General
-
Target
0b5ab18b1fb6b220e32a614dfb5b4de2.exe
-
Size
37KB
-
Sample
231210-2v37msfhc3
-
MD5
0b5ab18b1fb6b220e32a614dfb5b4de2
-
SHA1
42b2d5dcf34395173b96899113d42080f0053643
-
SHA256
8b978cea455f253e274933089679a398069a42108e037cb3f930f168fb89c3cb
-
SHA512
999bcc43833f18abf11804bec0acc419a03dbce7ebc3900dfd3cdb5fe8e66af5baa71f8961c13d7a38162e73206ae245d3eb2ef6eb24d1b17de001f6b6324bf7
-
SSDEEP
768:d8n3N4JRqwg8UTB+8zx70f0PSuopLwlFFWO7:dmN4JRrg8ypxSKFFX
Malware Config
Extracted
smokeloader
2022
http://81.19.131.34/fks/index.php
Extracted
redline
LiveTraffic
77.105.132.87:6731
Extracted
redline
@oleh_ps
176.123.7.190:32927
Extracted
smokeloader
up3
Extracted
eternity
47vk9PbPuHnEnazCn4tLpwPCWRLSMhpX9PD8WqpjchhTXisimD6j8EvRFDbPQHKUmHVq3vAM3DLytXLg8CqcdRXRFdPe92Q
-
payload_urls
https://raw.githubusercontent.com/VolVeRFM/SilentMiner-VolVeR/main/VolVeRBuilder/Resources/xmrig.exe
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
socks5systemz
-
rc4_key
i4hiea56#7b&dfw3
Targets
-
-
Target
0b5ab18b1fb6b220e32a614dfb5b4de2.exe
-
Size
37KB
-
MD5
0b5ab18b1fb6b220e32a614dfb5b4de2
-
SHA1
42b2d5dcf34395173b96899113d42080f0053643
-
SHA256
8b978cea455f253e274933089679a398069a42108e037cb3f930f168fb89c3cb
-
SHA512
999bcc43833f18abf11804bec0acc419a03dbce7ebc3900dfd3cdb5fe8e66af5baa71f8961c13d7a38162e73206ae245d3eb2ef6eb24d1b17de001f6b6324bf7
-
SSDEEP
768:d8n3N4JRqwg8UTB+8zx70f0PSuopLwlFFWO7:dmN4JRrg8ypxSKFFX
-
Detect Lumma Stealer payload V4
-
Detect Socks5Systemz Payload
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1