|
||
Researchers Center: Atmos Strategic Monitoring |
SPYWARE.CITADEL.ATMOSSample: fbc0eca3b4400524c58544a9909e76624ba0537aSHA256: 8cf26ac6cfcafd5c0fbaeee60f6ddcbec440b9536bcaf05574269395f0c9569f Request: Tayuya [2017/10/07 - 15:10:02] Callback: 193.0.178.18 Gate: http://193.0.178.18/dEFyp4sJPZfp/file.php|file=usa.xml Decryptor logs: DEBUG:root:[*] get base config & several params DEBUG:root:[*] found base config at RVA:0x000059b0, RA:0x000059b0 DEBUG:root:[*] found login key: 3533334439323236453443314345304139383135444245423139323335414534 DEBUG:root:[*] use RC4 key at (base config + 0x00000157) DEBUG:root:[*] found following xor key for AES plus: DEBUG:root:[62, 74, 187, 1, 132, 27, 178, 152, 18, 43, 181, 239, 177, 190, 209, 113] DEBUG:root:[*] found RC4 salt: 0xF2C9CDEF DEBUG:root:[*] found xor key using after Visual Decrypt: 0xF2C9CDEF DEBUG:root:C&C found: DEBUG:root:['http://193.0.178.18/dEFyp4sJPZfp/file.php|file=usa.xml', 'http://resvshop.ru/dEFyp4sJPZfp/file.php|file=usa.xml'] DEBUG:root:[*] try to unpack DEBUG:root:[*] decrypt data using following key: DEBUG:root:[116, 125, 29, 101, 218, 44, 127, 175, 108, 242, 245, 133, 204, 203, 77, 87, 51, 4, 220, 188, 140, 144, 175, 43, 174, 86, 106, 24, 110, 66, 107, 2, 49, 187, 40, 153, 65, 146, 51, 60, 150, 101, 233, 89, 47, 13, 22, 231, 0, 169, 207, 241, 24, 159, 117, 135, 185, 236, 10, 113, 192, 115, 210, 98, 50, 7, 243, 206, 182, 205, 12, 239, 8, 189, 217, 152, 28, 224, 35, 204, 201, 161, 97, 53, 232, 87, 73, 65, 78, 37, 123, 97, 43, 43, 76, 168, 152, 247, 144, 240, 223, 214, 221, 95, 230, 54, 21, 193, 159, 119, 130, 159, 60, 107, 176, 180, 217, 180, 198, 228, 124, 237, 219, 46, 242, 138, 179, 104, 252, 239, 28, 83, 135, 12, 120, 130, 142, 23, 38, 50, 243, 56, 63, 16, 2, 49, 236, 195, 231, 153, 49, 124, 118, 199, 33, 230, 254, 171, 153, 196, 87, 184, 181, 77, 183, 11, 46, 56, 248, 157, 158, 219, 38, 249, 232, 64, 103, 73, 37, 47, 147, 143, 157, 112, 17, 79, 47, 209, 160, 232, 166, 0, 40, 174, 64, 172, 247, 62, 72, 247, 75, 22, 193, 157, 6, 198, 82, 40, 90, 215, 131, 154, 105, 33, 25, 108, 23, 219, 248, 28, 194, 63, 23, 170, 238, 121, 57, 210, 214, 154, 155, 250, 176, 59, 124, 123, 167, 92, 39, 186, 112, 140, 52, 116, 35, 220, 70, 12, 172, 128, 121, 177, 7, 252, 187, 67] DEBUG:root:[*] try to AES+ decryption DEBUG:root:[*] use following AES key: DEBUG:root:[128, 144, 21, 41, 28, 246, 25, 189, 67, 63, 147, 220, 47, 48, 67, 138]Report: {'login_key_hexed': '3533334439323236453443314345304139383135444245423139323335414534', 'base_key': {'y': 104, 'x': 82, 'state': [116, 138, 33, 67, 219, 44, 135, 241, 196, 49, 120, 133, 108, 181, 186, 12, 237, 4, 220, 188, 140, 144, 175, 43, 174, 86, 106, 24, 110, 66, 107, 2, 49, 187, 40, 153, 65, 146, 51, 60, 150, 101, 233, 89, 47, 13, 22, 231, 0, 169, 207, 175, 24, 159, 117, 135, 185, 236, 10, 113, 192, 115, 210, 98, 50, 7, 243, 206, 182, 205, 87, 239, 8, 189, 217, 152, 28, 224, 35, 204, 201, 161, 97, 53, 232, 87, 73, 65, 78, 37, 123, 97, 43, 43, 76, 168, 152, 247, 144, 240, 223, 214, 221, 95, 230, 54, 21, 193, 159, 119, 130, 159, 60, 107, 176, 180, 217, 180, 198, 228, 124, 51, 219, 46, 242, 125, 179, 104, 252, 239, 28, 83, 127, 12, 245, 130, 142, 23, 38, 50, 243, 56, 63, 16, 2, 242, 236, 195, 231, 153, 49, 124, 118, 199, 29, 230, 254, 171, 153, 108, 87, 184, 203, 77, 183, 11, 46, 56, 248, 157, 158, 219, 38, 249, 232, 64, 103, 73, 37, 47, 147, 143, 157, 112, 17, 79, 47, 209, 160, 232, 166, 0, 40, 174, 64, 172, 247, 62, 72, 247, 75, 22, 193, 157, 6, 198, 82, 40, 90, 215, 131, 154, 105, 33, 25, 204, 23, 218, 248, 28, 194, 63, 23, 170, 238, 121, 57, 210, 214, 154, 155, 250, 176, 59, 124, 123, 167, 92, 39, 77, 112, 140, 52, 116, 35, 220, 70, 12, 172, 128, 121, 177, 7, 252, 187, 101], 'z': 116}, 'xor_key': '>Jxbbx01x84x1bxb2x98x12+xb5xefxb1xbexd1q', 'urls': ['http://193.0.178.18/dEFyp4sJPZfp/file.php|file=usa.xml', 'http://resvshop.ru/dEFyp4sJPZfp/file.php|file=usa.xml'], 'base_config_hexed': '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', 'salt': 'xefxcdxc9xf2', 'remote_config': {}}Tools: [Hybrid] [MDB] Download File |