General

  • Target

    a3856df71eb61ea894a02826e7ea581b042c79602ab859be3aad16f0a039ffbc.zip

  • Size

    1.5MB

  • Sample

    240402-l7jqrseg52

  • MD5

    ced6300921d18448bfbd26761a33571c

  • SHA1

    3a29c35a1d94ced3a8edc7379eb9c3ee47029b5c

  • SHA256

    3915ef76cc7852f9070cbee873398014f37d617bfc2b6c25140ac26091dce5a1

  • SHA512

    88bf0274087ff5417984896ea648b075121976df2eb8753fdfad27e50a6560701b1016aedbbbc874b2c6182e672070f02b29dcb05e03a9953047ddb311a1cd0a

  • SSDEEP

    49152:KvYbmJh4I51Ei9hCn3DVbfgNZoTtgsvCObOiV:DyJCIrEientEW2CgiV

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

  • url_paths

    /theme/index.php

rc4.plain

Targets

    • Target

      a3856df71eb61ea894a02826e7ea581b042c79602ab859be3aad16f0a039ffbc.exe

    • Size

      1.6MB

    • MD5

      dc32132299c4239e0d54d9f1731dff15

    • SHA1

      7db45bd474049fc304172c57782cf5b2f3db8862

    • SHA256

      a3856df71eb61ea894a02826e7ea581b042c79602ab859be3aad16f0a039ffbc

    • SHA512

      6e8667cc95db7da46df710483d326d9035d83fa9e004b46fc598d4ea09f25063945fc53a4e05e08bd3e8c902069ff0aca866e1c699bab9bfcc4c3ac16442faca

    • SSDEEP

      49152:JTl2GRpauWfLwGUoOosLdc6Un/eDAzQJJpHjRYVhN:58GoOGUosyRlzQJbjRYV

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks