General

  • Target

    fc0c1e4dbc4cb98397b0398236210fb5483f58c38b016165bf20615b6611c4cb

  • Size

    333KB

  • Sample

    220126-bhklnabgh8

  • MD5

    09bea40d88954b38cd495cb5ae0a8050

  • SHA1

    241ccb105f90b19bd4f33f0fb2bc15b61d5c8288

  • SHA256

    fc0c1e4dbc4cb98397b0398236210fb5483f58c38b016165bf20615b6611c4cb

  • SHA512

    c57a04cd4e1adb78d4bff1892631f773909ef39b2f02715b77dad119c0df5d9e09688b510c58ba4b85109cf88710ead6df7cdcc99846d884052226f3f55e27d9

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32

Targets

    • Target

      fc0c1e4dbc4cb98397b0398236210fb5483f58c38b016165bf20615b6611c4cb

    • Size

      333KB

    • MD5

      09bea40d88954b38cd495cb5ae0a8050

    • SHA1

      241ccb105f90b19bd4f33f0fb2bc15b61d5c8288

    • SHA256

      fc0c1e4dbc4cb98397b0398236210fb5483f58c38b016165bf20615b6611c4cb

    • SHA512

      c57a04cd4e1adb78d4bff1892631f773909ef39b2f02715b77dad119c0df5d9e09688b510c58ba4b85109cf88710ead6df7cdcc99846d884052226f3f55e27d9

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks