General

  • Target

    44bc4363ec41247d13997acf8cf8eceb23502d491b86b72402afb1a04d90c6b9

  • Size

    140KB

  • Sample

    220707-wy8nmsgeg3

  • MD5

    ebb00cdd113fd1f2335425de5066c02f

  • SHA1

    de5e1f6d29b92bc801872032631311ea2573756c

  • SHA256

    44bc4363ec41247d13997acf8cf8eceb23502d491b86b72402afb1a04d90c6b9

  • SHA512

    fd055ac501d0c04409148cd2f9a64e110072ae5c48a89f7f4d326dfd17b6fbf82df84aa1a2ab68f70dd7ef34f493017f9e0dcdf9e24ddd1fe45640b6a064f113

Malware Config

Extracted

Family

smokeloader

Version

2017

C2

http://dogewareservice.ru/

Targets

    • Target

      44bc4363ec41247d13997acf8cf8eceb23502d491b86b72402afb1a04d90c6b9

    • Size

      140KB

    • MD5

      ebb00cdd113fd1f2335425de5066c02f

    • SHA1

      de5e1f6d29b92bc801872032631311ea2573756c

    • SHA256

      44bc4363ec41247d13997acf8cf8eceb23502d491b86b72402afb1a04d90c6b9

    • SHA512

      fd055ac501d0c04409148cd2f9a64e110072ae5c48a89f7f4d326dfd17b6fbf82df84aa1a2ab68f70dd7ef34f493017f9e0dcdf9e24ddd1fe45640b6a064f113

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks