General

  • Target

    a89f5e16612f2a1515ddf2c0cd49569b710eb70b5ab3a07b450867d49c263676

  • Size

    304KB

  • Sample

    220520-2r2veaahel

  • MD5

    0c17e95d1daf58f2eea465d5f07e1b02

  • SHA1

    92017f67294378617d6e5f614e65c8585ed8b390

  • SHA256

    a89f5e16612f2a1515ddf2c0cd49569b710eb70b5ab3a07b450867d49c263676

  • SHA512

    6ce776c372ef53071df4e0ffec06d9fe6374bb82e71c7d4df83a987ee7d33026f9da9405accd9495a81605ba77408b81bc42220a34171a50165d55766af66a4c

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

https://ny-city-mall.com/search.php

https://fresh-cars.net/search.php

rc4.i32
rc4.i32

Targets

    • Target

      a89f5e16612f2a1515ddf2c0cd49569b710eb70b5ab3a07b450867d49c263676

    • Size

      304KB

    • MD5

      0c17e95d1daf58f2eea465d5f07e1b02

    • SHA1

      92017f67294378617d6e5f614e65c8585ed8b390

    • SHA256

      a89f5e16612f2a1515ddf2c0cd49569b710eb70b5ab3a07b450867d49c263676

    • SHA512

      6ce776c372ef53071df4e0ffec06d9fe6374bb82e71c7d4df83a987ee7d33026f9da9405accd9495a81605ba77408b81bc42220a34171a50165d55766af66a4c

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

      suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

    • suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND

      suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND

    • Modifies Windows Firewall

    • Deletes itself

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Process Discovery

1
T1057

Collection

Email Collection

1
T1114

Tasks