General

  • Target

    wJireyEV.tmp.exe

  • Size

    322KB

  • Sample

    201005-behq52tths

  • MD5

    573b56ffd42efd390404133286ad691d

  • SHA1

    218f00d9ce955f2f196a93ae92a1588f6f1c1b36

  • SHA256

    19bcb38fae9b117b3e440f076fe7a7ebf169581dd89e3c5b8614f356ee2c4277

  • SHA512

    c054573268a4bcbf0a18a1d236250a66f07ba7e0f6b378e5ae3bfc2aa3e38211d99fd837b586af08dc052e10b64e1c1d984d5c4683dbff9014e7315aad352328

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://etasuklavish.today/

http://mragyzmachnobesdi.today/

http://kimchinikuzims.today/

http://slacvostinrius.today/

http://straponuliusyn.today/

http://grammmdinss.today/

http://viprasputinsd.chimkent.su/

http://lupadypa.dagestan.su/

http://stoknolimchin.exnet.su/

http://musaroprovadnikov.live/

http://teemforyourexprensiti.life/

http://stolkgolmishutich.termez.su/

http://roompampamgandish.wtf/

rc4.i32
rc4.i32

Targets

    • Target

      wJireyEV.tmp.exe

    • Size

      322KB

    • MD5

      573b56ffd42efd390404133286ad691d

    • SHA1

      218f00d9ce955f2f196a93ae92a1588f6f1c1b36

    • SHA256

      19bcb38fae9b117b3e440f076fe7a7ebf169581dd89e3c5b8614f356ee2c4277

    • SHA512

      c054573268a4bcbf0a18a1d236250a66f07ba7e0f6b378e5ae3bfc2aa3e38211d99fd837b586af08dc052e10b64e1c1d984d5c4683dbff9014e7315aad352328

    • Gozi, Gozi IFSB

      Gozi ISFB is a well-known and widely distributed banking trojan.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Ursnif, Dreambot

      Ursnif is a variant of the Gozi IFSB with more capabilities.

    • ServiceHost packer

      Detects ServiceHost packer used for .NET malware

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks