|
||
Researchers Center: Atmos Strategic Monitoring |
SPYWARE.CITADEL.ATMOSSample: e9d0b948ad7514f0eea0d7121a09d957f33a7bc4SHA256: dc20f922e474978629e3c3329aee00f067c78c0183f30ed0920492a2900e0881 Request: Tayuya [2017/10/27 - 22:10:42] Callback: mineronline.ru Gate: http://mineronline.ru/qM3WyQeiGFfJ/file.php|file=usa.xml Decryptor logs: DEBUG:root:[*] get base config & several params DEBUG:root:[*] found base config at RVA:0x000059b0, RA:0x000059b0 DEBUG:root:[*] found login key: 3533334439323236453443314345304139383135444245423139323335414534 DEBUG:root:[*] use RC4 key at (base config + 0x00000157) DEBUG:root:[*] found following xor key for AES plus: DEBUG:root:[62, 74, 187, 1, 132, 27, 178, 152, 18, 43, 181, 239, 177, 190, 209, 113] DEBUG:root:[*] found RC4 salt: 0xF2C9CDEF DEBUG:root:[*] found xor key using after Visual Decrypt: 0xF2C9CDEF DEBUG:root:C&C found: DEBUG:root:['http://193.0.178.27/qM3WyQeiGFfJ/file.php|file=usa.xml', 'http://mineronline.ru/qM3WyQeiGFfJ/file.php|file=usa.xml'] DEBUG:root:[*] try to unpack DEBUG:root:[*] decrypt data using following key: DEBUG:root:[106, 109, 54, 98, 51, 64, 4, 184, 159, 250, 211, 45, 147, 148, 151, 86, 8, 179, 40, 152, 208, 110, 42, 233, 103, 47, 10, 153, 11, 200, 84, 192, 81, 220, 39, 118, 42, 33, 89, 114, 53, 40, 123, 60, 60, 205, 9, 80, 129, 84, 71, 164, 1, 147, 207, 76, 160, 0, 163, 138, 137, 106, 95, 175, 245, 127, 94, 222, 249, 133, 69, 57, 155, 126, 132, 228, 149, 187, 104, 68, 227, 3, 182, 146, 205, 34, 138, 61, 7, 101, 179, 211, 71, 199, 92, 242, 100, 43, 135, 35, 2, 159, 225, 210, 58, 44, 108, 53, 228, 137, 97, 43, 127, 243, 30, 201, 171, 230, 37, 105, 108, 91, 115, 193, 117, 131, 105, 227, 135, 68, 218, 95, 218, 166, 129, 18, 43, 75, 61, 21, 65, 74, 202, 157, 5, 209, 3, 65, 142, 42, 126, 171, 57, 231, 168, 87, 154, 143, 87, 26, 118, 229, 107, 15, 215, 248, 158, 252, 204, 81, 213, 69, 10, 121, 23, 132, 85, 197, 226, 255, 84, 185, 190, 163, 32, 192, 160, 120, 9, 161, 164, 162, 80, 252, 70, 123, 3, 193, 11, 71, 86, 194, 195, 58, 235, 145, 233, 196, 222, 113, 66, 19, 78, 175, 246, 9, 189, 37, 244, 106, 138, 119, 52, 31, 47, 221, 189, 213, 209, 242, 128, 97, 72, 222, 73, 135, 175, 253, 228, 55, 230, 211, 122, 54, 254, 19, 154, 189, 88, 80, 149, 209, 173, 213, 204, 199] DEBUG:root:[*] try to AES+ decryption DEBUG:root:[*] use following AES key: DEBUG:root:[181, 199, 134, 181, 129, 162, 16, 95, 142, 103, 153, 8, 119, 201, 205, 180]Report: {'login_key_hexed': '3533334439323236453443314345304139383135444245423139323335414534', 'base_key': {'y': 104, 'x': 82, 'state': [106, 137, 15, 86, 160, 168, 87, 138, 19, 55, 70, 8, 218, 42, 121, 64, 250, 179, 40, 152, 208, 110, 148, 233, 103, 47, 10, 153, 11, 200, 84, 192, 81, 220, 39, 118, 42, 33, 89, 114, 53, 40, 123, 60, 60, 205, 9, 80, 129, 84, 71, 164, 1, 147, 207, 76, 51, 0, 163, 138, 137, 106, 95, 175, 245, 127, 94, 222, 249, 133, 69, 57, 155, 126, 132, 228, 149, 187, 104, 68, 227, 3, 182, 146, 205, 34, 184, 61, 7, 101, 179, 211, 71, 199, 92, 242, 100, 43, 135, 35, 2, 159, 225, 210, 58, 44, 108, 53, 228, 109, 97, 43, 127, 243, 30, 201, 171, 230, 37, 105, 108, 91, 115, 193, 117, 131, 105, 227, 135, 68, 147, 95, 218, 166, 129, 18, 43, 75, 61, 21, 65, 74, 202, 157, 5, 209, 3, 65, 142, 42, 126, 171, 57, 231, 98, 87, 154, 143, 4, 26, 118, 229, 107, 54, 215, 248, 158, 252, 204, 81, 213, 69, 10, 151, 23, 132, 85, 197, 226, 255, 84, 185, 190, 163, 32, 192, 160, 120, 9, 161, 164, 162, 80, 252, 211, 123, 3, 193, 11, 71, 86, 194, 195, 58, 235, 145, 233, 196, 222, 113, 66, 19, 78, 175, 246, 9, 189, 37, 244, 106, 138, 119, 52, 31, 47, 221, 189, 213, 209, 242, 128, 97, 72, 222, 73, 135, 175, 253, 228, 45, 230, 211, 122, 54, 254, 159, 154, 189, 88, 80, 149, 209, 173, 213, 204, 199], 'z': 116}, 'xor_key': '>Jxbbx01x84x1bxb2x98x12+xb5xefxb1xbexd1q', 'urls': ['http://193.0.178.27/qM3WyQeiGFfJ/file.php|file=usa.xml', 'http://mineronline.ru/qM3WyQeiGFfJ/file.php|file=usa.xml'], 'base_config_hexed': '1779e613a165c3d68a57206525ea7d55876e33a28be1a245191b8b04a748bb8eff9beac74341e2612f94e4ac9f9247af518d6277eb23acaf407122687474703a2f2f6d696e65726f6e6c696e652e72752f714d3357795165694746664a2f66696c652e7068707c66696c653d7573612e786d6c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005e728f5a04913d73939b38700e17421edc5e99d5cb971a0654e6ac1421e1dc6504000100eae533b948ea08d27439de457f30ed7802972f8f5fd2c340495b90e387702ac9f409f9cfcb0d983321c57ba6b391d5a2e2dab8fdfc477ebfbd346931166086363c000000a46eb0391ea46269ffe917fb7449fd78b4ada7368552b074017aa1a6050002005c731a8c72bcdbb7eca07c2cbfcc46270d6d0450a79facd7d12842c24566fa867a869dd525f72db8011eccddcb4cda6a6d3662334004b89ffad32d9394975608b32898d06e2ae9672f0a990bc854c051dc27762a21597235287b3c3ccd0950815447a40193cf4ca000a38a896a5faff57f5edef98545399b7e84e495bb6844e303b692cd228a3d0765b3d347c75cf2642b8723029fe1d23a2c6c35e489612b7ff31ec9abe625696c5b73c1758369e38744da5fdaa681122b4b3d15414aca9d05d103418e2a7eab39e7a8579a8f571a76e56b0fd7f89efccc51d5450a79178455c5e2ff54b9bea320c0a07809a1a4a250fc467b03c10b4756c2c33aeb91e9c4de7142134eaff609bd25f46a8a77341f2fddbdd5d1f2806148de4987affde437e6d37a36fe139abd585095d1add5ccc752687474703a2f2f3139332e302e3137382e32372f714d3357795165694746664a2f66696c652e7068707c66696c653d7573612e786d6c007a59313e8cafcdcfe8b2c911bd9ffad8a189b865e159da891514e20ef85c7452773a0d35081af1353d1765d899791f4ba27cfb483754ef3c246d41aaf4f7f7ca07a29077e4a6f148cf07a2fc9f173a1bca3c18dac2f3543f8415f5876d5a65c5501b22cbc75cb54dc609e84476803491400200000040f2da5c94676d0c8ba4897d2c2bfa5942268f4aa69f79c6760061006c006900640020006e006500770000005e13cd43632a5581642f6339d4618fb895a379260374f7163321735b7c398e1d3742092dc4aae696ce01ca75cf65a60ad63d960e882a0a47643a235b4c5f60e2412079be6f8f8baf697b7622010002008bb94b72dab7d4928cb0fc200bf71b280416e49f6bbf8cf5bf062fe98fce6fa13d815efa02059e1d32000000c1e9081a078a1178c024318f570bbc726404b03773fc974d07faaf10de53499b771d6fddd2e5c9f077a5c2a5b9f0e6643c708e33b592c014f180519419504ca1347a989ced90d4af962986616e1f75671ffa53bd8bab9ff6c87ecad14f58000000eaca7de1f1fa5e289ac6e9fdfe3125168a45ff7eaffe9c95db63ee59a9f685e3554ea8347203a532dfca65eef7e1432808ae1e1506a3ad608164136ed52cb4e6a16d4603000100bee0dafeca704f6c5e5cd445d91956d22f57156a3236034010b76c7f1d70dc99d3853edb17d34146be00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005a4a42af56c8b0ee4638e214de8bd3c2917b25a1b21f6699dabd934489dfdaa210a9a40eae69d370f97048b57f21a97cae47', 'salt': 'xefxcdxc9xf2', 'remote_config': {}}Tools: [Hybrid] [MDB] Download File |