General

  • Target

    f3935b22955ae50d6117ba87916058d9.bin

  • Size

    1.4MB

  • Sample

    231113-ecq32agg2w

  • MD5

    d94ee6423a867ec9231ab77ac55d13c2

  • SHA1

    f729fe5137e76ee7bbb8895ab1e02b48c444c8ad

  • SHA256

    234bf45368d98243b625cf1c69ba15213ceae7e8c20f2ab105e52633f289788d

  • SHA512

    91c280162fc845302051fd5d6bdc413737845defc47c5df316e49a0fc3621ce550aedb58b0d9555f8db0428e1fac4d6ca10b4a9e3ea0836843c04a0048a9b6dd

  • SSDEEP

    24576:3ymp0U5X2TCAn4bTvu3NkyKOt2yQPMn1hADV/NJkZRc3NzOIcQsjTxYAR:3TQ54O33XzPiRCRUoI1MtfR

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://5.42.92.190/fks/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      77cb45093ccf067140c55c5c8b7df6c7ce6e77abda5f7b55e1c0da15fcdb4cc2.exe

    • Size

      1.4MB

    • MD5

      f3935b22955ae50d6117ba87916058d9

    • SHA1

      f9b6db6e857d4058272d5e4ae669d75c272baf79

    • SHA256

      77cb45093ccf067140c55c5c8b7df6c7ce6e77abda5f7b55e1c0da15fcdb4cc2

    • SHA512

      1a2a3f19bc3b850b1a5007dda93678371744a5b1bffcc3048e963bc14d4cbd9fb9757c2456f0ea5587f9389f77da2e4d51282387447c1aa6d2d8a95becf93aba

    • SSDEEP

      24576:jyG+4yALf5O8Jiw648ejIsGMAGF6cDnnoPjpEdyxkW2CHPCJzRJ226mqFM:2M1R9AeMTVGTCNXxkvvJzRsc

    • Detect Mystic stealer payload

    • Detect ZGRat V1

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Stops running service(s)

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks