General

  • Target

    740f8c1012acd6a38e0aa857a976d5b458adf792f6042ef61e89c5a962ad43b2

  • Size

    217KB

  • Sample

    210513-gcpvn348nj

  • MD5

    2dfcf48501d151426cd0ffa4a8afd09e

  • SHA1

    cbc0ca7079fafe854ad0473e5a45d39db2fe85ba

  • SHA256

    740f8c1012acd6a38e0aa857a976d5b458adf792f6042ef61e89c5a962ad43b2

  • SHA512

    bbe891f792362aa36e24ccb87d5cce08126d5d24aeb1f79f43ba28fc1ec941396ab567a2e240db329c7b6baffb49aee65356822bc2b0f278f36300a44dcc73c5

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://gvs1.in/2/

http://sd12.bit/2/

http://1sd1.ru/2/

rc4.i32
rc4.i32

Targets

    • Target

      740f8c1012acd6a38e0aa857a976d5b458adf792f6042ef61e89c5a962ad43b2

    • Size

      217KB

    • MD5

      2dfcf48501d151426cd0ffa4a8afd09e

    • SHA1

      cbc0ca7079fafe854ad0473e5a45d39db2fe85ba

    • SHA256

      740f8c1012acd6a38e0aa857a976d5b458adf792f6042ef61e89c5a962ad43b2

    • SHA512

      bbe891f792362aa36e24ccb87d5cce08126d5d24aeb1f79f43ba28fc1ec941396ab567a2e240db329c7b6baffb49aee65356822bc2b0f278f36300a44dcc73c5

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks