General

  • Target

    sr6vn.bin.zip

  • Size

    201KB

  • Sample

    210104-ph96eh8ptn

  • MD5

    71151d3914e6db07173828d882aa819e

  • SHA1

    13976797d2ee80c4278404068d1df82f8a92ad95

  • SHA256

    861ab88154eac64267737edc5bfbf9911755f642914909260daf70b63fb16c70

  • SHA512

    ad7e078ddaaff9acb3b90ec4425bff134f50a74e22ec59c54844db6fa1a28edaee097b541d5465df135edb6f9a1dc71c8d1a378a05667f8607b1068adb1e6e2e

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://etasuklavish.today/

http://mragyzmachnobesdi.today/

http://kimchinikuzims.today/

http://slacvostinrius.today/

http://straponuliusyn.today/

http://grammmdinss.today/

http://viprasputinsd.chimkent.su/

http://lupadypa.dagestan.su/

http://stoknolimchin.exnet.su/

http://musaroprovadnikov.live/

http://teemforyourexprensiti.life/

http://stolkgolmishutich.termez.su/

http://roompampamgandish.wtf/

rc4.i32
rc4.i32

Targets

    • Target

      sr6vn.bin

    • Size

      251KB

    • MD5

      23627e96f5260b8e1d8fdc3da9250126

    • SHA1

      d68f46e0f9154972b5a0f1dae8e4380a8d227527

    • SHA256

      fed230e1f92000a5860c06228346b7925d8cce2ac1ebc1048ed5c26576c830f7

    • SHA512

      395afa4073a58f2644cb10923e7ed9cb5098ab44f8c4bb5efb3bf4c70f4b5f132511ada4d659667d64a743e18a3751082ce84b85de61566987859f2d29348398

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks