General

  • Target

    42eabd90d252834ba52568b200e09dfd.exe

  • Size

    185KB

  • Sample

    211029-fmecnahceq

  • MD5

    42eabd90d252834ba52568b200e09dfd

  • SHA1

    e758217035e67aa46e475e1b5fb79a7168e03078

  • SHA256

    1206fbf7e6a98bf2ac11d17648cb27e3aa514774df47b8c071a4473ca4f382c5

  • SHA512

    5c7d18f36093e786f06c3c383747d5f49f31677f091e6d0325d48e1d6f3de45218190a97df447a029ca896b79633a5cf7534da1513a4389eaa85b6d648db9312

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://brandyjaggers.com/upload/

http://andbal.com/upload/

http://alotofquotes.com/upload/

http://szpnc.cn/upload/

http://uggeboots.com/upload/

http://100klv.com/upload/

http://rapmusic.at/upload/

rc4.i32
rc4.i32

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1

Targets

    • Target

      42eabd90d252834ba52568b200e09dfd.exe

    • Size

      185KB

    • MD5

      42eabd90d252834ba52568b200e09dfd

    • SHA1

      e758217035e67aa46e475e1b5fb79a7168e03078

    • SHA256

      1206fbf7e6a98bf2ac11d17648cb27e3aa514774df47b8c071a4473ca4f382c5

    • SHA512

      5c7d18f36093e786f06c3c383747d5f49f31677f091e6d0325d48e1d6f3de45218190a97df447a029ca896b79633a5cf7534da1513a4389eaa85b6d648db9312

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • suricata: ET MALWARE ServHelper CnC Inital Checkin

      suricata: ET MALWARE ServHelper CnC Inital Checkin

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies RDP port number used by Windows

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Account Manipulation

1
T1098

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Lateral Movement

Remote Desktop Protocol

1
T1076

Tasks