General

  • Target

    3d943b4db1f8f85c9437a991ca76ad8c45f217c94a357b98780a3a6c4e7152cf

  • Size

    317KB

  • Sample

    220125-d93mnagadq

  • MD5

    9717203f29118d2e0f5a85c6472f2af1

  • SHA1

    c2319522002994dc37bf63f7f8bf54f73b1397a9

  • SHA256

    3d943b4db1f8f85c9437a991ca76ad8c45f217c94a357b98780a3a6c4e7152cf

  • SHA512

    629480a0f9d52fd983c2b6e0ac79b7f05537d5c9bb02d4fb39cedae8cfffc3731da107ea90a352b2a4bdaa7232904f9d0b3ed3b1820c608bcdd1fc39aa0e52b7

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://abpa.at/upload/

http://emaratghajari.com/upload/

http://d7qw.cn/upload/

http://alumik-group.ru/upload/

http://zamkikurgan.ru/upload/

rc4.i32
rc4.i32

Targets

    • Target

      3d943b4db1f8f85c9437a991ca76ad8c45f217c94a357b98780a3a6c4e7152cf

    • Size

      317KB

    • MD5

      9717203f29118d2e0f5a85c6472f2af1

    • SHA1

      c2319522002994dc37bf63f7f8bf54f73b1397a9

    • SHA256

      3d943b4db1f8f85c9437a991ca76ad8c45f217c94a357b98780a3a6c4e7152cf

    • SHA512

      629480a0f9d52fd983c2b6e0ac79b7f05537d5c9bb02d4fb39cedae8cfffc3731da107ea90a352b2a4bdaa7232904f9d0b3ed3b1820c608bcdd1fc39aa0e52b7

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

      suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

    • suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND

      suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Process Discovery

1
T1057

Tasks