General

  • Target

    2395a6d5d739e406f3d348b83ad23aa16ed317359bc5aa63c7570d374600d2ac

  • Size

    194KB

  • Sample

    220612-bdxenacae5

  • MD5

    b547c46e56c6222a4558f9d8b3d38d55

  • SHA1

    68df56cf3f593c7f20961ef3c6fd9d3f9928ed49

  • SHA256

    2395a6d5d739e406f3d348b83ad23aa16ed317359bc5aa63c7570d374600d2ac

  • SHA512

    ceaa8c237c589ef9a5f527323ffeba06389649a9d12c57c68f454edcccd6f5d5bd41aad1761c46e23ba55cd65120b1dd39e054ae49b75e055f63c8980a6d1dc9

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://mailcdn-office365.io/

http://update-vmware-service.com/

http://rocket365.to/

rc4.i32
rc4.i32

Targets

    • Target

      2395a6d5d739e406f3d348b83ad23aa16ed317359bc5aa63c7570d374600d2ac

    • Size

      194KB

    • MD5

      b547c46e56c6222a4558f9d8b3d38d55

    • SHA1

      68df56cf3f593c7f20961ef3c6fd9d3f9928ed49

    • SHA256

      2395a6d5d739e406f3d348b83ad23aa16ed317359bc5aa63c7570d374600d2ac

    • SHA512

      ceaa8c237c589ef9a5f527323ffeba06389649a9d12c57c68f454edcccd6f5d5bd41aad1761c46e23ba55cd65120b1dd39e054ae49b75e055f63c8980a6d1dc9

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks