General

  • Target

    kv17j.zip

  • Size

    201KB

  • Sample

    201229-nqczjmxsjj

  • MD5

    42cec2c45fbd5fd1ab602f7a1e2e2773

  • SHA1

    e39051f6fece5620e4bec9291031da7cdb8f4761

  • SHA256

    b46c13a15a9413cef399d29007d2ddd9bf1ff9c092e5558cc6d1d192d64e4c5c

  • SHA512

    7fec03f31a6e8cde7533352b6c72f9781d74cb4e1ccf69b36a8abc52170fb0eb82d029ddbffc8cbc52c98821d9c22a5bd8a7fffccb48210e87226eba387122bd

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://etasuklavish.today/

http://mragyzmachnobesdi.today/

http://kimchinikuzims.today/

http://slacvostinrius.today/

http://straponuliusyn.today/

http://grammmdinss.today/

http://viprasputinsd.chimkent.su/

http://lupadypa.dagestan.su/

http://stoknolimchin.exnet.su/

http://musaroprovadnikov.live/

http://teemforyourexprensiti.life/

http://stolkgolmishutich.termez.su/

http://roompampamgandish.wtf/

rc4.i32
rc4.i32

Targets

    • Target

      kv17j.dll

    • Size

      251KB

    • MD5

      23627e96f5260b8e1d8fdc3da9250126

    • SHA1

      d68f46e0f9154972b5a0f1dae8e4380a8d227527

    • SHA256

      fed230e1f92000a5860c06228346b7925d8cce2ac1ebc1048ed5c26576c830f7

    • SHA512

      395afa4073a58f2644cb10923e7ed9cb5098ab44f8c4bb5efb3bf4c70f4b5f132511ada4d659667d64a743e18a3751082ce84b85de61566987859f2d29348398

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks