General

  • Target

    04428661fa0f0fdab52725224d5e1dca6e612b7dbd26a4f1688045b0c7e0324f.zip

  • Size

    1.2MB

  • Sample

    240402-ma5seafa87

  • MD5

    d6739d6cd09dddac258b6e9fb346e980

  • SHA1

    2fd5d81fcdf64e4ea3f6920a90f07bd5a1359dfc

  • SHA256

    17ae197a0e5b633d82ba53205dc8f37899091cc37a21bf581808d6e5741ca88b

  • SHA512

    0ec3e593279a4e161e86499ee5d80bd962afd3c6e888a82958a0c74532ca3be23c2cdb51542fbf5544b85abf4d8ee617abc942c62c84c2779a1c624246e7edf8

  • SSDEEP

    24576:AxE1Yv0XuffU6IfCEt3B1ryUs3KT+rB3ZVlYIN3SRBMKNWKL7kCafswWYgKARmT:YhcXw86hU3BExblh3SRBIKfjafgYgzRM

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

  • url_paths

    /theme/index.php

rc4.plain

Targets

    • Target

      04428661fa0f0fdab52725224d5e1dca6e612b7dbd26a4f1688045b0c7e0324f.exe

    • Size

      1.3MB

    • MD5

      9e812f3cb3b6bd7057626dc1f8f40df2

    • SHA1

      768b2df69ccd958e0865575e10f42b98bafdba21

    • SHA256

      04428661fa0f0fdab52725224d5e1dca6e612b7dbd26a4f1688045b0c7e0324f

    • SHA512

      69f3903c483f01f1835bf54f52c78c25dc62ca8f24ad3020c754aa44230ac3bc55eeb1c6cec18b7511d23aad33f56ada18ce5875d67b07aa144de9b6013e5156

    • SSDEEP

      24576:uyENvyaKYUdsbl1Vtkig+4xZCUVjjEpB1eA1cOTYDXaVKpHky:9SPjb/8dDMUVjkWvOTYwwH

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks