General

  • Target

    0709c265fa8e91c4fc88c9b4ebc32747.exe

  • Size

    931KB

  • Sample

    231210-3ettpsfbgk

  • MD5

    0709c265fa8e91c4fc88c9b4ebc32747

  • SHA1

    f290441c4a4329b86f8378c7ba6d262ce015d63b

  • SHA256

    8c490d6ddb6088af87d6e487397113a54d4e23ace17159fdd514b4a39849d929

  • SHA512

    6ea4077c12ec4a799d2b58a0e67b0e19c76d48a091992fa90460ffa068b2e700bbe4414c708050c7419385a275cd1f870ffc224df9d4afb39640d2691b955fc9

  • SSDEEP

    12288:aog6Qe7S/+322Ghabdq399BObcCiZFU6d5WDAWHKVbnIGWBuhNy3iXSgIDMB:s6O/+3HGhabdO9pe6f8/SMPLyXvIDMB

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://81.19.131.34/fks/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

LiveTraffic

C2

77.105.132.87:6731

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

redline

Botnet

@oleh_ps

C2

176.123.7.190:32927

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

eternity

Wallets

47vk9PbPuHnEnazCn4tLpwPCWRLSMhpX9PD8WqpjchhTXisimD6j8EvRFDbPQHKUmHVq3vAM3DLytXLg8CqcdRXRFdPe92Q

Attributes
  • payload_urls

    https://raw.githubusercontent.com/VolVeRFM/SilentMiner-VolVeR/main/VolVeRBuilder/Resources/xmrig.exe

Targets

    • Target

      0709c265fa8e91c4fc88c9b4ebc32747.exe

    • Size

      931KB

    • MD5

      0709c265fa8e91c4fc88c9b4ebc32747

    • SHA1

      f290441c4a4329b86f8378c7ba6d262ce015d63b

    • SHA256

      8c490d6ddb6088af87d6e487397113a54d4e23ace17159fdd514b4a39849d929

    • SHA512

      6ea4077c12ec4a799d2b58a0e67b0e19c76d48a091992fa90460ffa068b2e700bbe4414c708050c7419385a275cd1f870ffc224df9d4afb39640d2691b955fc9

    • SSDEEP

      12288:aog6Qe7S/+322Ghabdq399BObcCiZFU6d5WDAWHKVbnIGWBuhNy3iXSgIDMB:s6O/+3HGhabdO9pe6f8/SMPLyXvIDMB

    • Eternity

      Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks