General

  • Target

    64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace

  • Size

    351KB

  • Sample

    220128-snsb5afgf2

  • MD5

    f6a203f2e6659bfba867ff5013dfa019

  • SHA1

    a3e5f62bcaeebd1e3e102a1071d18d2bdf307dfb

  • SHA256

    64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace

  • SHA512

    06bf9cc489e1904e45e7fe314cae1e9c2ed2e1dd1a7b6356523fb42642b76535e2045d88c072138f11d8dba1e87c7703cfd7cf5306a73d6b5de16e15301a5d2a

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32

Targets

    • Target

      64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace

    • Size

      351KB

    • MD5

      f6a203f2e6659bfba867ff5013dfa019

    • SHA1

      a3e5f62bcaeebd1e3e102a1071d18d2bdf307dfb

    • SHA256

      64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace

    • SHA512

      06bf9cc489e1904e45e7fe314cae1e9c2ed2e1dd1a7b6356523fb42642b76535e2045d88c072138f11d8dba1e87c7703cfd7cf5306a73d6b5de16e15301a5d2a

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks