General

  • Target

    4f6a7eedce1dc56522cfc2a79edeefb217c225de0e7f6360bb85cfcb69451a38

  • Size

    146KB

  • Sample

    210513-ezf3htsrsj

  • MD5

    5d5f599f948af92752abc84b2e6f5f6a

  • SHA1

    340eeb82ab029061a47d4fb2c45afe713e821ffb

  • SHA256

    4f6a7eedce1dc56522cfc2a79edeefb217c225de0e7f6360bb85cfcb69451a38

  • SHA512

    8c4744feb8d51c16fd9260c60f970302dac0cba7f268414bc2a9ed7b8eb351b4da75072885f1b0c398af7744e29c91f884509c82593727339980b34b0352fe57

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://pecunia777.at/

rc4.i32
rc4.i32

Targets

    • Target

      4f6a7eedce1dc56522cfc2a79edeefb217c225de0e7f6360bb85cfcb69451a38

    • Size

      146KB

    • MD5

      5d5f599f948af92752abc84b2e6f5f6a

    • SHA1

      340eeb82ab029061a47d4fb2c45afe713e821ffb

    • SHA256

      4f6a7eedce1dc56522cfc2a79edeefb217c225de0e7f6360bb85cfcb69451a38

    • SHA512

      8c4744feb8d51c16fd9260c60f970302dac0cba7f268414bc2a9ed7b8eb351b4da75072885f1b0c398af7744e29c91f884509c82593727339980b34b0352fe57

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks