General

  • Target

    45381b6760273d3043fc842cfad1f518dff61f3873ea212327695cb6e34a02bb

  • Size

    167KB

  • Sample

    220707-t2wr5sdbf4

  • MD5

    8c156209a8bc73f6bca4f3903fb26c41

  • SHA1

    5a9a63dc1616070dac34e5feedcde929a755ad51

  • SHA256

    45381b6760273d3043fc842cfad1f518dff61f3873ea212327695cb6e34a02bb

  • SHA512

    62abe50f74aec0864032ab45d107de14682aed1c16e35ad3ccdfed5199fda5846241d009da1d7bcad9a281a69641933b9f3a62149e0e24b6f3160b1112d0e4f4

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://ghjuytr33r.net/

http://selebtiti.net/

http://justinbiberpiror.net/

http://rebnunino.net/

http://indamixtuy.net/

http://iluiloinu.net/

http://gretianopelletua.top/

rc4.i32
rc4.i32

Targets

    • Target

      45381b6760273d3043fc842cfad1f518dff61f3873ea212327695cb6e34a02bb

    • Size

      167KB

    • MD5

      8c156209a8bc73f6bca4f3903fb26c41

    • SHA1

      5a9a63dc1616070dac34e5feedcde929a755ad51

    • SHA256

      45381b6760273d3043fc842cfad1f518dff61f3873ea212327695cb6e34a02bb

    • SHA512

      62abe50f74aec0864032ab45d107de14682aed1c16e35ad3ccdfed5199fda5846241d009da1d7bcad9a281a69641933b9f3a62149e0e24b6f3160b1112d0e4f4

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks