General

  • Target

    c4776d0c137ffdd7c1961d39d00c47625b56aa259391d042ab19bba938225653

  • Size

    145KB

  • Sample

    210926-gbttmsechk

  • MD5

    02d4f0634b7dddcc91864649c92885fa

  • SHA1

    f033b5245a2c7591cf37a56b37a7c587f313af97

  • SHA256

    c4776d0c137ffdd7c1961d39d00c47625b56aa259391d042ab19bba938225653

  • SHA512

    ec5299f39da5899a9222a83c197a7ecd77dbbbf49ac8975f8793fc2021e669b7e563aa5ac83822f464c6dcd43e2d6b1c1216f3ac6dc0602575fd090a8343ce16

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://naghenrietti1.top/

http://kimballiett2.top/

http://xadriettany3.top/

http://jebeccallis4.top/

http://nityanneron5.top/

http://umayaniela6.top/

http://lynettaram7.top/

http://sadineyalas8.top/

http://geenaldencia9.top/

http://aradysiusep10.top/

rc4.i32
rc4.i32

Targets

    • Target

      c4776d0c137ffdd7c1961d39d00c47625b56aa259391d042ab19bba938225653

    • Size

      145KB

    • MD5

      02d4f0634b7dddcc91864649c92885fa

    • SHA1

      f033b5245a2c7591cf37a56b37a7c587f313af97

    • SHA256

      c4776d0c137ffdd7c1961d39d00c47625b56aa259391d042ab19bba938225653

    • SHA512

      ec5299f39da5899a9222a83c197a7ecd77dbbbf49ac8975f8793fc2021e669b7e563aa5ac83822f464c6dcd43e2d6b1c1216f3ac6dc0602575fd090a8343ce16

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks