General

  • Target

    7321f6354cc195b100bc6bf2cc3fcb7b700a96bb6f8505841c4438b61e058d70

  • Size

    352KB

  • Sample

    220128-taj92agdb3

  • MD5

    4a8f313059f16223ed50fe0e4a376883

  • SHA1

    820d6c0564839a6b4e5c067ff3d323ca1ec0f441

  • SHA256

    7321f6354cc195b100bc6bf2cc3fcb7b700a96bb6f8505841c4438b61e058d70

  • SHA512

    58c840e99dbb39b07e27f56466e0068b18a6787d5534f273a6a8056c795e234e9428a671afc589170928452241ee41289483c7567e4731ff24e4c88de21b1fb8

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32

Targets

    • Target

      7321f6354cc195b100bc6bf2cc3fcb7b700a96bb6f8505841c4438b61e058d70

    • Size

      352KB

    • MD5

      4a8f313059f16223ed50fe0e4a376883

    • SHA1

      820d6c0564839a6b4e5c067ff3d323ca1ec0f441

    • SHA256

      7321f6354cc195b100bc6bf2cc3fcb7b700a96bb6f8505841c4438b61e058d70

    • SHA512

      58c840e99dbb39b07e27f56466e0068b18a6787d5534f273a6a8056c795e234e9428a671afc589170928452241ee41289483c7567e4731ff24e4c88de21b1fb8

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Sets service image path in registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks