General

  • Target

    d56e96786b2291d678e764febe65570be5d501d79f6e02903e1afb5ea2c71898

  • Size

    264KB

  • Sample

    220125-txbleaaggn

  • MD5

    0ba1e64727681ab629be3617e3f1f4c7

  • SHA1

    ec1878c56158824f139a2cd63325c33a6910b132

  • SHA256

    d56e96786b2291d678e764febe65570be5d501d79f6e02903e1afb5ea2c71898

  • SHA512

    65f6d9b08f6ce19fcb76c0947e2d261110d70004036cf2b546fe3b769da7a2df1e663eca57469ef4b7e6d324ce4d3d96f60243ef4336beddc35fa9f7f791c8fe

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32

Targets

    • Target

      d56e96786b2291d678e764febe65570be5d501d79f6e02903e1afb5ea2c71898

    • Size

      264KB

    • MD5

      0ba1e64727681ab629be3617e3f1f4c7

    • SHA1

      ec1878c56158824f139a2cd63325c33a6910b132

    • SHA256

      d56e96786b2291d678e764febe65570be5d501d79f6e02903e1afb5ea2c71898

    • SHA512

      65f6d9b08f6ce19fcb76c0947e2d261110d70004036cf2b546fe3b769da7a2df1e663eca57469ef4b7e6d324ce4d3d96f60243ef4336beddc35fa9f7f791c8fe

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Sets service image path in registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks