General

  • Target

    252a4190eaecbc943096298f30f253abdb5c44a300be287f15f7df2b73aa582f

  • Size

    136KB

  • Sample

    220611-ypwc3aecgp

  • MD5

    6edb03b17015511d88be4bd846edb15a

  • SHA1

    010dc0f8d022df643c03736e207de5684fffcf32

  • SHA256

    252a4190eaecbc943096298f30f253abdb5c44a300be287f15f7df2b73aa582f

  • SHA512

    c851f60ce4476c313e690e28dc66b0ab3f0f127ef81b01f238ac7d11cf1244e6824735495e167c8f56c4986ec603b76cd1cd25b1093187d016d325714353c65b

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://klub11n.se/kp/

rc4.i32
rc4.i32

Targets

    • Target

      252a4190eaecbc943096298f30f253abdb5c44a300be287f15f7df2b73aa582f

    • Size

      136KB

    • MD5

      6edb03b17015511d88be4bd846edb15a

    • SHA1

      010dc0f8d022df643c03736e207de5684fffcf32

    • SHA256

      252a4190eaecbc943096298f30f253abdb5c44a300be287f15f7df2b73aa582f

    • SHA512

      c851f60ce4476c313e690e28dc66b0ab3f0f127ef81b01f238ac7d11cf1244e6824735495e167c8f56c4986ec603b76cd1cd25b1093187d016d325714353c65b

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks