Researchers Center: Atmos Strategic Monitoring


SPYWARE.CITADEL.ATMOS

Sample: 320e9a5d584b96d134c6ce7c541afb7794506a63
SHA256: 6218cc33ccd165370ce024210346aec70e8bd15d5fab8de5fc9df531085ebe5e
Request: Tayuya [2018/06/13 - 23:06:29]
Callback: 69.73.130.134
Gate: http://69.73.130.134/~cope36/plugins/editors/jce/main/cache/file.php|file=us.xml
Decryptor logs:
DEBUG:root:[*] get base config & several params
DEBUG:root:[*] found base config at RVA:0x000059b0, RA:0x000059b0
DEBUG:root:[*] found login key: 3533334439323236453443314345304139383135444245423139323335414534
DEBUG:root:[*] use RC4 key at (base config + 0x00000157)
DEBUG:root:[*] found following xor key for AES plus:
DEBUG:root:[62, 74, 187, 1, 132, 27, 178, 152, 18, 43, 181, 239, 177, 190, 209, 113]
DEBUG:root:[*] found RC4 salt: 0xF2C9CDEF
DEBUG:root:[*] found xor key using after Visual Decrypt: 0xF2C9CDEF
DEBUG:root:C&C found:
DEBUG:root:['http://69.73.130.134/~cope36/plugins/editors/jce/main/cache/file.php|file=us.xml']
DEBUG:root:[*] try to unpack
DEBUG:root:[*] decrypt data using following key:
DEBUG:root:[179, 97, 159, 250, 205, 96, 200, 127, 13, 172, 62, 64, 213, 66, 54, 175, 106, 228, 192, 49, 197, 88, 128, 180, 78, 200, 83, 112, 42, 76, 104, 124, 58, 30, 150, 62, 222, 47, 250, 202, 134, 69, 106, 211, 92, 115, 146, 53, 206, 48, 32, 5, 116, 229, 144, 255, 104, 181, 139, 132, 176, 124, 24, 99, 52, 135, 69, 188, 45, 20, 194, 234, 229, 247, 113, 203, 191, 40, 206, 223, 207, 6, 5, 101, 51, 90, 60, 185, 8, 85, 249, 235, 1, 43, 177, 158, 182, 171, 118, 195, 153, 100, 219, 19, 3, 190, 90, 113, 147, 178, 246, 30, 95, 239, 161, 52, 196, 36, 9, 57, 126, 80, 165, 90, 254, 119, 18, 136, 163, 109, 237, 230, 6, 202, 98, 9, 227, 63, 91, 246, 74, 39, 17, 115, 202, 108, 88, 162, 25, 219, 28, 216, 16, 65, 117, 159, 139, 33, 7, 61, 35, 137, 234, 161, 121, 57, 231, 160, 76, 238, 66, 150, 40, 211, 166, 133, 235, 165, 20, 205, 48, 67, 101, 196, 41, 169, 35, 241, 111, 112, 122, 102, 248, 59, 252, 27, 240, 197, 196, 231, 173, 156, 42, 94, 83, 220, 225, 172, 69, 209, 211, 139, 198, 110, 129, 93, 237, 237, 233, 208, 80, 123, 243, 163, 168, 71, 0, 252, 135, 160, 80, 156, 60, 125, 170, 24, 87, 42, 178, 151, 124, 174, 67, 197, 34, 27, 123, 168, 251, 152, 4, 148, 115, 24, 31, 98]
DEBUG:root:[*] try to AES+ decryption
DEBUG:root:[*] use following AES key:
DEBUG:root:[250, 71, 242, 150, 56, 239, 106, 174, 15, 162, 187, 176, 118, 145, 219, 26]
Report:
{'login_key_hexed': '3533334439323236453443314345304139383135444245423139323335414534', 'base_key': {'y': 104, 'x': 82, 'state': [159, 171, 179, 4, 231, 202, 151, 246, 90, 96, 100, 106, 165, 111, 67, 137, 57, 228, 192, 49, 197, 88, 128, 180, 78, 200, 83, 112, 42, 76, 104, 124, 58, 30, 150, 62, 222, 47, 250, 172, 134, 69, 106, 211, 92, 115, 146, 53, 206, 48, 32, 5, 116, 229, 144, 255, 104, 181, 139, 132, 176, 124, 24, 99, 52, 135, 69, 188, 45, 20, 194, 234, 229, 247, 113, 203, 191, 40, 206, 223, 207, 6, 5, 101, 51, 90, 60, 185, 8, 85, 249, 235, 1, 43, 177, 158, 182, 97, 118, 195, 153, 62, 219, 19, 3, 190, 90, 113, 147, 178, 127, 30, 95, 239, 161, 52, 196, 36, 9, 57, 126, 80, 213, 13, 254, 119, 18, 136, 163, 109, 237, 230, 6, 202, 98, 9, 227, 63, 91, 246, 74, 39, 17, 115, 202, 108, 88, 162, 25, 219, 28, 216, 16, 65, 117, 159, 139, 33, 7, 61, 35, 175, 234, 161, 121, 64, 231, 160, 76, 238, 66, 150, 40, 211, 166, 133, 235, 165, 20, 205, 48, 67, 101, 196, 41, 169, 35, 241, 66, 112, 122, 102, 248, 59, 252, 27, 240, 197, 196, 205, 173, 156, 42, 94, 83, 220, 225, 172, 69, 209, 211, 139, 198, 110, 129, 93, 237, 237, 233, 208, 80, 123, 243, 163, 168, 71, 0, 252, 135, 160, 80, 156, 60, 125, 170, 24, 87, 42, 178, 200, 124, 174, 54, 197, 34, 27, 123, 168, 251, 152, 250, 148, 115, 24, 31, 98], 'z': 116}, 'xor_key': '>Jxbbx01x84x1bxb2x98x12+xb5xefxb1xbexd1q', 'urls': ['http://69.73.130.134/~cope36/plugins/editors/jce/main/cache/file.php|file=us.xml'], 'base_config_hexed': '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', 'salt': 'xefxcdxc9xf2', 'remote_config': {}}
Tools: [Hybrid] [MDB]

Download File