General

  • Target

    3c27269f2de144740bb95d830753dc7c641398b2885ce92864df6600978bd889

  • Size

    191KB

  • Sample

    220703-kcctasebd7

  • MD5

    c8024410bdb45175b86e1d1052ef2873

  • SHA1

    a3773e9ee8cbc1e52d96819e9dfdc1eb2996f6e7

  • SHA256

    3c27269f2de144740bb95d830753dc7c641398b2885ce92864df6600978bd889

  • SHA512

    7fef189a73ef43911c2e554a4f0e697f573d1f2c5f327902eb3dde98e4b46c08d723c94540abc3f3f35206eb70e8e5374eda43f9c5c74d3fdd1204b4af30581c

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://159.89.109.130/

http://cdvfrt5.com/

http://43trfdsds.com/

http://2344t554ddfr.com/

rc4.i32
rc4.i32

Targets

    • Target

      frss3003cr41.exe

    • Size

      392KB

    • MD5

      13386d8d3d7fd0348522df0704d3c4cb

    • SHA1

      dddd2bd201429c3d3bc8e08fdfc16003814f8cbc

    • SHA256

      3201717abd45129769fd548e1b310f1f349f3440729ee800f23c6a5fdf7a8d5b

    • SHA512

      c30e2c14573ae8222981cb39809c63d1f8b948c09e5ff45859478f4c6593df7b6ca15724e25f52c403dda1bedecc3cfd90ed18a374cfebb10e9e403ed5556f5b

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks