General

  • Target

    89381e65ee999ab00da2d330f1832edac6542a5d4bb75f40fc2a6ece6c9a84c9

  • Size

    187KB

  • Sample

    220127-l1s1vsagdk

  • MD5

    d8f237129cb99cd73238d67b150f893f

  • SHA1

    3dc170727eec382c42d0651f4af2362879a82de7

  • SHA256

    89381e65ee999ab00da2d330f1832edac6542a5d4bb75f40fc2a6ece6c9a84c9

  • SHA512

    76cae32216d433e3c0102aa62bec83a8d176c260ec02e059152b69e08a90b927617259ad28e997a12a982025d669b9be4983cacff8025ec2223ca311eef0c509

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

https://oakland-studio.video/search.php

https://seattle-university.video/search.php

rc4.i32
rc4.i32

Targets

    • Target

      89381e65ee999ab00da2d330f1832edac6542a5d4bb75f40fc2a6ece6c9a84c9

    • Size

      187KB

    • MD5

      d8f237129cb99cd73238d67b150f893f

    • SHA1

      3dc170727eec382c42d0651f4af2362879a82de7

    • SHA256

      89381e65ee999ab00da2d330f1832edac6542a5d4bb75f40fc2a6ece6c9a84c9

    • SHA512

      76cae32216d433e3c0102aa62bec83a8d176c260ec02e059152b69e08a90b927617259ad28e997a12a982025d669b9be4983cacff8025ec2223ca311eef0c509

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

      suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

    • suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND

      suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND

    • Modifies Windows Firewall

    • Sets service image path in registry

MITRE ATT&CK Enterprise v6

Tasks