General

  • Target

    ac83f97e0feaa00009066010fbc425e869f7f16d7a35d5d58bec33e430700ca7.zip

  • Size

    1.5MB

  • Sample

    240402-l7jqrsec6z

  • MD5

    715f374d5f54537ae5476b52fa60b2bb

  • SHA1

    c6568f7aedd86dfbdb595ada8a0b1c42aa5041a9

  • SHA256

    79fdd551215c90e4a8326d5744dac2563c31af056029e1d8820df8cc3a85460f

  • SHA512

    780216359caffa2813c760d9f5427b137c8ec27d7f49a65102aba3a1462bf417957f8996daff1910f8e1a469dd83a299a6ae7633ad4cebbcf6da92604c3179dc

  • SSDEEP

    24576:97BmbvOm0ERrVcNg5xxnFjRYVIOJa2oU5g9GUDkSr2TSoqieNn7Elm1NZRq00604:jcvOm0EhGNImOOJa2oU691r2WXNnY0Nx

Malware Config

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

  • url_paths

    /theme/index.php

rc4.plain

Extracted

Family

redline

Botnet

supera

C2

77.91.124.82:19071

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Targets

    • Target

      ac83f97e0feaa00009066010fbc425e869f7f16d7a35d5d58bec33e430700ca7.exe

    • Size

      1.5MB

    • MD5

      36417626969d5c95bc9bed46e3164704

    • SHA1

      32a56595d5b4fa2a621b7bd61e48a757b1d77593

    • SHA256

      ac83f97e0feaa00009066010fbc425e869f7f16d7a35d5d58bec33e430700ca7

    • SHA512

      da35185947b9fa105b986ac317eae193e3e3a8d22246a9d606645e5fb5cf3572bc8a864269bfa584cdb0f51aa7e56a41ee409e2317f955111901d09ff7dbdb75

    • SSDEEP

      24576:ryRTOb0DpYBPXQwT6X6hQLEeuBcymVEZO9MZVshNUNKmhpIaTYU2gS:eRlpYBP+X/LEDiym4XsQXhCRb

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks