General

  • Target

    2fa1797aa2a9ec78fb9952fe164a445736d807c76e03109e09fe5742d3e5c6db

  • Size

    32KB

  • Sample

    220625-j7zqwafad2

  • MD5

    00d3223047c02991f7ef1ce3a6b4f92e

  • SHA1

    4f0fc6f1b7f8daefe68b68720271690e7b3c59db

  • SHA256

    2fa1797aa2a9ec78fb9952fe164a445736d807c76e03109e09fe5742d3e5c6db

  • SHA512

    6811f4faf35823596ef6f82743cf477e8db0293fb8243e50a6b4dfac010c90476970dd5408f49b00de442b43a1a222ff213d3053fcbaec6fe3552e710083457c

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://britbox.us/2/

rc4.i32
rc4.i32

Targets

    • Target

      2fa1797aa2a9ec78fb9952fe164a445736d807c76e03109e09fe5742d3e5c6db

    • Size

      32KB

    • MD5

      00d3223047c02991f7ef1ce3a6b4f92e

    • SHA1

      4f0fc6f1b7f8daefe68b68720271690e7b3c59db

    • SHA256

      2fa1797aa2a9ec78fb9952fe164a445736d807c76e03109e09fe5742d3e5c6db

    • SHA512

      6811f4faf35823596ef6f82743cf477e8db0293fb8243e50a6b4dfac010c90476970dd5408f49b00de442b43a1a222ff213d3053fcbaec6fe3552e710083457c

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks