General

  • Target

    021def3f02ddcf8a426a317bd1fdcab56035ac1a19a734e7f5a457c932a3766e

  • Size

    304KB

  • Sample

    220521-nbt8qsgedl

  • MD5

    610212ba55d4fe4580df7c4770b7ba04

  • SHA1

    c1ab6b9e16372811b5e7b1050688b090d4bee47e

  • SHA256

    021def3f02ddcf8a426a317bd1fdcab56035ac1a19a734e7f5a457c932a3766e

  • SHA512

    c39b69a9c85d4bc0d15c7704bdc9b0fd5e93d7ef0138a2f808810f1eeda2bdda846e4aef4a313f311967cad6962bf70074ab7be8aedfb4eb1bf38567bd0ed892

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

https://ny-city-mall.com/search.php

https://fresh-cars.net/search.php

rc4.i32
rc4.i32

Targets

    • Target

      021def3f02ddcf8a426a317bd1fdcab56035ac1a19a734e7f5a457c932a3766e

    • Size

      304KB

    • MD5

      610212ba55d4fe4580df7c4770b7ba04

    • SHA1

      c1ab6b9e16372811b5e7b1050688b090d4bee47e

    • SHA256

      021def3f02ddcf8a426a317bd1fdcab56035ac1a19a734e7f5a457c932a3766e

    • SHA512

      c39b69a9c85d4bc0d15c7704bdc9b0fd5e93d7ef0138a2f808810f1eeda2bdda846e4aef4a313f311967cad6962bf70074ab7be8aedfb4eb1bf38567bd0ed892

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

      suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

    • suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND

      suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND

    • Modifies Windows Firewall

MITRE ATT&CK Enterprise v6

Tasks