General

  • Target

    71c7c19982a6027ec52f68e4a800eaf31da738fead63e165dab1e39f0fa6196f.zip

  • Size

    1.7MB

  • Sample

    240402-l7hhpsec6x

  • MD5

    4db04715416c7f3d44c4de3d86447d71

  • SHA1

    7194982bbbbdf6d4d3430e315c06517445ea1fb3

  • SHA256

    4932904a4d01b689bc14f1e527652fbfd4d399540339e94bd521ea94f7beff49

  • SHA512

    a0ad632365b6e885997022a1c1c3d80b1ce87bf825cd934e17c677e365ff35a4ffe907020f422bc88b4763f7e4fb64f6c90d4d17ba0c5643e2e3cb2cdee9a3f1

  • SSDEEP

    24576:iJff4b8C0uyiTW4Yr1OUEMSbPJ6Va9UiPJvW4piGrObcooYnOv0O9y/99NeSl3vS:CffNPiTWdgpbPIVAFQGayYOcT9GSl3YF

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

homed

C2

109.107.182.133:19084

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

  • url_paths

    /theme/index.php

rc4.plain

Targets

    • Target

      71c7c19982a6027ec52f68e4a800eaf31da738fead63e165dab1e39f0fa6196f.exe

    • Size

      1.7MB

    • MD5

      9d179e0faf2f9debfd1a78b6df5e7589

    • SHA1

      5602bf575f6d3131906fdab1809a9924ffb3ac3e

    • SHA256

      71c7c19982a6027ec52f68e4a800eaf31da738fead63e165dab1e39f0fa6196f

    • SHA512

      1197badb88843b95ec88c39b63857751ecb541eaf94e940c23db4c37b8d0d5c75735fa646ae4db1b71c1a8ec27a882fa63b9a4b6f7fefbccb4c32038959fe792

    • SSDEEP

      24576:cylBkN879xpBf/iqVSjM0NErHH+Obnz7qytAjxkZ84DhwQqvBcP+V25y8wU4w5Ml:LAyyoBre8Kne84DhMB0j5y8jFKx17

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks