General

  • Target

    34ad8276994a33159a930e071d3b8c6d

  • Size

    218KB

  • Sample

    220620-vl6svahhd3

  • MD5

    34ad8276994a33159a930e071d3b8c6d

  • SHA1

    f800ecc2df2b2c9a77c5c316685d5521b856c14b

  • SHA256

    29c05aa1ff99bec33ca06115404a2dbe2d6123ea16080e675a6cdf03838f71b3

  • SHA512

    314120bf415df4a64aadd59ca00b08c25f957af4ef1d68893859863dbfc05e0f44697113fcfe7f52a7a149da728a260f16601f29bfbf6d2becc2f3a8dc8a80e5

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://lufdx2.com/2/

http://gvs1.in/2/

http://jdcbhs.ru/2/

http://m21ch.com/2/

http://gdlvw1.com/2/

rc4.i32
rc4.i32

Targets

    • Target

      34ad8276994a33159a930e071d3b8c6d

    • Size

      218KB

    • MD5

      34ad8276994a33159a930e071d3b8c6d

    • SHA1

      f800ecc2df2b2c9a77c5c316685d5521b856c14b

    • SHA256

      29c05aa1ff99bec33ca06115404a2dbe2d6123ea16080e675a6cdf03838f71b3

    • SHA512

      314120bf415df4a64aadd59ca00b08c25f957af4ef1d68893859863dbfc05e0f44697113fcfe7f52a7a149da728a260f16601f29bfbf6d2becc2f3a8dc8a80e5

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks