General

  • Target

    478f10e0783a32a7a31258ec48752661.rtf

  • Size

    1.3MB

  • Sample

    201211-8nevq1wmyx

  • MD5

    478f10e0783a32a7a31258ec48752661

  • SHA1

    fa243c063ffeee90057a8eb0427adaa018f96280

  • SHA256

    34ddcf76eaab0ce9d00cc121ada77e5c2b8ad4a89475a20839ab2f7971d1ca80

  • SHA512

    7cac616bf90df54e6d0656f6919996c94995184c9ef681c8c692e6ed120a84254e41f2154bf1fec4571cc51a6f54c7f67db13e807f8c80eaa6b53bfdc7ab4fae

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://perkyplay.com/z/

rc4.i32
rc4.i32

Targets

    • Target

      478f10e0783a32a7a31258ec48752661.rtf

    • Size

      1.3MB

    • MD5

      478f10e0783a32a7a31258ec48752661

    • SHA1

      fa243c063ffeee90057a8eb0427adaa018f96280

    • SHA256

      34ddcf76eaab0ce9d00cc121ada77e5c2b8ad4a89475a20839ab2f7971d1ca80

    • SHA512

      7cac616bf90df54e6d0656f6919996c94995184c9ef681c8c692e6ed120a84254e41f2154bf1fec4571cc51a6f54c7f67db13e807f8c80eaa6b53bfdc7ab4fae

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks