General

  • Target

    e57fee733b088752760a505c620455077eb4beeca27789c9213e5305d4587bc2

  • Size

    247KB

  • Sample

    211204-j4cryaafgq

  • MD5

    3e62a49676688db916609987456d5bf3

  • SHA1

    f71a158b6b22eeebf3c6029df21abf80abcc466f

  • SHA256

    e57fee733b088752760a505c620455077eb4beeca27789c9213e5305d4587bc2

  • SHA512

    8f0311be4605e468e5e0bc9400e6b1e1cc1d38f1febfc1679d7fac6ad857352f9ebc248e31c7335dbd1a57500da14f641ef49c7003a28cc1d32b6fe11c65cdb3

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

https://cinems.club/search.php

https://clothes.surf/search.php

rc4.i32
rc4.i32

Targets

    • Target

      e57fee733b088752760a505c620455077eb4beeca27789c9213e5305d4587bc2

    • Size

      247KB

    • MD5

      3e62a49676688db916609987456d5bf3

    • SHA1

      f71a158b6b22eeebf3c6029df21abf80abcc466f

    • SHA256

      e57fee733b088752760a505c620455077eb4beeca27789c9213e5305d4587bc2

    • SHA512

      8f0311be4605e468e5e0bc9400e6b1e1cc1d38f1febfc1679d7fac6ad857352f9ebc248e31c7335dbd1a57500da14f641ef49c7003a28cc1d32b6fe11c65cdb3

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

      suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

    • suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND

      suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND

    • Modifies Windows Firewall

    • Deletes itself

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks