|
||
Researchers Center: Atmos Strategic Monitoring |
SPYWARE.CITADEL.ATMOSSample: dbc25b268a068cc9676abd397325dc65587d568cSHA256: edd8ee629a3a57850a4cb78eda37ca19c8606bdabf70d62674b5920d647007ae Request: Tayuya [2017/06/26 - 10:06:27] Callback: kiwi123kiwi.work Gate: http://kiwi123kiwi.work/panel3/file.php|file=usagold.xml Decryptor logs: DEBUG:root:[*] get base config & several params DEBUG:root:[*] found base config at RVA:0x000059b0, RA:0x000059b0 DEBUG:root:[*] found login key: 3533334439323236453443314345304139383135444245423139323335414534 DEBUG:root:[*] use RC4 key at (base config + 0x00000157) DEBUG:root:[*] found following xor key for AES plus: DEBUG:root:[62, 74, 187, 1, 132, 27, 178, 152, 18, 43, 181, 239, 177, 190, 209, 113] DEBUG:root:[*] found RC4 salt: 0xF2C9CDEF DEBUG:root:[*] found xor key using after Visual Decrypt: 0xF2C9CDEF DEBUG:root:C&C found: DEBUG:root:['http://kiwi123kiwi.work/panel3/file.php|file=usagold.xml'] DEBUG:root:[*] try to unpack DEBUG:root:[*] decrypt data using following key: DEBUG:root:[53, 224, 84, 220, 11, 152, 131, 92, 127, 130, 157, 213, 83, 136, 19, 31, 20, 170, 179, 0, 241, 156, 59, 202, 235, 206, 29, 212, 59, 140, 43, 44, 213, 6, 183, 128, 54, 180, 78, 105, 132, 179, 8, 145, 106, 204, 252, 172, 238, 234, 110, 119, 154, 175, 165, 82, 222, 171, 91, 81, 43, 56, 7, 240, 244, 155, 35, 26, 85, 167, 194, 210, 231, 160, 63, 242, 5, 39, 20, 206, 223, 153, 27, 179, 202, 137, 83, 232, 199, 27, 208, 138, 14, 131, 38, 125, 206, 19, 196, 30, 151, 221, 135, 66, 21, 161, 120, 61, 93, 48, 132, 216, 60, 133, 248, 170, 248, 185, 69, 103, 170, 213, 182, 83, 205, 211, 222, 50, 78, 164, 122, 121, 46, 63, 111, 190, 229, 58, 58, 78, 252, 38, 68, 225, 112, 22, 96, 135, 135, 207, 30, 57, 246, 91, 154, 239, 66, 222, 102, 89, 82, 98, 139, 71, 108, 84, 3, 20, 161, 141, 119, 17, 215, 50, 155, 146, 167, 73, 164, 193, 155, 13, 28, 76, 7, 101, 231, 150, 227, 32, 199, 131, 42, 192, 11, 136, 166, 244, 60, 14, 87, 15, 57, 215, 70, 127, 32, 156, 191, 45, 101, 63, 186, 90, 226, 144, 80, 245, 128, 168, 176, 219, 49, 159, 143, 241, 100, 153, 178, 18, 191, 69, 150, 200, 232, 53, 68, 144, 188, 199, 103, 31, 230, 94, 196, 199, 146, 248, 180, 67, 136, 9, 55, 113, 237, 178] DEBUG:root:[*] try to AES+ decryption DEBUG:root:[*] use following AES key: DEBUG:root:[247, 254, 138, 57, 73, 245, 173, 14, 93, 6, 245, 120, 198, 68, 214, 77]Report: {'login_key_hexed': '3533334439323236453443314345304139383135444245423139323335414534', 'base_key': {'y': 104, 'x': 82, 'state': [53, 143, 154, 20, 212, 213, 165, 96, 170, 135, 238, 193, 199, 224, 94, 179, 188, 127, 31, 0, 241, 156, 59, 202, 235, 206, 29, 11, 59, 140, 43, 44, 213, 6, 183, 128, 54, 180, 78, 105, 132, 179, 8, 145, 106, 204, 252, 172, 157, 234, 110, 119, 84, 175, 131, 82, 222, 171, 91, 81, 43, 56, 7, 240, 244, 155, 35, 26, 85, 167, 194, 210, 231, 160, 63, 242, 5, 39, 20, 206, 223, 153, 27, 179, 202, 137, 83, 232, 83, 27, 208, 138, 14, 131, 38, 125, 206, 19, 196, 30, 151, 221, 135, 66, 21, 161, 120, 61, 93, 48, 132, 216, 60, 133, 248, 170, 248, 185, 69, 103, 170, 213, 182, 83, 205, 211, 222, 50, 78, 164, 122, 121, 46, 63, 111, 190, 229, 58, 58, 78, 252, 38, 68, 225, 112, 22, 92, 130, 135, 207, 30, 57, 246, 91, 154, 239, 66, 222, 102, 89, 82, 98, 139, 71, 108, 84, 3, 20, 161, 141, 119, 17, 215, 50, 155, 146, 167, 73, 164, 152, 155, 13, 28, 76, 7, 101, 231, 150, 227, 32, 199, 131, 42, 192, 11, 136, 166, 244, 60, 14, 87, 15, 57, 215, 70, 127, 32, 156, 191, 45, 101, 63, 186, 90, 226, 144, 80, 245, 128, 168, 176, 219, 49, 159, 136, 241, 100, 153, 178, 18, 191, 69, 150, 200, 232, 53, 68, 144, 220, 199, 103, 31, 230, 19, 196, 199, 146, 248, 180, 67, 136, 9, 55, 113, 237, 178], 'z': 116}, 'xor_key': '>Jxbbx01x84x1bxb2x98x12+xb5xefxb1xbexd1q', 'urls': ['http://kiwi123kiwi.work/panel3/file.php|file=usagold.xml'], 'base_config_hexed': '1779e613a165c3d68a57206525ea7d55876e33a28be1a245191b8b04a748bb8eff9beac74341e2612f94e4ac9f9247af518d6277eb23acaf407122687474703a2f2f6b6977693132336b6977692e776f726b2f70616e656c332f66696c652e7068707c66696c653d757361676f6c642e786d6c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005e728f5a04913d73939b38700e17421edc5e99d5cb971a0654e6ac1421e1dc6504000100eae533b948ea08d27439de457f30ed7802972f8f5fd2c340495b90e387702ac9f409f9cfcb0d983321c57ba6b391d5a2e2dab8fdfc477ebfbd346931166086363c000000a46eb0391ea46269ffe917fb7449fd78b4ada7368552b074017aa1a6090004005c731a8c72bcdbb7eca07c2cbfcc46270d6d0450a79facd7d12842c24566fa867a869dd525f72db8011eccddcb4cda35e054dc0b98835c7f829dd55388131f14aab300f19c3bcaebce1dd43b8c2b2cd506b78036b44e6984b308916accfcaceeea6e779aafa552deab5b512b3807f0f49b231a55a7c2d2e7a03ff2052714cedf991bb3ca8953e8c71bd08a0e83267dce13c41e97dd874215a1783d5d3084d83c85f8aaf8b94567aad5b653cdd3de324ea47a792e3f6fbee53a3a4efc2644e17016608787cf1e39f65b9aef42de665952628b476c540314a18d7711d7329b92a749a4c19b0d1c4c0765e796e320c7832ac00b88a6f43c0e570f39d7467f209cbf2d653fba5ae29050f580a8b0db319f8ff16499b212bf4596c8e8354490bcc7671fe65ec4c792f8b44388093771edb252687474703a2f2f6b6977693132336b6977692e776f726b2f70616e656c332f66696c652e7068707c66696c653d757361676f6c642e786d6c00313e8cafcdcfe8b2c911bd9ffad8a189b865e159da891514e20ef85c7452773a0d35081af1353d1765d899791f4ba27cfb483754ef3c246d41aaf4f7f7ca07a29077e4a6f148cf07a2fc9f173a1bca3c18dac2f3543f8415f5876d5a65c5501b22cbc75cb54dc609e84476803491400800000040f2da5c94676d0c8ba4897d2c2bfa5942268f4aa69f79c67500730063006100000055d470fe2379949e5eb45e13cd43632a5581642f6339d4618fb895a379260374f7163321735b7c398e1d3742092dc4aae696ce01ca75cf65a60ad63d960e882a0a47643a235b4c5f60e2412079be6f8f8baf697b7622080004008bb94b72dab7d4928cb0fc200bf71b280416e49f6bbf8cf5bf062fe98fce6fa13d815efa02059e1d32000000c1e9081a078a1178c024318f570bbc726404b03773fc974d07faaf10de53499b771d6fddd2e5c9f077a5c2a5b9f0e6643c708e33b592c014f180519419504ca1347a989ced90d4af962986616e1f75671ffa53bd8bab9ff6c87ecad14b18040400eaca7de1f1fa5e289ac6e9fdfe3125168a45ff7eaffe9c95db63ee59a9f685e3554ea8347203a532dfca65eef7e1432808ae1e1506a3ad608164136ed52cb4e6a16d4606000300bee0dafeca704f6c5e5cd445d91956d22f57156a3236034010b76c7f1d70dc99d3853edb17d34146be687474703a2f2f6b6977693132336b6977692e776f726b2f70616e656c332f66696c652e7068707c66696c653d757361676f6c642e786d6c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005a4a42af56c8b0ee4638e214de8bd3c2917b25a1b21f6699dabd934489dfdaa210a9a40eae69d370f97048b57f21a97cae47', 'salt': 'xefxcdxc9xf2', 'remote_config': {}}Tools: [Hybrid] [MDB] Download File |