General

  • Target

    22e74d1a3d2044c813d816b1766cb24ded03f3388397a9e4ca2ddf1b7b0a1582

  • Size

    173KB

  • Sample

    220612-dz2bvagec4

  • MD5

    38cdab9620176b7d66490cca8f49446f

  • SHA1

    1e77716d9479a623acb47e80208708245f6fe7d0

  • SHA256

    22e74d1a3d2044c813d816b1766cb24ded03f3388397a9e4ca2ddf1b7b0a1582

  • SHA512

    539babf15507490463ca261d404199e1a876b84c9d6d0531d98abb55869e71a96131c2c6e0982cb58ae57f53423a9fe6ec958d8597ce21b978ed47f40f36b6f1

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://segodnya.bit/biologe/

rc4.i32
rc4.i32

Targets

    • Target

      22e74d1a3d2044c813d816b1766cb24ded03f3388397a9e4ca2ddf1b7b0a1582

    • Size

      173KB

    • MD5

      38cdab9620176b7d66490cca8f49446f

    • SHA1

      1e77716d9479a623acb47e80208708245f6fe7d0

    • SHA256

      22e74d1a3d2044c813d816b1766cb24ded03f3388397a9e4ca2ddf1b7b0a1582

    • SHA512

      539babf15507490463ca261d404199e1a876b84c9d6d0531d98abb55869e71a96131c2c6e0982cb58ae57f53423a9fe6ec958d8597ce21b978ed47f40f36b6f1

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks