General

  • Target

    3524f3e7e62a4e65660036ce458e9e7250d59e451064829e926a8d1921adfb6b

  • Size

    180KB

  • Sample

    220619-xcyrzsbcg8

  • MD5

    17d0624e2112f2b45bf64ee26961d26b

  • SHA1

    602c70f7d076af2c296e92cad90f75e99cb7fd58

  • SHA256

    3524f3e7e62a4e65660036ce458e9e7250d59e451064829e926a8d1921adfb6b

  • SHA512

    52c55cb76101b0ccc1098c659a48d03a7cc6a977f289cff93de6ae2172b918852688fcbb445364747d307d1fcb424f26a0ae84e053541bd7e4a78f0002f7a54c

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://sndk22ookk.us/2/

rc4.i32
rc4.i32

Targets

    • Target

      3524f3e7e62a4e65660036ce458e9e7250d59e451064829e926a8d1921adfb6b

    • Size

      180KB

    • MD5

      17d0624e2112f2b45bf64ee26961d26b

    • SHA1

      602c70f7d076af2c296e92cad90f75e99cb7fd58

    • SHA256

      3524f3e7e62a4e65660036ce458e9e7250d59e451064829e926a8d1921adfb6b

    • SHA512

      52c55cb76101b0ccc1098c659a48d03a7cc6a977f289cff93de6ae2172b918852688fcbb445364747d307d1fcb424f26a0ae84e053541bd7e4a78f0002f7a54c

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks