General

  • Target

    NEAS.7a48d963ada853928dc397b675524c80.exe

  • Size

    782KB

  • Sample

    231117-a9nxqadf4s

  • MD5

    7a48d963ada853928dc397b675524c80

  • SHA1

    2e43ddb9ed98613897fabe1c98d422cc26fb4356

  • SHA256

    0167af3f120aee09e6d7509239916d0cad2fb9b6d182c5e8649b04978a485026

  • SHA512

    1e4621d85a7f0c4c606d8e3721044080d87f46ed6ba2149eb2ff97842b1135ee6b17a51d7cce743ef8d3fd4c898f9411c3626acfb86d86697787a2face75a9bb

  • SSDEEP

    12288:CMrvy90c6PEfv0NldHGtaex4IC5upCPHG8+PLvTMXiYQvD4PlR1Ml/pLyB:JyT6PQe5gaeuIsKC/GdLYDB1MTS

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://5.42.92.190/fks/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

pixelfresh

C2

194.49.94.11:80

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Targets

    • Target

      NEAS.7a48d963ada853928dc397b675524c80.exe

    • Size

      782KB

    • MD5

      7a48d963ada853928dc397b675524c80

    • SHA1

      2e43ddb9ed98613897fabe1c98d422cc26fb4356

    • SHA256

      0167af3f120aee09e6d7509239916d0cad2fb9b6d182c5e8649b04978a485026

    • SHA512

      1e4621d85a7f0c4c606d8e3721044080d87f46ed6ba2149eb2ff97842b1135ee6b17a51d7cce743ef8d3fd4c898f9411c3626acfb86d86697787a2face75a9bb

    • SSDEEP

      12288:CMrvy90c6PEfv0NldHGtaex4IC5upCPHG8+PLvTMXiYQvD4PlR1Ml/pLyB:JyT6PQe5gaeuIsKC/GdLYDB1MTS

    • Detect Mystic stealer payload

    • Detect ZGRat V1

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Stops running service(s)

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks