General

  • Target

    4aa6cc23c7a6dfb9ec83918c987d439b44d6cdc7e2047c539ee22fad5165e783

  • Size

    100KB

  • Sample

    220625-v5zhwafgh3

  • MD5

    353055e160858b668a5d3af3f574e9b4

  • SHA1

    364138438342df6979867d5073fe983bf1e66236

  • SHA256

    4aa6cc23c7a6dfb9ec83918c987d439b44d6cdc7e2047c539ee22fad5165e783

  • SHA512

    5ba5b7d28e0da2b68f7c95d02e639d0f0ad4cc730c6435df5d0381978024713beeed81ea2df9cba06b080749e090c7703a9d27c3a39df763e1dcae47a3d30c24

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://attributivelyberkshire.bid/

http://aureomycinsschoenberg.bid/

http://winfredsbucharests.bid/

rc4.i32
rc4.i32

Targets

    • Target

      4aa6cc23c7a6dfb9ec83918c987d439b44d6cdc7e2047c539ee22fad5165e783

    • Size

      100KB

    • MD5

      353055e160858b668a5d3af3f574e9b4

    • SHA1

      364138438342df6979867d5073fe983bf1e66236

    • SHA256

      4aa6cc23c7a6dfb9ec83918c987d439b44d6cdc7e2047c539ee22fad5165e783

    • SHA512

      5ba5b7d28e0da2b68f7c95d02e639d0f0ad4cc730c6435df5d0381978024713beeed81ea2df9cba06b080749e090c7703a9d27c3a39df763e1dcae47a3d30c24

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks