General

  • Target

    4250c697811711cd0f8419be1454bc5f7dceec469f21e4d3cab307998c6c88b5

  • Size

    191KB

  • Sample

    220708-dfbl3sgfa8

  • MD5

    35adb5e0a91179cad8d0acaf73e51734

  • SHA1

    047d2f48079d7ebcb2f6443feb45c54d17b5bf0a

  • SHA256

    4250c697811711cd0f8419be1454bc5f7dceec469f21e4d3cab307998c6c88b5

  • SHA512

    e16e453845381e2b90381d7102fb747c0bd9201f5fcfc0cad8638062b8027673e7abbe81a8f560dd867458bddfd9253a4021a3af7800cd9abbcea6808aa69fd5

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://mailcdn-office365.io/

http://update-vmware-service.com/

http://rocket365.to/

rc4.i32
rc4.i32

Targets

    • Target

      4250c697811711cd0f8419be1454bc5f7dceec469f21e4d3cab307998c6c88b5

    • Size

      191KB

    • MD5

      35adb5e0a91179cad8d0acaf73e51734

    • SHA1

      047d2f48079d7ebcb2f6443feb45c54d17b5bf0a

    • SHA256

      4250c697811711cd0f8419be1454bc5f7dceec469f21e4d3cab307998c6c88b5

    • SHA512

      e16e453845381e2b90381d7102fb747c0bd9201f5fcfc0cad8638062b8027673e7abbe81a8f560dd867458bddfd9253a4021a3af7800cd9abbcea6808aa69fd5

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks