General

  • Target

    E4B1.exe

  • Size

    167KB

  • Sample

    210310-cedvhcsrkj

  • MD5

    47838511727aae396e6269f03eca0166

  • SHA1

    cd9f435fa188377177f892de5b97f37149878009

  • SHA256

    a7a2a4f56a6eda5df0d82dc1cf60eee82d3a8d16f2d746df037cdeaafaebcd5d

  • SHA512

    463462a1972f5f4d9c1ba25ce5ef75f15ebaec2fc4b314d58bb155207899519caf3c5b49122ae1eca67d89a08b7a29d16ce17df2d64a6ed8539d416344ed18a5

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://4zavr.com/upload/

http://zynds.com/upload/

http://atvua.com/upload/

http://detse.net/upload/

http://dsdett.com/upload/

http://dtabasee.com/upload/

http://yeronogles.monster/upload/

rc4.i32
rc4.i32

Targets

    • Target

      E4B1.exe

    • Size

      167KB

    • MD5

      47838511727aae396e6269f03eca0166

    • SHA1

      cd9f435fa188377177f892de5b97f37149878009

    • SHA256

      a7a2a4f56a6eda5df0d82dc1cf60eee82d3a8d16f2d746df037cdeaafaebcd5d

    • SHA512

      463462a1972f5f4d9c1ba25ce5ef75f15ebaec2fc4b314d58bb155207899519caf3c5b49122ae1eca67d89a08b7a29d16ce17df2d64a6ed8539d416344ed18a5

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Bootkit

1
T1067

Privilege Escalation

New Service

1
T1050

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Tasks