General

  • Target

    d4b38146bb30533379ac134c0692e189.exe

  • Size

    32KB

  • Sample

    201222-bxt95dlq8e

  • MD5

    d4b38146bb30533379ac134c0692e189

  • SHA1

    1423d6f517428d4dfe7234d13027b376db986f3a

  • SHA256

    dc4c9f2bffdc31b6a52d258b3baa883a7c674c99782e37cf1a2b53dbf22e98ae

  • SHA512

    a93202ec3326cf1227bac948833172cc9c3f969eda09742f328f974c9b076805bc69eacc872388d3d1deda35de9cc3478e69e1c4981edc2f87ef160eb8999379

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://102water.com/1/

rc4.i32
rc4.i32

Targets

    • Target

      d4b38146bb30533379ac134c0692e189.exe

    • Size

      32KB

    • MD5

      d4b38146bb30533379ac134c0692e189

    • SHA1

      1423d6f517428d4dfe7234d13027b376db986f3a

    • SHA256

      dc4c9f2bffdc31b6a52d258b3baa883a7c674c99782e37cf1a2b53dbf22e98ae

    • SHA512

      a93202ec3326cf1227bac948833172cc9c3f969eda09742f328f974c9b076805bc69eacc872388d3d1deda35de9cc3478e69e1c4981edc2f87ef160eb8999379

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks