General

  • Target

    98c3d93eeb1c3139c530df4aa6270bb3df7c24148e71f195c929486136872eee.exe

  • Size

    253KB

  • Sample

    240225-fse65scb88

  • MD5

    c725af162ad3190c0b65770fb08fbe23

  • SHA1

    521eae0390bef9140f9a6e896066515ca7a98c5d

  • SHA256

    98c3d93eeb1c3139c530df4aa6270bb3df7c24148e71f195c929486136872eee

  • SHA512

    6fe7edc75ee4d52ace5450a211362808a4c24a41ae67d1e74dabd3adc687349dba35743acc4cd96e37c1d2701f03c6511a1127773f0aeb480f7025556bb3e59e

  • SSDEEP

    3072:yLsGBVVoWaf88khIqzHdWu7zCJDBfukHimJ3a1XMu5Q2e45KaHTz:UdebOLo6+JDNukHbJ3+k2YqT

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

http://kamsmad.com/tmp/index.php

http://souzhensil.ru/tmp/index.php

http://teplokub.com.ua/tmp/index.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

stealc

C2

http://185.172.128.145

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Extracted

Family

lumma

C2

https://resergvearyinitiani.shop/api

https://technologyenterdo.shop/api

https://detectordiscusser.shop/api

Targets

    • Target

      98c3d93eeb1c3139c530df4aa6270bb3df7c24148e71f195c929486136872eee.exe

    • Size

      253KB

    • MD5

      c725af162ad3190c0b65770fb08fbe23

    • SHA1

      521eae0390bef9140f9a6e896066515ca7a98c5d

    • SHA256

      98c3d93eeb1c3139c530df4aa6270bb3df7c24148e71f195c929486136872eee

    • SHA512

      6fe7edc75ee4d52ace5450a211362808a4c24a41ae67d1e74dabd3adc687349dba35743acc4cd96e37c1d2701f03c6511a1127773f0aeb480f7025556bb3e59e

    • SSDEEP

      3072:yLsGBVVoWaf88khIqzHdWu7zCJDBfukHimJ3a1XMu5Q2e45KaHTz:UdebOLo6+JDNukHbJ3+k2YqT

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Stealc

      Stealc is an infostealer written in C++.

    • Detect binaries embedding considerable number of MFA browser extension IDs.

    • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.

    • Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables Discord URL observed in first stage droppers

    • Detects executables containing URLs to raw contents of a Github gist

    • Detects executables containing artifacts associated with disabling Widnows Defender

    • Detects executables packed with VMProtect.

    • Detects executables referencing many varying, potentially fake Windows User-Agents

    • UPX dump on OEP (original entry point)

    • Contacts a large (511) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks