General

  • Target

    c00192be5bba695b4e38f75e42b05837278f5317c559219b03f9076e29b3817a

  • Size

    190KB

  • Sample

    220127-x989zshdhl

  • MD5

    3ba395916975f382badb22bdc868b3de

  • SHA1

    5dd31e44d30ceeded8a6588f0c53492d56a06f49

  • SHA256

    c00192be5bba695b4e38f75e42b05837278f5317c559219b03f9076e29b3817a

  • SHA512

    6797c105b2609b320ff3be96d5e9d0d093925cc33e5c3eb503bda5d9e65ffaed67ae4bf08e8a43dbca558d1c3f413c3ede7df33b812598386ec10cb1d3de6838

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32

Targets

    • Target

      c00192be5bba695b4e38f75e42b05837278f5317c559219b03f9076e29b3817a

    • Size

      190KB

    • MD5

      3ba395916975f382badb22bdc868b3de

    • SHA1

      5dd31e44d30ceeded8a6588f0c53492d56a06f49

    • SHA256

      c00192be5bba695b4e38f75e42b05837278f5317c559219b03f9076e29b3817a

    • SHA512

      6797c105b2609b320ff3be96d5e9d0d093925cc33e5c3eb503bda5d9e65ffaed67ae4bf08e8a43dbca558d1c3f413c3ede7df33b812598386ec10cb1d3de6838

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks