General

  • Target

    3e8e4989ef8a5d1b78bd13057bdb7b479b7d5491d72ead5ce4220eba3ff4d068

  • Size

    167KB

  • Sample

    220624-2gyd8sffbn

  • MD5

    77e51b7fa83595cf39456c3a162a4128

  • SHA1

    7c73b30d51a2969cc37b069c34ecefc11bde9c67

  • SHA256

    3e8e4989ef8a5d1b78bd13057bdb7b479b7d5491d72ead5ce4220eba3ff4d068

  • SHA512

    da0b9c71bef360edafd198d2d4f37d4d908db154f831c0f6601b949e6ef312ea01ed257c3aaed611e0fcd5ee1620a43c87540d76d344748457a55ab034d47350

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://ghjk78kjhb.net/

http://cleancleankkl.net/

http://dunujilis11r.net/

http://sulionuili1.in/

http://eseruuynli2.net/

http://nulikuliey.net/

http://oohdojssks9uf.net/

rc4.i32
rc4.i32

Targets

    • Target

      3e8e4989ef8a5d1b78bd13057bdb7b479b7d5491d72ead5ce4220eba3ff4d068

    • Size

      167KB

    • MD5

      77e51b7fa83595cf39456c3a162a4128

    • SHA1

      7c73b30d51a2969cc37b069c34ecefc11bde9c67

    • SHA256

      3e8e4989ef8a5d1b78bd13057bdb7b479b7d5491d72ead5ce4220eba3ff4d068

    • SHA512

      da0b9c71bef360edafd198d2d4f37d4d908db154f831c0f6601b949e6ef312ea01ed257c3aaed611e0fcd5ee1620a43c87540d76d344748457a55ab034d47350

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks