General

  • Target

    3cfed621658a4e0e8c205b463d4268305558222e2d04478f51437b646af4b24e

  • Size

    132KB

  • Sample

    220619-3yv6wagddm

  • MD5

    27915d97f362953b6b8642f0948968ee

  • SHA1

    2a08177046213e214d11787bba8df2621458a78e

  • SHA256

    3cfed621658a4e0e8c205b463d4268305558222e2d04478f51437b646af4b24e

  • SHA512

    a1ae689ec32339c734ab774aab8f9cd50680ddc3545905b81b4453d6cffe33c76571055d1b342c4f5e1e98f856a3174523f04ed9b84877a995dad81b5e51a16e

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://manage.9387723658221.com/

http://9387723658221.bit/

rc4.i32
rc4.i32

Targets

    • Target

      3cfed621658a4e0e8c205b463d4268305558222e2d04478f51437b646af4b24e

    • Size

      132KB

    • MD5

      27915d97f362953b6b8642f0948968ee

    • SHA1

      2a08177046213e214d11787bba8df2621458a78e

    • SHA256

      3cfed621658a4e0e8c205b463d4268305558222e2d04478f51437b646af4b24e

    • SHA512

      a1ae689ec32339c734ab774aab8f9cd50680ddc3545905b81b4453d6cffe33c76571055d1b342c4f5e1e98f856a3174523f04ed9b84877a995dad81b5e51a16e

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks