General

  • Target

    a803a2f303972e595f62c4f94fdab9a6.exe

  • Size

    154KB

  • Sample

    201229-2tcb6hjv6j

  • MD5

    a803a2f303972e595f62c4f94fdab9a6

  • SHA1

    0b880a5a3bd054a2bf25e1b07c6e50aeeacd261d

  • SHA256

    448c9cc1d7ec2eeae433ea0f955802adfbb6d97546c99855812c11942021776e

  • SHA512

    6166e53c3c55e77d18d0f6688ebf1b24daacd569a3766ada94bbc873915429c340d6acb4462f2eda21d891e1014184a7c2d1396cbb441bc1261afd3aa3116211

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://vtdilet.com/upload/

http://netvxi.com/upload/

http://tinnys.monster/upload/

rc4.i32
rc4.i32

Targets

    • Target

      a803a2f303972e595f62c4f94fdab9a6.exe

    • Size

      154KB

    • MD5

      a803a2f303972e595f62c4f94fdab9a6

    • SHA1

      0b880a5a3bd054a2bf25e1b07c6e50aeeacd261d

    • SHA256

      448c9cc1d7ec2eeae433ea0f955802adfbb6d97546c99855812c11942021776e

    • SHA512

      6166e53c3c55e77d18d0f6688ebf1b24daacd569a3766ada94bbc873915429c340d6acb4462f2eda21d891e1014184a7c2d1396cbb441bc1261afd3aa3116211

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks