General

  • Target

    741fd84569147ff263cdef90566b789c.exe

  • Size

    333KB

  • Sample

    220127-jnpfsshefk

  • MD5

    741fd84569147ff263cdef90566b789c

  • SHA1

    e4df3ec61a7a7b71414bbaa9de095df83d6b7c65

  • SHA256

    5935be98b3f029dc6ece644cd1f6b844124f667d96da6ac9c8a1109ba67fb5fc

  • SHA512

    5bc605464707e0bb6276478cbca41a18b015d54f6ec47fca439e2940b7341cb5743df8a372ac6cc9820667a5e9597902df9037a8670d4cd63fa56422f87e3299

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32

Targets

    • Target

      741fd84569147ff263cdef90566b789c.exe

    • Size

      333KB

    • MD5

      741fd84569147ff263cdef90566b789c

    • SHA1

      e4df3ec61a7a7b71414bbaa9de095df83d6b7c65

    • SHA256

      5935be98b3f029dc6ece644cd1f6b844124f667d96da6ac9c8a1109ba67fb5fc

    • SHA512

      5bc605464707e0bb6276478cbca41a18b015d54f6ec47fca439e2940b7341cb5743df8a372ac6cc9820667a5e9597902df9037a8670d4cd63fa56422f87e3299

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks