|
||
Researchers Center: Atmos Strategic Monitoring |
SPYWARE.CITADEL.ATMOSSample: fb28d2057f3b0febd14e7c34cd92c90d2f9466adSHA256: 50851a6df488dcfaf6a6050456faef3d21aa8e231a16478ff1bd8cea35bbbef0 Request: Tayuya [2016/09/19 - 00:09:05] Callback: barleyxghb.com Gate: http://barleyxghb.com/file.php|file=us.xml Decryptor logs: DEBUG:root:[*] get base config & several params DEBUG:root:[*] found base config at RVA:0x000059b0, RA:0x000059b0 DEBUG:root:[*] found login key: 3533334439323236453443314345304139383135444245423139323335414534 DEBUG:root:[*] use RC4 key at (base config + 0x00000157) DEBUG:root:[*] found following xor key for AES plus: DEBUG:root:[62, 74, 187, 1, 132, 27, 178, 152, 18, 43, 181, 239, 177, 190, 209, 113] DEBUG:root:[*] found RC4 salt: 0xF2C9CDEF DEBUG:root:[*] found xor key using after Visual Decrypt: 0xF2C9CDEF DEBUG:root:C&C found: DEBUG:root:['http://barleyxghb.com/file.php|file=us.xml'] DEBUG:root:[*] try to unpack DEBUG:root:[*] decrypt data using following key: DEBUG:root:[106, 141, 227, 161, 240, 173, 137, 104, 135, 177, 219, 87, 12, 188, 78, 70, 17, 73, 121, 152, 125, 125, 205, 97, 107, 40, 212, 81, 5, 60, 249, 132, 28, 138, 87, 58, 212, 94, 174, 201, 112, 198, 150, 16, 153, 150, 29, 157, 13, 228, 39, 110, 38, 215, 67, 106, 57, 89, 186, 230, 8, 109, 47, 72, 108, 151, 9, 38, 69, 191, 79, 237, 221, 120, 152, 234, 124, 4, 172, 71, 136, 130, 136, 11, 111, 253, 108, 91, 165, 11, 187, 96, 186, 248, 12, 238, 99, 126, 25, 128, 196, 105, 208, 6, 177, 118, 225, 62, 84, 62, 134, 226, 45, 167, 46, 247, 122, 39, 252, 251, 185, 135, 40, 56, 67, 242, 170, 207, 205, 68, 52, 122, 150, 255, 0, 180, 23, 208, 177, 190, 117, 21, 169, 35, 160, 121, 254, 135, 218, 240, 56, 19, 22, 100, 157, 186, 201, 154, 251, 94, 217, 238, 64, 160, 134, 176, 243, 183, 237, 131, 70, 1, 81, 55, 238, 114, 164, 30, 203, 176, 238, 104, 245, 170, 184, 144, 166, 204, 156, 142, 206, 219, 191, 61, 146, 127, 219, 43, 86, 145, 35, 14, 228, 141, 224, 113, 129, 42, 147, 231, 53, 65, 172, 85, 229, 229, 243, 106, 41, 14, 105, 38, 253, 33, 0, 20, 109, 86, 109, 54, 255, 41, 92, 162, 200, 171, 37, 211, 224, 164, 174, 237, 190, 52, 250, 34, 153, 67, 102, 86, 151, 131, 82, 146, 66, 199] DEBUG:root:[*] try to AES+ decryption DEBUG:root:[*] use following AES key: DEBUG:root:[111, 83, 37, 11, 232, 69, 24, 106, 226, 187, 227, 181, 115, 244, 193, 92]Report: {'login_key_hexed': '3533334439323236453443314345304139383135444245423139323335414534', 'base_key': {'y': 104, 'x': 82, 'state': [106, 240, 45, 73, 21, 238, 106, 94, 174, 87, 203, 229, 125, 231, 132, 105, 252, 161, 121, 152, 125, 12, 205, 97, 107, 40, 212, 81, 5, 60, 249, 78, 28, 138, 87, 58, 212, 94, 135, 201, 112, 198, 150, 16, 153, 150, 29, 157, 13, 228, 39, 110, 38, 215, 67, 137, 57, 89, 186, 230, 8, 109, 47, 72, 108, 151, 9, 38, 69, 191, 79, 237, 221, 120, 152, 234, 124, 4, 172, 71, 136, 130, 136, 11, 111, 253, 108, 91, 165, 11, 187, 96, 186, 248, 12, 238, 99, 126, 25, 128, 196, 70, 208, 6, 177, 118, 225, 62, 84, 62, 134, 226, 227, 167, 46, 247, 122, 39, 17, 251, 185, 135, 40, 56, 67, 242, 170, 207, 205, 68, 52, 122, 150, 255, 0, 180, 23, 208, 177, 190, 117, 141, 169, 35, 160, 121, 254, 135, 218, 240, 56, 19, 22, 100, 157, 186, 201, 154, 251, 104, 217, 238, 64, 160, 134, 176, 243, 183, 237, 131, 70, 1, 81, 55, 173, 114, 164, 30, 219, 176, 238, 104, 245, 170, 184, 144, 166, 204, 156, 142, 206, 219, 191, 61, 146, 127, 219, 43, 86, 145, 35, 14, 228, 141, 224, 113, 129, 42, 147, 188, 53, 65, 172, 85, 229, 177, 243, 106, 41, 14, 105, 38, 253, 33, 0, 20, 109, 86, 109, 54, 255, 41, 92, 162, 200, 171, 37, 211, 224, 164, 174, 237, 190, 52, 250, 34, 153, 67, 102, 86, 151, 131, 82, 146, 66, 199], 'z': 116}, 'xor_key': '>J\xbb\x01\x84\x1b\xb2\x98\x12+\xb5\xef\xb1\xbe\xd1q', 'urls': ['http://barleyxghb.com/file.php|file=us.xml'], 'base_config_hexed': '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', 'salt': '\xef\xcd\xc9\xf2', 'remote_config': {}}Tools: [Hybrid] [MDB] Download File |