General

  • Target

    c72719f7a27e043e16f452ce87ea8bf0f89fcca520721aa59820f7b1efdc01b7

  • Size

    212KB

  • Sample

    210921-fpy5vaagcr

  • MD5

    a2b0efc0a408c73e6a3501b3a5a0c627

  • SHA1

    492af61143910c55bdebc87bbad30bede3605f1c

  • SHA256

    c72719f7a27e043e16f452ce87ea8bf0f89fcca520721aa59820f7b1efdc01b7

  • SHA512

    561ff63e4a125ce6bf8f79db5d451fdbd81e9fb36e92bcea2cdd3879d6ed8957cb7243ededf1e68ec61a6703eef96f1228d1667f8d660c32ad2585afe93131fd

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://venerynnet1.top/

http://kevonahira2.top/

http://vegangelist3.top/

http://kingriffaele4.top/

http://arakeishant5.top/

rc4.i32
rc4.i32

Targets

    • Target

      c72719f7a27e043e16f452ce87ea8bf0f89fcca520721aa59820f7b1efdc01b7

    • Size

      212KB

    • MD5

      a2b0efc0a408c73e6a3501b3a5a0c627

    • SHA1

      492af61143910c55bdebc87bbad30bede3605f1c

    • SHA256

      c72719f7a27e043e16f452ce87ea8bf0f89fcca520721aa59820f7b1efdc01b7

    • SHA512

      561ff63e4a125ce6bf8f79db5d451fdbd81e9fb36e92bcea2cdd3879d6ed8957cb7243ededf1e68ec61a6703eef96f1228d1667f8d660c32ad2585afe93131fd

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker Payload

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Deletes System State backups

      Uses wbadmin.exe to inhibit system recovery.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks