General

  • Target

    0352c87d5ff0407abb54c12b114bf8ed09e74f63b16693f77cf11786cd9da83c

  • Size

    215KB

  • Sample

    211014-hpyv7agcar

  • MD5

    bd5c18401ce7a26e253456636d0ba886

  • SHA1

    aa73c5c159ad8f9d998483182e163add7b5a731d

  • SHA256

    0352c87d5ff0407abb54c12b114bf8ed09e74f63b16693f77cf11786cd9da83c

  • SHA512

    13f7a7f8c3fcaffd7b9ea00e76035c975047b16a330bd3a84dc1075ef265784192152d0b239911bf83b0eb47f7594f02c8cf9d87dfce9d60c0c48754e41b1dc4

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://honawey7.xyz/

http://wijibui0.xyz/

http://hefahei6.xyz/

http://pipevai4.xyz/

http://nalirou7.xyz/

http://xacokuo8.xyz/

http://hajezey1.xyz/

http://gejajoo7.xyz/

http://sysaheu9.xyz/

http://rixoxeu9.xyz/

rc4.i32
rc4.i32

Targets

    • Target

      0352c87d5ff0407abb54c12b114bf8ed09e74f63b16693f77cf11786cd9da83c

    • Size

      215KB

    • MD5

      bd5c18401ce7a26e253456636d0ba886

    • SHA1

      aa73c5c159ad8f9d998483182e163add7b5a731d

    • SHA256

      0352c87d5ff0407abb54c12b114bf8ed09e74f63b16693f77cf11786cd9da83c

    • SHA512

      13f7a7f8c3fcaffd7b9ea00e76035c975047b16a330bd3a84dc1075ef265784192152d0b239911bf83b0eb47f7594f02c8cf9d87dfce9d60c0c48754e41b1dc4

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks