Resubmissions

28-10-2020 16:00

201028-svr7gh1tgj 10

28-10-2020 15:42

201028-38rr17b1an 10

General

  • Target

    asdf.rtf

  • Size

    2.3MB

  • Sample

    201028-svr7gh1tgj

  • MD5

    c99321eebd53d1881ced20ddd1dbfda0

  • SHA1

    db66a0c3cd32f56f68f9386cf017e39cce3dbe60

  • SHA256

    88c9417d5fc9539878eff56ea8d6105711a383a15a1dc54b6918016f25880120

  • SHA512

    2b3d20fc907302b9ea7bd893f684a12739ffd67586a649ebcff0a39619374fe0bb90ccb6cb055e1788c950ef58dc7547454cd1ad348a483b8400ab86509161bb

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

httPs://paste.ee/r/DUMRL

ps1.dropper

httPs://paste.ee/r/wWuSK

Extracted

Family

smokeloader

Version

2020

C2

https://www.bristell.com/files/index.php

rc4.i32
rc4.i32

Targets

    • Target

      asdf.rtf

    • Size

      2.3MB

    • MD5

      c99321eebd53d1881ced20ddd1dbfda0

    • SHA1

      db66a0c3cd32f56f68f9386cf017e39cce3dbe60

    • SHA256

      88c9417d5fc9539878eff56ea8d6105711a383a15a1dc54b6918016f25880120

    • SHA512

      2b3d20fc907302b9ea7bd893f684a12739ffd67586a649ebcff0a39619374fe0bb90ccb6cb055e1788c950ef58dc7547454cd1ad348a483b8400ab86509161bb

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks