General

  • Target

    infectado.rar

  • Size

    6.4MB

  • Sample

    240215-18jjqaah44

  • MD5

    2b537b3307a72563349f05b1447d8533

  • SHA1

    0ad5cb3637d0f49d8601f38d2ab3860a9d0b953f

  • SHA256

    41341a270a56d93bc7d7b84bba433894cd802e1f658c550c909648875655ee7a

  • SHA512

    d52cef983b53b3fa981104cc92fbcc9aae4ab11a2b3d53f2e16742da035eed49cac10817101707c9b296478cc5e92e39c1f49e9d937f86d939eab938eae905ff

  • SSDEEP

    98304:GK/Pws1/ZBdRpZBFGcWyFHERozyGK/C1FcODqX2baNEdQ0AubxxyeWKHxuYw0Bdj:r/h1hBdPTUyNW5C1mdXudftxdWmf0Sn

Malware Config

Extracted

Family

smokeloader

Botnet

pub3

Extracted

Family

smokeloader

Version

2022

C2

http://sjyey.com/tmp/index.php

http://babonwo.ru/tmp/index.php

http://mth.com.ua/tmp/index.php

http://piratia.pw/tmp/index.php

http://go-piratia.ru/tmp/index.php

rc4.i32
rc4.i32

Extracted

Family

amadey

Version

4.14

C2

http://anfesq.com

http://cbinr.com

http://rimakc.ru

Attributes
  • install_dir

    68fd3d7ade

  • install_file

    Utsysc.exe

  • strings_key

    27ec7fd6f50f63b8af0c1d3deefcc8fe

  • url_paths

    /forum/index.php

rc4.plain

Extracted

Family

risepro

C2

193.233.132.55:50500

Targets

    • Target

      2WikyfhIg3qcjejHn3mPOq9j.exe

    • Size

      4.6MB

    • MD5

      61d5c104ea3648f4020c15dfac7e41de

    • SHA1

      7197efa6c099fd47ea379578e5bdf9877d33b087

    • SHA256

      d699d09ddc2994787b49a164b33353a8e723a62c7a2709201c4a3398169f8edf

    • SHA512

      33386ae9326a298617c54bdc3084559f3b1a2e0ad72d33d773582befe7f5c4b875710dc2e93f9d10614add27bebd3b1ea6f9311b06b05f82eadb81c35df13a0a

    • SSDEEP

      98304:oV8ndGDi9ymvydJLC19UYeh62JPtG4n65Kj5OJPL2Pso:o+ndGapsLCaW4n65K1CPa

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • UAC bypass

    • Windows security bypass

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      dcb505dc2b9d8aac05f4ca0727f5eadb.exe

    • Size

      2.0MB

    • MD5

      dcb505dc2b9d8aac05f4ca0727f5eadb

    • SHA1

      4f633edb62de05f3d7c241c8bc19c1e0be7ced75

    • SHA256

      61f9194b9f33611ec902f02755cf2e86f0bbc84c2102c6e5d1874f9bae78e551

    • SHA512

      31e1fce9aca3b5d9afc85640af04b4542b9897f7d60b699e3153516137d9358d3c101cacc04e9e594e36b8622e9489cecf0dda210662563565d80fb9a33549b3

    • SSDEEP

      49152:si+HNTN8UVx4N6h/0k711d70aozkXWAkTmQ2U2lT4:r8J8UVs6mLz9

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      out.upx

    • Size

      4.8MB

    • MD5

      1c7e8e5c91a9567a278fdf5d3e8fb6f7

    • SHA1

      2b3a801e9cdc957fc0c88ed7d4a16b6b3edeb2e1

    • SHA256

      6e96ca63699a843d982d9cd1b569ae3039773781ee1b5f3a60a8bb1efecc8d56

    • SHA512

      e86827f8c98e79530ee8a8b3463e60d0941da84a807806f0fab9ef423e8a0eb16f54461c6331596292f19ddfb2f313da9c0a303493cf4a2900d8f3ade0660db4

    • SSDEEP

      49152:6kvDlly7oJQJA3o9L3HbAYjKIyQQjRsWvmITZFJ9DeQSqnC6E0HFhgEuryqLAb76:97lwoJQJ19X6xJuamIRVZCG/i

    Score
    3/10
    • Target

      injector.exe

    • Size

      281KB

    • MD5

      d98e33b66343e7c96158444127a117f6

    • SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

    • SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

    • SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • SSDEEP

      3072:qbHszDaOJ8u2HHFIWr6e29kOnK7qFQ8wMii5I7kGvNjzMuszHshoY46bEydJ+dK9:SA3IlIA6e29vngqS8wMmuooh8z+8F

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks