General
-
Target
27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62
-
Size
128KB
-
Sample
231212-ex53paeggr
-
MD5
0bb091abd46a42fb2a3f63e3345d3f24
-
SHA1
5f883e60dfdcdd4116520e1ce0ef9bfeeb0a07c5
-
SHA256
0a1786865ff1521db41f9ac50554dbedb334cb0552042981fa00e97fd4679d1e
-
SHA512
64f41d387334e2eb255f85cf0d32c660aff025faa76aaf069d22ffb640089d6df42d9203b5b002388f55ba48babbd2ceca1b3184f34e776aee6c980b48529869
-
SSDEEP
3072:xZ6p7Y5mwYWPpF5cABY3tcaSqBplt3RfgRw6PkxJ30O9:xyYmqItdSoNh
Static task
static1
Behavioral task
behavioral1
Sample
27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
http://humydrole.com/tmp/index.php
http://trunk-co.ru/tmp/index.php
http://weareelight.com/tmp/index.php
http://pirateking.online/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Extracted
raccoon
02715ba03fc9d768ba977c72db990ef6
http://193.233.132.30:80/
-
user_agent
MrBidenNeverKnow
Extracted
smokeloader
pub1
Targets
-
-
Target
27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62
-
Size
190KB
-
MD5
299c7d3aec672b821f03493648e7861e
-
SHA1
ab318886adde48b909fcdda9f79e066bfa386045
-
SHA256
27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62
-
SHA512
c0e8cfb4e6389b119657ad0159c0d7ff083f5e3491b98c9574a9e00c12d70adda340157b05963b5dcb7da53a3cba3d4595b24d74e37c9da293b5b05578314623
-
SSDEEP
3072:BJW9jLf7N+CgU8Y2Wf33P12HRvdvQb7YWtc/kBplt3Rfgs85eq:G9jLzN+Cp133d2x1vw7YmUy
-
Glupteba payload
-
Raccoon Stealer V2 payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Virtualization/Sandbox Evasion
1