General

  • Target

    42fdaffdbacfdf85945bd0e8bfaadb765dde622a0a7268f8aa70cd18c91a0e85

  • Size

    347KB

  • Sample

    220708-ap1e1scbg3

  • MD5

    dfde251e78c00be7bef1a30a14d42bf9

  • SHA1

    8209d4ddce0a4d6524efbb16c1ba1d504fa78ab0

  • SHA256

    42fdaffdbacfdf85945bd0e8bfaadb765dde622a0a7268f8aa70cd18c91a0e85

  • SHA512

    5e62b6eb8e18ea7d42ef1eb2adf158299c3f27896bc19ef00f29f26ca38bc634e42717a073a8aa24a186b2c893c2623ae477852b1e0de1d352910b4760190019

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://jma-go.jp/js/metrology/jma.php

rc4.i32
rc4.i32

Targets

    • Target

      42fdaffdbacfdf85945bd0e8bfaadb765dde622a0a7268f8aa70cd18c91a0e85

    • Size

      347KB

    • MD5

      dfde251e78c00be7bef1a30a14d42bf9

    • SHA1

      8209d4ddce0a4d6524efbb16c1ba1d504fa78ab0

    • SHA256

      42fdaffdbacfdf85945bd0e8bfaadb765dde622a0a7268f8aa70cd18c91a0e85

    • SHA512

      5e62b6eb8e18ea7d42ef1eb2adf158299c3f27896bc19ef00f29f26ca38bc634e42717a073a8aa24a186b2c893c2623ae477852b1e0de1d352910b4760190019

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks