General

  • Target

    800530878e98abcca258c08a58304dedeed1f5fe3e792b7bef8c6586b61084f6

  • Size

    93KB

  • Sample

    240417-rfq9esbb58

  • MD5

    4451591082f63b560252133d2ada62a0

  • SHA1

    8bc3100c76bf738490798bb03b4d3ef184ed1152

  • SHA256

    800530878e98abcca258c08a58304dedeed1f5fe3e792b7bef8c6586b61084f6

  • SHA512

    ebdcfe48e35e20c9e0342972142f9e4831777f66dd3e73f121729a5ef673452079cf31eb8eccc25d860220af30723e4f700a775a65e49a0bf48a9f0a4242fa4b

  • SSDEEP

    1536:OtKRHtJJt5HCQr5fff1tgwfOjBlqy38+c71YEP/xsgybdnxwL4MT5Z:OtKlnwQrdfOdsy38LSY/xsgybd2B5Z

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

5.42.65.50:33080

Extracted

Family

lumma

C2

https://greetclassifytalk.shop/api

https://entitlementappwo.shop/api

https://economicscreateojsu.shop/api

https://pushjellysingeywus.shop/api

https://absentconvicsjawun.shop/api

https://suitcaseacanehalk.shop/api

https://bordersoarmanusjuw.shop/api

https://mealplayerpreceodsju.shop/api

https://wifeplasterbakewis.shop/api

Targets

    • Target

      29645afd1579bf501163d73ffb4cefe7043e85b47f030a2c633d721a9b10efee.exe

    • Size

      161KB

    • MD5

      fb8ddd837ad8b94f1faf0b4920ce7b2b

    • SHA1

      c3bc51f18a1180be27c4ee0978aaa9e1295dbd4b

    • SHA256

      29645afd1579bf501163d73ffb4cefe7043e85b47f030a2c633d721a9b10efee

    • SHA512

      db218213ee139583f69b00ea7e33986857cbc73f0e549f996e0dc3b0b34282c838f874a65c13fa7e21adfb8d876ca6cef9421a19171c214b1ea98b1a99f1bc74

    • SSDEEP

      1536:IwYZ5gZyjech8y/nK/bobGPgeMWKQxljH3PBe/8YkfbM9Wzw1mE3SmJQENYmAzTa:YiZpyDz/WVPX/9CWz9xmJQMYmAzsX

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Deletes itself

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

System Information Discovery

2
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Command and Control

Web Service

1
T1102

Tasks