General

  • Target

    ff3a2f36acd2e6ac2ff9d8fbca3689da2260b52fb46acc2b116a74f996a7038f

  • Size

    166KB

  • Sample

    220701-hw58vaagc7

  • MD5

    ae41e8e98cd8ba4856f463ffc4ee1d50

  • SHA1

    61c9952e0596efd1a49461c9f9dc761618e37ec4

  • SHA256

    ff3a2f36acd2e6ac2ff9d8fbca3689da2260b52fb46acc2b116a74f996a7038f

  • SHA512

    d38715d96b11d8cedad0a44fdecf981b251922be9ecc420d332153c1afc0eec4ca566de6f6ba04c21fc67006e56bc76950e7fd9321c0a648201fe51a92ce7789

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://extraterrestrial.is/

http://extraterrestrial5.ru/

rc4.i32
rc4.i32

Targets

    • Target

      ff3a2f36acd2e6ac2ff9d8fbca3689da2260b52fb46acc2b116a74f996a7038f

    • Size

      166KB

    • MD5

      ae41e8e98cd8ba4856f463ffc4ee1d50

    • SHA1

      61c9952e0596efd1a49461c9f9dc761618e37ec4

    • SHA256

      ff3a2f36acd2e6ac2ff9d8fbca3689da2260b52fb46acc2b116a74f996a7038f

    • SHA512

      d38715d96b11d8cedad0a44fdecf981b251922be9ecc420d332153c1afc0eec4ca566de6f6ba04c21fc67006e56bc76950e7fd9321c0a648201fe51a92ce7789

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks