General

  • Target

    23dd8ddb8e9c7612471ee12fac764bd4288fda6c2c2cf59b24ccf7836b87fd81

  • Size

    278KB

  • Sample

    220612-afk9qsadc4

  • MD5

    558c4d285641cf8bcf33f127b829dbe7

  • SHA1

    6f1e3e59fa01dfd15aa279e2d734da9dbbdc43fd

  • SHA256

    23dd8ddb8e9c7612471ee12fac764bd4288fda6c2c2cf59b24ccf7836b87fd81

  • SHA512

    11b47fb881f7bee5f92cb45da482884fc9979ff0f55594664b4726e893431f987e035e909a850f4d3c56f8f416378c4ae0b3837c5a8b8f36ac9f516a085b1f57

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://protest-0124.tk/

http://test-service01.ru.com/

http://test-service01.pw/

http://test-service01.com/

http://test-service01.site/

http://test-service01.store/

http://test-service0124.ru/

http://mytest-service01.ru/

http://test-service01.su/

http://test-service01.info/

http://test-service01.net/

http://test-service01.tech/

http://test-service01.online/

http://rutest-service01.ru/

http://test-service01dom.ru/

http://test-service01.website/

http://test-service01.xyz/

http://test-service01pro.ru/

http://test-service01rus.ru/

http://test-service01.eu/

rc4.i32
rc4.i32

Targets

    • Target

      23dd8ddb8e9c7612471ee12fac764bd4288fda6c2c2cf59b24ccf7836b87fd81

    • Size

      278KB

    • MD5

      558c4d285641cf8bcf33f127b829dbe7

    • SHA1

      6f1e3e59fa01dfd15aa279e2d734da9dbbdc43fd

    • SHA256

      23dd8ddb8e9c7612471ee12fac764bd4288fda6c2c2cf59b24ccf7836b87fd81

    • SHA512

      11b47fb881f7bee5f92cb45da482884fc9979ff0f55594664b4726e893431f987e035e909a850f4d3c56f8f416378c4ae0b3837c5a8b8f36ac9f516a085b1f57

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks