General

  • Target

    33da41344a1e43cadf3a2a310d7495b863da577295604f4e3f1f6d114a3f763e

  • Size

    116KB

  • Sample

    220619-3yx1gaagd2

  • MD5

    4c3ca18bb33f4a1c85b4ce52d0e0494e

  • SHA1

    c3993464bd60deea1506508c8e52c7c27b903c09

  • SHA256

    33da41344a1e43cadf3a2a310d7495b863da577295604f4e3f1f6d114a3f763e

  • SHA512

    49377df2b8aca23a648886f976989f6e3abd69c387abc5808a1c1db8bf13575da8824c9237a69330091a567ca833fc78d6bb0849994d68ceece4d1746b4e880f

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://manage.9387723658221.com/

http://9387723658221.bit/

rc4.i32
rc4.i32

Targets

    • Target

      Config.dll

    • Size

      1.7MB

    • MD5

      d7ac22fd3d579804a58b088597c7dc60

    • SHA1

      fe2f27b7cde004cebe685c4fc8a192ce171eb9c6

    • SHA256

      d1107f2e18245112b7960be5b33d2bb5cfac3069b803a90318a4edad3a151f79

    • SHA512

      1eae887ffd79ca17dbe618900c1500d6ee46b0eb2206020ecad9ca8cc5946c7e429d0d1f4508bfec30a4b3dd48485752c59ab9ffbe47cbbe84cd5da9000e8173

    Score
    1/10
    • Target

      Injector.exe

    • Size

      132KB

    • MD5

      27915d97f362953b6b8642f0948968ee

    • SHA1

      2a08177046213e214d11787bba8df2621458a78e

    • SHA256

      3cfed621658a4e0e8c205b463d4268305558222e2d04478f51437b646af4b24e

    • SHA512

      a1ae689ec32339c734ab774aab8f9cd50680ddc3545905b81b4453d6cffe33c76571055d1b342c4f5e1e98f856a3174523f04ed9b84877a995dad81b5e51a16e

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks