General

  • Target

    4d6c1f34a629bc82df89b2eeacb1a6ae7d8f3915841f962ad88196e5b83922e0

  • Size

    261KB

  • Sample

    220712-dj6xdsaha7

  • MD5

    0083ae5e50b7b2f03d941a3a0daa9d70

  • SHA1

    84b0b7369f63ab59c7fca021cfcc1b8e7c6ec8b4

  • SHA256

    4d6c1f34a629bc82df89b2eeacb1a6ae7d8f3915841f962ad88196e5b83922e0

  • SHA512

    cfbdc14e4f65edef789386c4709c87e457830c4c102e215e3e082c8b7754346794e8e19a0a4a51249654adec29b6986d6ee3aa56bf384e87fccce38dc8e3eef2

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://taj.co.ug/

rc4.i32
rc4.i32

Targets

    • Target

      4d6c1f34a629bc82df89b2eeacb1a6ae7d8f3915841f962ad88196e5b83922e0

    • Size

      261KB

    • MD5

      0083ae5e50b7b2f03d941a3a0daa9d70

    • SHA1

      84b0b7369f63ab59c7fca021cfcc1b8e7c6ec8b4

    • SHA256

      4d6c1f34a629bc82df89b2eeacb1a6ae7d8f3915841f962ad88196e5b83922e0

    • SHA512

      cfbdc14e4f65edef789386c4709c87e457830c4c102e215e3e082c8b7754346794e8e19a0a4a51249654adec29b6986d6ee3aa56bf384e87fccce38dc8e3eef2

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks