General

  • Target

    3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a

  • Size

    1.5MB

  • Sample

    220625-wbzgfseabk

  • MD5

    e7418166327850a7fa1b63e83e608115

  • SHA1

    ef5697e60c83b41953bb6f9f04cb3a0d3a71fc2e

  • SHA256

    3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a

  • SHA512

    c8b07a467ae66635b57b915b65b0a97d930183c0c3857f2e3b020079221b5ede1dd51f4f9b8ede661fc4dad8d4c5146870bc1480f64a1971c28cf70d4ffff3eb

Malware Config

Extracted

Family

smokeloader

Version

2017

C2

http://dogewareservice.ru/

Targets

    • Target

      3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a

    • Size

      1.5MB

    • MD5

      e7418166327850a7fa1b63e83e608115

    • SHA1

      ef5697e60c83b41953bb6f9f04cb3a0d3a71fc2e

    • SHA256

      3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a

    • SHA512

      c8b07a467ae66635b57b915b65b0a97d930183c0c3857f2e3b020079221b5ede1dd51f4f9b8ede661fc4dad8d4c5146870bc1480f64a1971c28cf70d4ffff3eb

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Drops desktop.ini file(s)

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks