General

  • Target

    0b8c0422dfc65a0d559a0002b26fc3e8585391aae590b10ce59d8bbbf033329f

  • Size

    334KB

  • Sample

    220126-mtncgacch4

  • MD5

    57ee423591aca6825afbdf0a273a342f

  • SHA1

    a4d8552d6c3d21bcfc7c11ba77302260c4c9e2e9

  • SHA256

    0b8c0422dfc65a0d559a0002b26fc3e8585391aae590b10ce59d8bbbf033329f

  • SHA512

    3c349a5a37aa13c0916901b6938a88e73023eef344cf997210d383f90d09ac0890f853f340fdf8b62479032fb73092ffd700f75eb5650726729d1524f3b854f0

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://abpa.at/upload/

http://emaratghajari.com/upload/

http://d7qw.cn/upload/

http://alumik-group.ru/upload/

http://zamkikurgan.ru/upload/

https://oakland-studio.video/search.php

https://seattle-university.video/search.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Targets

    • Target

      0b8c0422dfc65a0d559a0002b26fc3e8585391aae590b10ce59d8bbbf033329f

    • Size

      334KB

    • MD5

      57ee423591aca6825afbdf0a273a342f

    • SHA1

      a4d8552d6c3d21bcfc7c11ba77302260c4c9e2e9

    • SHA256

      0b8c0422dfc65a0d559a0002b26fc3e8585391aae590b10ce59d8bbbf033329f

    • SHA512

      3c349a5a37aa13c0916901b6938a88e73023eef344cf997210d383f90d09ac0890f853f340fdf8b62479032fb73092ffd700f75eb5650726729d1524f3b854f0

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

MITRE ATT&CK Enterprise v6

Tasks