General

  • Target

    9e6e122e4798d36ef04fa932941a529214294b4707c4c4432b3952efc1297937

  • Size

    188KB

  • Sample

    220127-tw5g4agce5

  • MD5

    147a520cda06d08b58f84abbed5381b6

  • SHA1

    6e6f39764b253c7e02b2c533463199d59ab6517f

  • SHA256

    9e6e122e4798d36ef04fa932941a529214294b4707c4c4432b3952efc1297937

  • SHA512

    6a2b7e1e612ed8e96ae09b21d1db9cb1ebddc630a14e7dc16ad249271f68bae4e4f9f491ec305c5cc799f3d90855dc19ed2d13974facd128300a3d8b9e117d3d

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

https://oakland-studio.video/search.php

https://seattle-university.video/search.php

rc4.i32
rc4.i32

Targets

    • Target

      9e6e122e4798d36ef04fa932941a529214294b4707c4c4432b3952efc1297937

    • Size

      188KB

    • MD5

      147a520cda06d08b58f84abbed5381b6

    • SHA1

      6e6f39764b253c7e02b2c533463199d59ab6517f

    • SHA256

      9e6e122e4798d36ef04fa932941a529214294b4707c4c4432b3952efc1297937

    • SHA512

      6a2b7e1e612ed8e96ae09b21d1db9cb1ebddc630a14e7dc16ad249271f68bae4e4f9f491ec305c5cc799f3d90855dc19ed2d13974facd128300a3d8b9e117d3d

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

5
T1082

Process Discovery

1
T1057

Tasks