General

  • Target

    4a7a228e0870e9daed8a1ccf728d8b0e09680a222b7fe2f3328b58a51376dd4f

  • Size

    32KB

  • Sample

    220128-x2a28abdbq

  • MD5

    4eb03f36e3a340f08442c380f853153a

  • SHA1

    9efd42856bd596eb3246e7dc85288098e5289874

  • SHA256

    4a7a228e0870e9daed8a1ccf728d8b0e09680a222b7fe2f3328b58a51376dd4f

  • SHA512

    2eaa6e131d3680159ac79715db16f647543882b0f44a62606edbd3136292c99424936de7edf6a9ec20fd7ee80faacdee64eff080ae1b04c1c23946996fbfbf52

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://bulgar.bit/

rc4.i32
rc4.i32

Targets

    • Target

      4a7a228e0870e9daed8a1ccf728d8b0e09680a222b7fe2f3328b58a51376dd4f

    • Size

      32KB

    • MD5

      4eb03f36e3a340f08442c380f853153a

    • SHA1

      9efd42856bd596eb3246e7dc85288098e5289874

    • SHA256

      4a7a228e0870e9daed8a1ccf728d8b0e09680a222b7fe2f3328b58a51376dd4f

    • SHA512

      2eaa6e131d3680159ac79715db16f647543882b0f44a62606edbd3136292c99424936de7edf6a9ec20fd7ee80faacdee64eff080ae1b04c1c23946996fbfbf52

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks