General

  • Target

    6c32bc53645e49a7bdca77272e00e44ec5d38e561fe8c600a3425324a9641a02

  • Size

    334KB

  • Sample

    220126-w3tehshaf3

  • MD5

    85429f6f1f1fa17bcaed0e740472b428

  • SHA1

    08bc8f0aa7d94c2906e94f0a68aa5b6340ce6883

  • SHA256

    6c32bc53645e49a7bdca77272e00e44ec5d38e561fe8c600a3425324a9641a02

  • SHA512

    9c2c96ce4e5be3f4bca057904b81cc02e16e494592f4a7b5ec910311665e5a142d90e1f567dc473f61b1fef42f64cfe34fa155207f7a690d3245719f77b515a6

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://abpa.at/upload/

http://emaratghajari.com/upload/

http://d7qw.cn/upload/

http://alumik-group.ru/upload/

http://zamkikurgan.ru/upload/

https://oakland-studio.video/search.php

https://seattle-university.video/search.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Targets

    • Target

      6c32bc53645e49a7bdca77272e00e44ec5d38e561fe8c600a3425324a9641a02

    • Size

      334KB

    • MD5

      85429f6f1f1fa17bcaed0e740472b428

    • SHA1

      08bc8f0aa7d94c2906e94f0a68aa5b6340ce6883

    • SHA256

      6c32bc53645e49a7bdca77272e00e44ec5d38e561fe8c600a3425324a9641a02

    • SHA512

      9c2c96ce4e5be3f4bca057904b81cc02e16e494592f4a7b5ec910311665e5a142d90e1f567dc473f61b1fef42f64cfe34fa155207f7a690d3245719f77b515a6

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Deletes itself

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Process Discovery

1
T1057

Collection

Email Collection

1
T1114

Tasks