General
-
Target
infectado.rar
-
Size
6.4MB
-
Sample
240215-18jjqaah44
-
MD5
2b537b3307a72563349f05b1447d8533
-
SHA1
0ad5cb3637d0f49d8601f38d2ab3860a9d0b953f
-
SHA256
41341a270a56d93bc7d7b84bba433894cd802e1f658c550c909648875655ee7a
-
SHA512
d52cef983b53b3fa981104cc92fbcc9aae4ab11a2b3d53f2e16742da035eed49cac10817101707c9b296478cc5e92e39c1f49e9d937f86d939eab938eae905ff
-
SSDEEP
98304:GK/Pws1/ZBdRpZBFGcWyFHERozyGK/C1FcODqX2baNEdQ0AubxxyeWKHxuYw0Bdj:r/h1hBdPTUyNW5C1mdXudftxdWmf0Sn
Behavioral task
behavioral1
Sample
2WikyfhIg3qcjejHn3mPOq9j.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2WikyfhIg3qcjejHn3mPOq9j.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
dcb505dc2b9d8aac05f4ca0727f5eadb.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
dcb505dc2b9d8aac05f4ca0727f5eadb.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
out.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
out.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
injector.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
injector.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://sjyey.com/tmp/index.php
http://babonwo.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Extracted
amadey
4.14
http://anfesq.com
http://cbinr.com
http://rimakc.ru
-
install_dir
68fd3d7ade
-
install_file
Utsysc.exe
-
strings_key
27ec7fd6f50f63b8af0c1d3deefcc8fe
-
url_paths
/forum/index.php
Extracted
risepro
193.233.132.55:50500
Targets
-
-
Target
2WikyfhIg3qcjejHn3mPOq9j.exe
-
Size
4.6MB
-
MD5
61d5c104ea3648f4020c15dfac7e41de
-
SHA1
7197efa6c099fd47ea379578e5bdf9877d33b087
-
SHA256
d699d09ddc2994787b49a164b33353a8e723a62c7a2709201c4a3398169f8edf
-
SHA512
33386ae9326a298617c54bdc3084559f3b1a2e0ad72d33d773582befe7f5c4b875710dc2e93f9d10614add27bebd3b1ea6f9311b06b05f82eadb81c35df13a0a
-
SSDEEP
98304:oV8ndGDi9ymvydJLC19UYeh62JPtG4n65Kj5OJPL2Pso:o+ndGapsLCaW4n65K1CPa
-
Detects LgoogLoader payload
-
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
dcb505dc2b9d8aac05f4ca0727f5eadb.exe
-
Size
2.0MB
-
MD5
dcb505dc2b9d8aac05f4ca0727f5eadb
-
SHA1
4f633edb62de05f3d7c241c8bc19c1e0be7ced75
-
SHA256
61f9194b9f33611ec902f02755cf2e86f0bbc84c2102c6e5d1874f9bae78e551
-
SHA512
31e1fce9aca3b5d9afc85640af04b4542b9897f7d60b699e3153516137d9358d3c101cacc04e9e594e36b8622e9489cecf0dda210662563565d80fb9a33549b3
-
SSDEEP
49152:si+HNTN8UVx4N6h/0k711d70aozkXWAkTmQ2U2lT4:r8J8UVs6mLz9
Score7/10 -
-
-
Target
out.upx
-
Size
4.8MB
-
MD5
1c7e8e5c91a9567a278fdf5d3e8fb6f7
-
SHA1
2b3a801e9cdc957fc0c88ed7d4a16b6b3edeb2e1
-
SHA256
6e96ca63699a843d982d9cd1b569ae3039773781ee1b5f3a60a8bb1efecc8d56
-
SHA512
e86827f8c98e79530ee8a8b3463e60d0941da84a807806f0fab9ef423e8a0eb16f54461c6331596292f19ddfb2f313da9c0a303493cf4a2900d8f3ade0660db4
-
SSDEEP
49152:6kvDlly7oJQJA3o9L3HbAYjKIyQQjRsWvmITZFJ9DeQSqnC6E0HFhgEuryqLAb76:97lwoJQJ19X6xJuamIRVZCG/i
Score3/10 -
-
-
Target
injector.exe
-
Size
281KB
-
MD5
d98e33b66343e7c96158444127a117f6
-
SHA1
bb716c5509a2bf345c6c1152f6e3e1452d39d50d
-
SHA256
5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
-
SHA512
705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
SSDEEP
3072:qbHszDaOJ8u2HHFIWr6e29kOnK7qFQ8wMii5I7kGvNjzMuszHshoY46bEydJ+dK9:SA3IlIA6e29vngqS8wMmuooh8z+8F
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1