General

  • Target

    2WikyfhIg3qcjejHn3mPOq9j.exe

  • Size

    4.6MB

  • Sample

    240219-13r9nsfa48

  • MD5

    61d5c104ea3648f4020c15dfac7e41de

  • SHA1

    7197efa6c099fd47ea379578e5bdf9877d33b087

  • SHA256

    d699d09ddc2994787b49a164b33353a8e723a62c7a2709201c4a3398169f8edf

  • SHA512

    33386ae9326a298617c54bdc3084559f3b1a2e0ad72d33d773582befe7f5c4b875710dc2e93f9d10614add27bebd3b1ea6f9311b06b05f82eadb81c35df13a0a

  • SSDEEP

    98304:oV8ndGDi9ymvydJLC19UYeh62JPtG4n65Kj5OJPL2Pso:o+ndGapsLCaW4n65K1CPa

Malware Config

Extracted

Family

smokeloader

Botnet

pub3

Extracted

Family

risepro

C2

193.233.132.55:50500

Extracted

Family

smokeloader

Version

2022

C2

http://sjyey.com/tmp/index.php

http://babonwo.ru/tmp/index.php

http://mth.com.ua/tmp/index.php

http://piratia.pw/tmp/index.php

http://go-piratia.ru/tmp/index.php

rc4.i32
rc4.i32

Extracted

Family

lumma

C2

https://turkeyunlikelyofw.shop/api

https://associationokeo.shop/api

Targets

    • Target

      2WikyfhIg3qcjejHn3mPOq9j.exe

    • Size

      4.6MB

    • MD5

      61d5c104ea3648f4020c15dfac7e41de

    • SHA1

      7197efa6c099fd47ea379578e5bdf9877d33b087

    • SHA256

      d699d09ddc2994787b49a164b33353a8e723a62c7a2709201c4a3398169f8edf

    • SHA512

      33386ae9326a298617c54bdc3084559f3b1a2e0ad72d33d773582befe7f5c4b875710dc2e93f9d10614add27bebd3b1ea6f9311b06b05f82eadb81c35df13a0a

    • SSDEEP

      98304:oV8ndGDi9ymvydJLC19UYeh62JPtG4n65Kj5OJPL2Pso:o+ndGapsLCaW4n65K1CPa

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • UAC bypass

    • Windows security bypass

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks