General

  • Target

    61e95fdacce3d9ee9571d0d42cd3ca750cde65cd7324c5fe89f6d2dd145db76e

  • Size

    352KB

  • Sample

    220128-n3eblacabq

  • MD5

    96baa644531fb210358fa0248c374c84

  • SHA1

    1e7a2ee8aafd2c0e39033cfe064cdf058befa6f4

  • SHA256

    61e95fdacce3d9ee9571d0d42cd3ca750cde65cd7324c5fe89f6d2dd145db76e

  • SHA512

    47b554764555b6c3f7f77f9db42b533e29e10ae416d573321547b2ba61b0d9c8955bbfa6d72e9f3b983f0aad42aa16779b204dbbbd405fc60bfd2646ba1ade48

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32

Targets

    • Target

      61e95fdacce3d9ee9571d0d42cd3ca750cde65cd7324c5fe89f6d2dd145db76e

    • Size

      352KB

    • MD5

      96baa644531fb210358fa0248c374c84

    • SHA1

      1e7a2ee8aafd2c0e39033cfe064cdf058befa6f4

    • SHA256

      61e95fdacce3d9ee9571d0d42cd3ca750cde65cd7324c5fe89f6d2dd145db76e

    • SHA512

      47b554764555b6c3f7f77f9db42b533e29e10ae416d573321547b2ba61b0d9c8955bbfa6d72e9f3b983f0aad42aa16779b204dbbbd405fc60bfd2646ba1ade48

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks