Analysis
-
max time kernel
106s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 12:24
Static task
static1
General
-
Target
2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe
-
Size
812KB
-
MD5
c3eac2a507042637fe1995a67079f787
-
SHA1
a221cb9483950632405b65a55bd831b6ba1ccd60
-
SHA256
8bef244d820d964c52433558f61de7b2f9b80d842273a1f7679aae88bcc90ebf
-
SHA512
d6d80a969b3f126bb45815df62b91ad0d56b2352d4040f88f8e5d43aaaa6ea27d983afdbab358063eb0b6eb706fbaf46d00acfc09dcd76a9581637e1fdc33c8b
-
SSDEEP
12288:SFkrSCa3l21ex6JRoZvxLh84NnFd6ANwyH54oGRZcNADyu6Dkkq:SFkqBkJRoZlKAF7Nwjc0sk
Malware Config
Extracted
qakbot
323.108
1579169908
Protocol: ftp- Host:
192.185.5.208 - Port:
21 - Username:
[email protected] - Password:
NxdkxAp4dUsY
Protocol: ftp- Host:
162.241.218.118 - Port:
21 - Username:
[email protected] - Password:
EcOV0DyGVgVN
Protocol: ftp- Host:
69.89.31.139 - Port:
21 - Username:
[email protected] - Password:
fcR7OvyLrMW6!
Protocol: ftp- Host:
169.207.67.14 - Port:
21 - Username:
[email protected] - Password:
eQyicNLzzqPN
5.89.115.73:2222
47.40.244.237:443
75.70.218.193:443
74.137.56.132:443
75.142.59.167:443
96.241.184.247:995
72.209.191.27:443
64.19.74.29:995
72.218.167.183:443
71.214.26.195:443
71.226.140.73:443
201.152.141.209:995
130.93.11.211:443
24.187.56.19:2222
111.125.70.30:2222
76.23.204.29:443
130.93.11.211:50010
50.247.230.33:995
67.10.18.112:993
173.3.132.17:995
171.78.146.250:443
181.197.195.138:995
104.235.58.194:443
162.244.224.166:443
100.37.33.10:443
173.73.29.192:443
217.162.149.212:443
71.30.56.170:443
69.40.23.197:443
159.242.41.235:443
68.192.80.248:443
67.251.155.12:443
24.164.79.147:443
47.23.101.26:465
45.45.105.94:995
76.176.28.156:2222
99.195.155.153:443
208.101.168.167:443
108.55.23.221:443
68.238.56.27:443
47.202.98.230:443
69.180.17.75:443
96.35.170.82:2222
66.214.75.176:443
172.251.77.230:443
70.62.160.186:6883
12.5.37.3:443
47.153.115.154:443
12.5.37.3:995
98.186.90.192:995
24.32.119.146:443
104.3.91.20:995
104.34.122.18:443
68.49.120.179:443
100.4.185.8:443
24.191.227.91:2222
208.126.142.17:443
97.96.51.117:443
184.167.2.251:2222
72.190.101.70:443
72.142.106.198:993
75.110.250.89:443
5.182.39.156:443
71.77.231.251:443
68.174.15.223:443
45.45.105.94:443
96.248.113.167:995
98.211.174.74:443
100.40.48.96:443
24.229.245.124:995
207.179.194.91:443
108.160.123.244:443
73.244.83.199:443
206.51.202.106:50002
67.223.197.134:443
70.176.164.129:443
83.76.204.98:2222
2.186.62.137:995
70.174.3.241:443
63.230.16.166:2083
201.188.145.70:443
172.242.9.118:995
108.39.114.84:443
65.30.12.240:443
24.201.79.208:2078
222.195.69.36:2078
184.191.62.78:443
2.51.222.125:995
162.244.225.30:443
108.227.161.27:443
98.13.0.128:443
76.116.90.159:443
80.14.209.42:2222
90.91.93.28:2222
216.137.142.200:2222
98.118.156.172:443
205.250.79.62:443
174.101.35.214:443
86.217.193.84:2222
166.62.180.194:2078
173.61.231.209:443
173.31.178.20:443
24.189.222.222:2222
50.78.93.74:995
70.164.39.91:443
23.240.185.215:443
66.222.88.126:995
74.194.4.181:443
174.48.72.160:443
117.204.239.158:995
173.22.120.11:2222
67.200.146.98:2222
96.59.11.86:443
67.60.113.253:2222
24.202.42.48:2222
24.184.6.58:2222
108.5.34.92:443
109.169.201.246:21
24.27.82.216:2222
172.78.87.180:443
174.82.131.155:995
130.93.11.211:995
74.134.35.54:443
73.226.220.56:443
2.50.170.218:443
69.92.54.95:995
86.169.244.41:2222
187.205.251.22:443
75.81.25.223:995
184.74.101.234:995
75.130.117.134:443
69.253.236.182:443
68.1.115.106:443
70.120.149.173:443
67.248.176.83:443
47.146.169.85:443
72.29.181.77:2078
70.177.25.99:443
152.208.21.141:443
72.187.35.131:443
47.227.198.155:443
78.13.212.163:2222
71.80.227.238:443
98.252.150.180:443
47.39.76.74:443
71.233.73.222:995
73.133.46.105:995
107.12.131.249:443
Signatures
-
Qakbot family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4624 cmd.exe 4760 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4760 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3140 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe 3140 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe 952 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe 952 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe 952 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe 952 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3140 wrote to memory of 952 3140 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe 91 PID 3140 wrote to memory of 952 3140 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe 91 PID 3140 wrote to memory of 952 3140 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe 91 PID 3140 wrote to memory of 4624 3140 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe 95 PID 3140 wrote to memory of 4624 3140 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe 95 PID 3140 wrote to memory of 4624 3140 2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe 95 PID 4624 wrote to memory of 4760 4624 cmd.exe 97 PID 4624 wrote to memory of 4760 4624 cmd.exe 97 PID 4624 wrote to memory of 4760 4624 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe /C2⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\2025-04-04_c3eac2a507042637fe1995a67079f787_amadey_rhadamanthys_smoke-loader.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4760
-
-