General

  • Target

    b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91

  • Size

    317KB

  • Sample

    220125-sar47shfc8

  • MD5

    c7a68e97288aa2d7e50b181054985aca

  • SHA1

    37448296f49f7401c3ad6e245130264396a92a66

  • SHA256

    b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91

  • SHA512

    2aa1ac3f41a75adcc163050ab737e091ea10d53096d1241047ecc5a54df82208bf5307fc7869890c9721d67ba89b45ec676a791f2655844707ba340a1dc96c18

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32

Targets

    • Target

      b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91

    • Size

      317KB

    • MD5

      c7a68e97288aa2d7e50b181054985aca

    • SHA1

      37448296f49f7401c3ad6e245130264396a92a66

    • SHA256

      b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91

    • SHA512

      2aa1ac3f41a75adcc163050ab737e091ea10d53096d1241047ecc5a54df82208bf5307fc7869890c9721d67ba89b45ec676a791f2655844707ba340a1dc96c18

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Sets service image path in registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks