General

  • Target

    4d5ee163a14bcd7f1a159aec5b880557eb1bbb033fb3375288ad589d662151e2

  • Size

    351KB

  • Sample

    220712-dqlj2agfbk

  • MD5

    19d9d16d796b3835d7043c4d38dc8220

  • SHA1

    35a808a21f7caec683a81857ad694edfef9cd6c3

  • SHA256

    4d5ee163a14bcd7f1a159aec5b880557eb1bbb033fb3375288ad589d662151e2

  • SHA512

    899248b6dd7b75316f46a9c79a337a8ba75d29f24e255c1b1953738211af035ba58ea12e89fb02d466569f34515b8d869a05d4ec03597a14e08ffc03ccd09d3a

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://185.222.201.63/

rc4.i32
rc4.i32

Targets

    • Target

      4d5ee163a14bcd7f1a159aec5b880557eb1bbb033fb3375288ad589d662151e2

    • Size

      351KB

    • MD5

      19d9d16d796b3835d7043c4d38dc8220

    • SHA1

      35a808a21f7caec683a81857ad694edfef9cd6c3

    • SHA256

      4d5ee163a14bcd7f1a159aec5b880557eb1bbb033fb3375288ad589d662151e2

    • SHA512

      899248b6dd7b75316f46a9c79a337a8ba75d29f24e255c1b1953738211af035ba58ea12e89fb02d466569f34515b8d869a05d4ec03597a14e08ffc03ccd09d3a

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks