General

  • Target

    6ca375ce8d7caafb814fb3455edfafd8.exe

  • Size

    154KB

  • Sample

    201228-jj55g5plzs

  • MD5

    6ca375ce8d7caafb814fb3455edfafd8

  • SHA1

    38dbc1e721dadcf695c4f2e0ec1c7c1a1dea31bf

  • SHA256

    0969327fda05101320538ec7c3df4ca3a024fdffc9ff58bcf5570a0960bd9df7

  • SHA512

    adcf823d05bd0fa407a663fae3f4b0232acd7c41775f5ad3bd5d7570a609813da63f1522fe2497004d386a766de2c7e6f1d26f3177beb7a2d4da2a5a1d734de3

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://vtdilet.com/upload/

http://netvxi.com/upload/

http://tinnys.monster/upload/

rc4.i32
rc4.i32

Targets

    • Target

      6ca375ce8d7caafb814fb3455edfafd8.exe

    • Size

      154KB

    • MD5

      6ca375ce8d7caafb814fb3455edfafd8

    • SHA1

      38dbc1e721dadcf695c4f2e0ec1c7c1a1dea31bf

    • SHA256

      0969327fda05101320538ec7c3df4ca3a024fdffc9ff58bcf5570a0960bd9df7

    • SHA512

      adcf823d05bd0fa407a663fae3f4b0232acd7c41775f5ad3bd5d7570a609813da63f1522fe2497004d386a766de2c7e6f1d26f3177beb7a2d4da2a5a1d734de3

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks