botnet

up3

Targets

    • Target

      56ca31b83106dffdddee0755abbb3233d16b546e0f7c15478622478e23b394c8

    • Size

      1.4MB

    • MD5

      06fa5c4f7e339a7453b70b6c7948f657

    • SHA1

      bcdbaf0e1f92006ac2d041665886be4bb680996d

    • SHA256

      56ca31b83106dffdddee0755abbb3233d16b546e0f7c15478622478e23b394c8

    • SHA512

      3276139fa0a37bac55141fb2d736778067f8ef9a4992004979329fcd0d1f39a63e942c7e91fb19271784eb0f41c3183496b653450d056ebd09ee028ef4db4289

    • SSDEEP

      24576:nyidxRvHftYdFGQF03I3eaIsiqiGFjpDaHnajpziTcT0amV6MNSSBSl1gj6WV0d:yidxAFGQEeeh1vGLyna8TcT0amESkg

    • Detect Mystic stealer payload

    • Detected google phishing page

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks