General

  • Target

    2737e2cab1e399c563fe0557683234fd

  • Size

    3.9MB

  • Sample

    231231-ej4ygaecdq

  • MD5

    2737e2cab1e399c563fe0557683234fd

  • SHA1

    a78fdf21a20d386622a448909c4c3d8a527e3102

  • SHA256

    f7f5898bbed2b677a52a031071110b8aebb4b3eba2669703f6dd60e6953dc2a2

  • SHA512

    3e58d11e6a87bb5f52e674b998672e9d3d8b165275e8818733a2da1043279a9c4109aa7ad51bb74de9984d360e7f277f92653f50e2088c66cb0b6552901a6dff

  • SSDEEP

    98304:yFdkFKkhdtRHWG5yuIEjf9kDQQXItcd0u3uOZKGo:yFRkHLJhBFoXItcd008

Malware Config

Extracted

Family

smokeloader

Botnet

pub6

Extracted

Family

vidar

Version

40

Botnet

706

C2

https://lenak513.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

smokeloader

Version

2020

C2

http://aucmoney.com/upload/

http://thegymmum.com/upload/

http://atvcampingtrips.com/upload/

http://kuapakualaman.com/upload/

http://renatazarazua.com/upload/

http://nasufmutlu.com/upload/

rc4.i32
rc4.i32

Extracted

Family

nullmixer

C2

http://marisana.xyz/

Extracted

Family

redline

Botnet

Build1

C2

45.142.213.135:30058

Targets

    • Target

      2737e2cab1e399c563fe0557683234fd

    • Size

      3.9MB

    • MD5

      2737e2cab1e399c563fe0557683234fd

    • SHA1

      a78fdf21a20d386622a448909c4c3d8a527e3102

    • SHA256

      f7f5898bbed2b677a52a031071110b8aebb4b3eba2669703f6dd60e6953dc2a2

    • SHA512

      3e58d11e6a87bb5f52e674b998672e9d3d8b165275e8818733a2da1043279a9c4109aa7ad51bb74de9984d360e7f277f92653f50e2088c66cb0b6552901a6dff

    • SSDEEP

      98304:yFdkFKkhdtRHWG5yuIEjf9kDQQXItcd0u3uOZKGo:yFRkHLJhBFoXItcd008

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Vidar Stealer

    • XMRig Miner payload

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks