General

  • Target

    3d2777b748e805c0463c0c6d0fef8280ad197bea1dd0a25e30ed71199989a6b9

  • Size

    223KB

  • Sample

    220703-emx94aeefl

  • MD5

    e5d1503657a6e51546cd31086675857f

  • SHA1

    8f4be30eef17a5b885f1db206baf9aef1722a30d

  • SHA256

    3d2777b748e805c0463c0c6d0fef8280ad197bea1dd0a25e30ed71199989a6b9

  • SHA512

    ddd2b77018266257fd71c489826ddb137c5c88331316a31602159cfe29e2d80ee8d9d091059568407d42addcf51273571d893646d374ae1e58572d8ed585c2cf

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://segodnya.bit/biologe/

rc4.i32
rc4.i32

Targets

    • Target

      3d2777b748e805c0463c0c6d0fef8280ad197bea1dd0a25e30ed71199989a6b9

    • Size

      223KB

    • MD5

      e5d1503657a6e51546cd31086675857f

    • SHA1

      8f4be30eef17a5b885f1db206baf9aef1722a30d

    • SHA256

      3d2777b748e805c0463c0c6d0fef8280ad197bea1dd0a25e30ed71199989a6b9

    • SHA512

      ddd2b77018266257fd71c489826ddb137c5c88331316a31602159cfe29e2d80ee8d9d091059568407d42addcf51273571d893646d374ae1e58572d8ed585c2cf

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks