General

  • Target

    Proforma Invoice.doc

  • Size

    1.1MB

  • Sample

    201220-xnjw6gb2en

  • MD5

    1e1396f3c19ca0da565796765dfdc86e

  • SHA1

    f88aec3c6a465ffa3f02a7310f6e68961412306f

  • SHA256

    32cdde71950a516a92c69589e51435fee3478d90dd715a9c624aa140d81fd8c6

  • SHA512

    e117a7ba4759973f1c97d6b9ec8fffbb56065518e69f0999441794280693a7d3904ba5139af51a95cd9d9fff2a0274f1c1763405b832e0ff2a5ee9ec6379b0e2

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

httPs://paste.ee/r/Mjoao

ps1.dropper

httPs://paste.ee/r/w1KCp

Extracted

Family

smokeloader

Version

2018

C2

http://vipengland.com/2/

rc4.i32
rc4.i32

Targets

    • Target

      Proforma Invoice.doc

    • Size

      1.1MB

    • MD5

      1e1396f3c19ca0da565796765dfdc86e

    • SHA1

      f88aec3c6a465ffa3f02a7310f6e68961412306f

    • SHA256

      32cdde71950a516a92c69589e51435fee3478d90dd715a9c624aa140d81fd8c6

    • SHA512

      e117a7ba4759973f1c97d6b9ec8fffbb56065518e69f0999441794280693a7d3904ba5139af51a95cd9d9fff2a0274f1c1763405b832e0ff2a5ee9ec6379b0e2

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks