General

  • Target

    db5ea894beb5c55f094286d26409297ed69628a29003eb69d6c57e2f9bf569b9

  • Size

    241KB

  • Sample

    220127-ccdftsebd6

  • MD5

    120bfcda4022367bbe1e56b3308acdf8

  • SHA1

    ff591145be5a1da563ea6c0e21c2e2216857583a

  • SHA256

    db5ea894beb5c55f094286d26409297ed69628a29003eb69d6c57e2f9bf569b9

  • SHA512

    284417ed1c7226dcdf3ab9887b394aa639804d830afe488877bc3f90bf8c951beabd38aa56d3a887d3bd2f9c4df3cd2491670138509d72d8dd84f53fcf20c68b

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://abpa.at/upload/

http://emaratghajari.com/upload/

http://d7qw.cn/upload/

http://alumik-group.ru/upload/

http://zamkikurgan.ru/upload/

https://oakland-studio.video/search.php

https://seattle-university.video/search.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Targets

    • Target

      db5ea894beb5c55f094286d26409297ed69628a29003eb69d6c57e2f9bf569b9

    • Size

      241KB

    • MD5

      120bfcda4022367bbe1e56b3308acdf8

    • SHA1

      ff591145be5a1da563ea6c0e21c2e2216857583a

    • SHA256

      db5ea894beb5c55f094286d26409297ed69628a29003eb69d6c57e2f9bf569b9

    • SHA512

      284417ed1c7226dcdf3ab9887b394aa639804d830afe488877bc3f90bf8c951beabd38aa56d3a887d3bd2f9c4df3cd2491670138509d72d8dd84f53fcf20c68b

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Deletes itself

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Process Discovery

1
T1057

Collection

Email Collection

1
T1114

Tasks