General

  • Target

    NEAS.604d74771e04b36b54d5dba085da04a6a45f9c0138618576edc5a063ba5a36f6.exe

  • Size

    1.4MB

  • Sample

    231114-mre83sbf4v

  • MD5

    55816a7763d094b31acb49042117a11d

  • SHA1

    ae380a2f1bd1dea1ed7ee3c194707bebbacdad81

  • SHA256

    604d74771e04b36b54d5dba085da04a6a45f9c0138618576edc5a063ba5a36f6

  • SHA512

    0e3acb34971182e923371d8bf903a45a3cc6670ca4bf5af7e67e419f1180ae094c028cae9abae079bbac4648dc2319947e1f63f6e26843b70c9afc9fbdedbdca

  • SSDEEP

    24576:lyahlyaBM6ThQSOqVeAIsgwHGHl/D/bRjcv6gaHNj9M/MIPpzzmd+wMsuz/6WItj:AelyaqK5OueHPmGpfRjcvsIlzmsslt

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Extracted

Family

smokeloader

Version

2022

C2

http://5.42.92.190/fks/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

pixelfresh

C2

194.49.94.11:80

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

c78f27a0d43f29dbd112dbd9e387406b

C2

http://31.192.237.23:80/

http://193.233.132.12:80/

Attributes
  • user_agent

    SunShineMoonLight

xor.plain

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Extracted

Family

redline

Botnet

LiveTrafic

C2

195.10.205.16:1056

Targets

    • Target

      NEAS.604d74771e04b36b54d5dba085da04a6a45f9c0138618576edc5a063ba5a36f6.exe

    • Size

      1.4MB

    • MD5

      55816a7763d094b31acb49042117a11d

    • SHA1

      ae380a2f1bd1dea1ed7ee3c194707bebbacdad81

    • SHA256

      604d74771e04b36b54d5dba085da04a6a45f9c0138618576edc5a063ba5a36f6

    • SHA512

      0e3acb34971182e923371d8bf903a45a3cc6670ca4bf5af7e67e419f1180ae094c028cae9abae079bbac4648dc2319947e1f63f6e26843b70c9afc9fbdedbdca

    • SSDEEP

      24576:lyahlyaBM6ThQSOqVeAIsgwHGHl/D/bRjcv6gaHNj9M/MIPpzzmd+wMsuz/6WItj:AelyaqK5OueHPmGpfRjcvsIlzmsslt

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Modifies Windows Firewall

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks