General

  • Target

    tryb.doc

  • Size

    2.0MB

  • Sample

    210303-1p1423y6mj

  • MD5

    71fac99c1a854b308c866dc7434be8cb

  • SHA1

    a7160abce4a919fe4ffdc0445bd73a7079d629c4

  • SHA256

    56976b68d13955db91148d788ecc4b13bbe070c4047736e1d0a086eb3afe57df

  • SHA512

    8f8ed5dff1b3d84f01ba2c04c9d362fa2d6d6c54e3c9a6d0b7ef87a39d28596eef74b133b766ae0acbe2c2eff8a8b72303a7420cdec111f37b58cf1f76378009

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://trybobry.com.ua/1/

rc4.i32
rc4.i32

Targets

    • Target

      tryb.doc

    • Size

      2.0MB

    • MD5

      71fac99c1a854b308c866dc7434be8cb

    • SHA1

      a7160abce4a919fe4ffdc0445bd73a7079d629c4

    • SHA256

      56976b68d13955db91148d788ecc4b13bbe070c4047736e1d0a086eb3afe57df

    • SHA512

      8f8ed5dff1b3d84f01ba2c04c9d362fa2d6d6c54e3c9a6d0b7ef87a39d28596eef74b133b766ae0acbe2c2eff8a8b72303a7420cdec111f37b58cf1f76378009

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks