General

  • Target

    282eaff1168bd0b0172be664d51a45179a3687992f7b4e6e8f574801f5177f13

  • Size

    627KB

  • Sample

    220616-cfxnwaehhq

  • MD5

    7add86a68897d50e8d47e54f5680f0b0

  • SHA1

    43aec342acd49bd8ba676bcd1a66b696c440eade

  • SHA256

    282eaff1168bd0b0172be664d51a45179a3687992f7b4e6e8f574801f5177f13

  • SHA512

    8e0fab13e6070db1dc9d21ae78a47eb6c2217435640cfd65de9774378d23176ae190e032f6ae5885a574bda994dfccad20b5920a0359c4ba2611ec1337ea3136

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://otsosukadzima23334.com/

rc4.i32
rc4.i32

Targets

    • Target

      282eaff1168bd0b0172be664d51a45179a3687992f7b4e6e8f574801f5177f13

    • Size

      627KB

    • MD5

      7add86a68897d50e8d47e54f5680f0b0

    • SHA1

      43aec342acd49bd8ba676bcd1a66b696c440eade

    • SHA256

      282eaff1168bd0b0172be664d51a45179a3687992f7b4e6e8f574801f5177f13

    • SHA512

      8e0fab13e6070db1dc9d21ae78a47eb6c2217435640cfd65de9774378d23176ae190e032f6ae5885a574bda994dfccad20b5920a0359c4ba2611ec1337ea3136

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks