General

  • Target

    4dc4954990ef29b8b1b66f23cd475d375cc759b2aabbfdde761abaafef975baf

  • Size

    247KB

  • Sample

    211204-a3p67shfcq

  • MD5

    86c76df3f0feed13d6ad6f9155156369

  • SHA1

    330e82600381f68d6f6914b50b451b6c59901b26

  • SHA256

    4dc4954990ef29b8b1b66f23cd475d375cc759b2aabbfdde761abaafef975baf

  • SHA512

    078e22f7c6109abf532591dc429d6a58255a192c3a70324b769e5f2b79549d0814fa2330693484dccdc27427ef25526b5db4f3b574c521bed0ae27eadada789c

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

https://cinems.club/search.php

https://clothes.surf/search.php

rc4.i32
rc4.i32

Targets

    • Target

      4dc4954990ef29b8b1b66f23cd475d375cc759b2aabbfdde761abaafef975baf

    • Size

      247KB

    • MD5

      86c76df3f0feed13d6ad6f9155156369

    • SHA1

      330e82600381f68d6f6914b50b451b6c59901b26

    • SHA256

      4dc4954990ef29b8b1b66f23cd475d375cc759b2aabbfdde761abaafef975baf

    • SHA512

      078e22f7c6109abf532591dc429d6a58255a192c3a70324b769e5f2b79549d0814fa2330693484dccdc27427ef25526b5db4f3b574c521bed0ae27eadada789c

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

      suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

    • suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND

      suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND

    • Modifies Windows Firewall

    • Deletes itself

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Process Discovery

1
T1057

Collection

Email Collection

1
T1114

Tasks