General

  • Target

    37ed68aee4058d34bd22f90437278b7ce42117c7b2c210e8249897c058ebf188

  • Size

    1.2MB

  • Sample

    220625-1kkrwadbel

  • MD5

    8d3cfd4833fe6e76b2ab81debad00ecb

  • SHA1

    d494f874670db0d1de4805557fa80e93d24bba05

  • SHA256

    37ed68aee4058d34bd22f90437278b7ce42117c7b2c210e8249897c058ebf188

  • SHA512

    c0daef8f6983850c2fae1a3f8a5c94847dfd2dc8e84ac91861aa31ecb91236917b953a8536f24d77eddbe28842416f40fb90d8534d9e1367a2b4d11b5ecb3448

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://smb3ans.pw/bn/

rc4.i32
rc4.i32

Targets

    • Target

      37ed68aee4058d34bd22f90437278b7ce42117c7b2c210e8249897c058ebf188

    • Size

      1.2MB

    • MD5

      8d3cfd4833fe6e76b2ab81debad00ecb

    • SHA1

      d494f874670db0d1de4805557fa80e93d24bba05

    • SHA256

      37ed68aee4058d34bd22f90437278b7ce42117c7b2c210e8249897c058ebf188

    • SHA512

      c0daef8f6983850c2fae1a3f8a5c94847dfd2dc8e84ac91861aa31ecb91236917b953a8536f24d77eddbe28842416f40fb90d8534d9e1367a2b4d11b5ecb3448

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks