General

  • Target

    43a21637f00fc733ddb3bf001b29d65198d69ffaac698aff00d1f349abf2ff94

  • Size

    260KB

  • Sample

    220707-17kqdsgbe2

  • MD5

    5d306f7d3dd9e62b9dd34fbe7788b087

  • SHA1

    a1d076b107247fae8f032a76ff11152deced7268

  • SHA256

    43a21637f00fc733ddb3bf001b29d65198d69ffaac698aff00d1f349abf2ff94

  • SHA512

    af9917b88ce7c0c9bf189769f4cc375654f15635e62aec556b8589963328ea6721415d22e16737d55c68d7f9f27bdcabffa36283c392848724736597219b525e

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://taj.co.ug/

rc4.i32
rc4.i32

Targets

    • Target

      43a21637f00fc733ddb3bf001b29d65198d69ffaac698aff00d1f349abf2ff94

    • Size

      260KB

    • MD5

      5d306f7d3dd9e62b9dd34fbe7788b087

    • SHA1

      a1d076b107247fae8f032a76ff11152deced7268

    • SHA256

      43a21637f00fc733ddb3bf001b29d65198d69ffaac698aff00d1f349abf2ff94

    • SHA512

      af9917b88ce7c0c9bf189769f4cc375654f15635e62aec556b8589963328ea6721415d22e16737d55c68d7f9f27bdcabffa36283c392848724736597219b525e

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks