General

  • Target

    3449d9a2873d48c3297e2d0f86ad634978aaaefcc80a669fe9efedbd859f7f30

  • Size

    304KB

  • Sample

    220521-t48jqaabg5

  • MD5

    78ab6d406247d0b80c6dfad070772768

  • SHA1

    21a72ad164710c0a3bb55031f1c3dd8d5f4e4ad7

  • SHA256

    3449d9a2873d48c3297e2d0f86ad634978aaaefcc80a669fe9efedbd859f7f30

  • SHA512

    4ca27a427f2667d6d6ab8b813a651600633b2575e144557b35bf259c9944c45a98d9236d59c5d6f5d00288b8c024949c1a17b6d2cf6ac98ecff19e7121b71ac3

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://bahninfo.at/upload/

http://img4mobi.com/upload/

http://equix.ru/upload/

http://worldalltv.com/upload/

http://negarehgallery.com/upload/

http://lite-server.ru/upload/

http://piratia/su/upload/

http://go-piratia.ru/upload/

http://monsutiur4.com/

http://nusurionuy5ff.at/

http://moroitomo4.net/

http://susuerulianita1.net/

http://cucumbetuturel4.com/

http://nunuslushau.com/

http://linislominyt11.at/

http://luxulixionus.net/

http://lilisjjoer44.com/

http://nikogminut88.at/

http://limo00ruling.org/

http://mini55tunul.com/

rc4.i32
rc4.i32
rc4.i32
rc4.i32
rc4.i32
rc4.i32

Targets

    • Target

      3449d9a2873d48c3297e2d0f86ad634978aaaefcc80a669fe9efedbd859f7f30

    • Size

      304KB

    • MD5

      78ab6d406247d0b80c6dfad070772768

    • SHA1

      21a72ad164710c0a3bb55031f1c3dd8d5f4e4ad7

    • SHA256

      3449d9a2873d48c3297e2d0f86ad634978aaaefcc80a669fe9efedbd859f7f30

    • SHA512

      4ca27a427f2667d6d6ab8b813a651600633b2575e144557b35bf259c9944c45a98d9236d59c5d6f5d00288b8c024949c1a17b6d2cf6ac98ecff19e7121b71ac3

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks