Researchers Center: Atmos Strategic Monitoring


SPYWARE.CITADEL.ATMOS

Sample: 083e0ee420083f553518a5c87ae90259b5f0c760
SHA256: 2fbe9cdc3aeeb4e9b3ec35ee0bd849909bb16a5805226824249271316d36ccd2
Request: Tayuya [2016/12/11 - 16:12:48]
Callback: avakfi.ml
Gate: http://avakfi.ml/webadmin/file.php|file=usagold.xml
Decryptor logs:
DEBUG:root:[*] get base config & several params
DEBUG:root:[*] found base config at RVA:0x000059b0, RA:0x000059b0
DEBUG:root:[*] found login key: 3533334439323236453443314345304139383135444245423139323335414534
DEBUG:root:[*] use RC4 key at (base config + 0x00000157)
DEBUG:root:[*] found following xor key for AES plus:
DEBUG:root:[62, 74, 187, 1, 132, 27, 178, 152, 18, 43, 181, 239, 177, 190, 209, 113]
DEBUG:root:[*] found RC4 salt: 0xF2C9CDEF
DEBUG:root:[*] found xor key using after Visual Decrypt: 0xF2C9CDEF
DEBUG:root:C&C found:
DEBUG:root:['http://avakfi.ml/webadmin/file.php|file=usagold.xml']
DEBUG:root:[*] try to unpack
DEBUG:root:[*] decrypt data using following key:
DEBUG:root:[53, 138, 37, 156, 214, 100, 164, 64, 69, 246, 180, 114, 47, 22, 160, 83, 42, 170, 167, 55, 185, 193, 3, 62, 44, 57, 60, 22, 9, 145, 236, 91, 213, 45, 72, 77, 231, 197, 34, 45, 27, 171, 23, 205, 186, 218, 24, 135, 32, 188, 196, 113, 66, 83, 80, 110, 243, 47, 75, 224, 166, 6, 125, 136, 118, 161, 82, 109, 1, 49, 132, 37, 202, 214, 169, 171, 136, 29, 42, 170, 20, 35, 51, 42, 194, 109, 139, 60, 137, 239, 31, 222, 30, 147, 126, 4, 103, 232, 137, 104, 26, 110, 85, 34, 158, 174, 15, 116, 197, 23, 173, 207, 90, 65, 102, 26, 249, 107, 135, 29, 117, 69, 40, 229, 226, 126, 171, 227, 183, 237, 215, 23, 160, 38, 234, 125, 127, 137, 178, 185, 61, 127, 94, 198, 221, 156, 55, 150, 211, 131, 107, 195, 107, 224, 49, 173, 241, 159, 127, 50, 169, 88, 35, 38, 129, 198, 101, 234, 162, 154, 181, 209, 110, 72, 232, 140, 88, 221, 194, 177, 222, 244, 195, 204, 219, 215, 69, 48, 238, 136, 91, 82, 112, 250, 174, 194, 132, 230, 65, 94, 128, 186, 244, 147, 38, 13, 157, 5, 224, 167, 8, 2, 147, 48, 33, 71, 201, 203, 32, 161, 8, 32, 226, 218, 233, 15, 25, 59, 216, 76, 58, 35, 95, 211, 145, 95, 208, 194, 203, 184, 235, 253, 228, 179, 165, 225, 14, 43, 71, 177, 67, 151, 152, 155, 124, 128]
DEBUG:root:[*] try to AES+ decryption
DEBUG:root:[*] use following AES key:
DEBUG:root:[137, 159, 200, 13, 216, 219, 133, 103, 199, 78, 190, 140, 147, 39, 43, 162]
Report:
{'login_key_hexed': '3533334439323236453443314345304139383135444245423139323335414534', 'base_key': {'y': 104, 'x': 82, 'state': [53, 178, 140, 171, 45, 38, 171, 174, 232, 129, 137, 244, 177, 83, 37, 230, 184, 170, 167, 55, 185, 193, 3, 62, 44, 57, 60, 22, 9, 145, 236, 91, 213, 214, 72, 77, 231, 197, 34, 45, 27, 164, 23, 205, 186, 218, 24, 135, 32, 188, 196, 113, 66, 83, 80, 110, 243, 47, 75, 224, 166, 6, 125, 136, 118, 161, 82, 109, 1, 49, 132, 37, 202, 214, 169, 156, 136, 29, 42, 170, 20, 35, 51, 42, 194, 109, 139, 60, 180, 239, 31, 222, 30, 147, 126, 4, 103, 232, 137, 104, 26, 110, 85, 34, 158, 64, 15, 116, 197, 23, 173, 207, 90, 65, 102, 26, 249, 107, 135, 29, 117, 69, 40, 229, 226, 126, 171, 227, 183, 237, 215, 23, 160, 100, 234, 125, 127, 137, 138, 185, 61, 127, 94, 198, 221, 156, 55, 150, 211, 131, 107, 195, 107, 224, 49, 173, 241, 159, 127, 50, 169, 88, 35, 38, 246, 198, 101, 234, 162, 154, 181, 209, 110, 72, 69, 160, 88, 221, 194, 177, 222, 244, 195, 204, 219, 215, 69, 48, 238, 136, 91, 82, 112, 250, 174, 194, 132, 22, 65, 94, 128, 186, 114, 147, 38, 13, 157, 5, 224, 167, 8, 2, 147, 48, 33, 71, 201, 203, 32, 161, 8, 32, 226, 218, 233, 15, 25, 59, 216, 76, 58, 35, 95, 211, 145, 95, 208, 194, 203, 42, 235, 253, 228, 179, 165, 225, 14, 43, 71, 47, 67, 151, 152, 155, 124, 128], 'z': 116}, 'xor_key': '>Jxbbx01x84x1bxb2x98x12+xb5xefxb1xbexd1q', 'urls': ['http://avakfi.ml/webadmin/file.php|file=usagold.xml'], 'base_config_hexed': '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', 'salt': 'xefxcdxc9xf2', 'remote_config': {}}
Tools: [Hybrid] [MDB]

Download File