General

  • Target

    37cec47f7e010eb81cdbacbe8ad5b9f46999f0f90f8bed4d2c440e358e224c51

  • Size

    235KB

  • Sample

    220625-1zpdlsfhe8

  • MD5

    190b6674a4b8403b85ed63c57223e601

  • SHA1

    278552a9deb9fe4c449b459b93f7bcb64b5db793

  • SHA256

    37cec47f7e010eb81cdbacbe8ad5b9f46999f0f90f8bed4d2c440e358e224c51

  • SHA512

    991a6793a1d017aa415efaf3bfb1818707750f17bc3b6b84f74695511e4dcd72bc588af8aeb687bb9d441a5a5cc69da866bf3dee19964baf7212661b52809488

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://ghjuytr33r.net/

http://selebtiti.net/

http://justinbiberpiror.net/

http://rebnunino.net/

http://indamixtuy.net/

http://iluiloinu.net/

http://gretianopelletua.top/

rc4.i32
rc4.i32

Targets

    • Target

      37cec47f7e010eb81cdbacbe8ad5b9f46999f0f90f8bed4d2c440e358e224c51

    • Size

      235KB

    • MD5

      190b6674a4b8403b85ed63c57223e601

    • SHA1

      278552a9deb9fe4c449b459b93f7bcb64b5db793

    • SHA256

      37cec47f7e010eb81cdbacbe8ad5b9f46999f0f90f8bed4d2c440e358e224c51

    • SHA512

      991a6793a1d017aa415efaf3bfb1818707750f17bc3b6b84f74695511e4dcd72bc588af8aeb687bb9d441a5a5cc69da866bf3dee19964baf7212661b52809488

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

4
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

4
T1082

Tasks