General

  • Target

    6597148ba8b6a0d6f2232d11aa291100.exe

  • Size

    194KB

  • Sample

    210816-dz127nxkr2

  • MD5

    6597148ba8b6a0d6f2232d11aa291100

  • SHA1

    7a5d27cfae50ba988a4f624409343cef0f4420a3

  • SHA256

    341affdc32c116eeac3bc8af74eeec475feb728b9bc8a56a4b35ad4755707d5e

  • SHA512

    fb3a58944ab3d7158e5c377d947191e696124835fefd2dad1f7a1d9a3f52560281b9a1157550416c4686b34d9a76f3d961c8a743b58ce4a8241ae4b256d8019d

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforjuly1.xyz/

http://readinglistforjuly2.xyz/

http://readinglistforjuly3.xyz/

http://readinglistforjuly4.xyz/

http://readinglistforjuly5.xyz/

http://readinglistforjuly6.xyz/

http://readinglistforjuly7.xyz/

http://readinglistforjuly8.xyz/

http://readinglistforjuly9.xyz/

http://readinglistforjuly10.xyz/

http://readinglistforjuly1.site/

http://readinglistforjuly2.site/

http://readinglistforjuly3.site/

http://readinglistforjuly4.site/

http://readinglistforjuly5.site/

http://readinglistforjuly6.site/

http://readinglistforjuly7.site/

http://readinglistforjuly8.site/

http://readinglistforjuly9.site/

http://readinglistforjuly10.site/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

cd8dc1031358b1aec55cc6bc447df1018b068607

Attributes
  • url4cnc

    https://telete.in/jagressor_kz

rc4.plain
rc4.plain

Targets

    • Target

      6597148ba8b6a0d6f2232d11aa291100.exe

    • Size

      194KB

    • MD5

      6597148ba8b6a0d6f2232d11aa291100

    • SHA1

      7a5d27cfae50ba988a4f624409343cef0f4420a3

    • SHA256

      341affdc32c116eeac3bc8af74eeec475feb728b9bc8a56a4b35ad4755707d5e

    • SHA512

      fb3a58944ab3d7158e5c377d947191e696124835fefd2dad1f7a1d9a3f52560281b9a1157550416c4686b34d9a76f3d961c8a743b58ce4a8241ae4b256d8019d

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks