General

  • Target

    8ffaf5cbc7721331880c116468523f54bc3a859186c2d568d3fd347371f97347

  • Size

    169KB

  • Sample

    220625-v54gtsfgh8

  • MD5

    7faebdf5da16c20f3a2779cbead5524a

  • SHA1

    d5a9290830a19f12d10a1df768698cf5e8e6a9cc

  • SHA256

    8ffaf5cbc7721331880c116468523f54bc3a859186c2d568d3fd347371f97347

  • SHA512

    7511ba6158611714d1b4e2668ecc272345bb765cfa53e07d473ae5dd8810c87a3eb91aa410bc39fb502a2011ade84ed4ad3abfe22b4459e446d21a9d15b79476

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://ghjk78kjhb.net/

http://cleancleankkl.net/

http://dunujilis11r.net/

http://sulionuili1.in/

http://eseruuynli2.net/

http://nulikuliey.net/

http://oohdojssks9uf.net/

rc4.i32
rc4.i32

Targets

    • Target

      8ffaf5cbc7721331880c116468523f54bc3a859186c2d568d3fd347371f97347

    • Size

      169KB

    • MD5

      7faebdf5da16c20f3a2779cbead5524a

    • SHA1

      d5a9290830a19f12d10a1df768698cf5e8e6a9cc

    • SHA256

      8ffaf5cbc7721331880c116468523f54bc3a859186c2d568d3fd347371f97347

    • SHA512

      7511ba6158611714d1b4e2668ecc272345bb765cfa53e07d473ae5dd8810c87a3eb91aa410bc39fb502a2011ade84ed4ad3abfe22b4459e446d21a9d15b79476

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks