General

  • Target

    4ba216371decc1e0a7f268f786b34d4d3aafbe5e9df44ccbd4f7efe29ec48e8b

  • Size

    162KB

  • Sample

    220712-k9pjcsbffq

  • MD5

    ecd93bb6baab6cc33fc0356bc9a65a41

  • SHA1

    c7fa01546a5407c5f652789d5960321799dc79c9

  • SHA256

    4ba216371decc1e0a7f268f786b34d4d3aafbe5e9df44ccbd4f7efe29ec48e8b

  • SHA512

    015e3b366b119428f6ba36f6aafdf563d49b4ddc283c1567c7ed737aeeb4d100f9d4bc786fbeab2def81bd177063f0b445d8dd58602d283296e633e34209d9b9

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://proxy-exe.bit/2/

http://kiyanka.club/2/

http://d3s1.me/2/

rc4.i32
rc4.i32

Targets

    • Target

      4ba216371decc1e0a7f268f786b34d4d3aafbe5e9df44ccbd4f7efe29ec48e8b

    • Size

      162KB

    • MD5

      ecd93bb6baab6cc33fc0356bc9a65a41

    • SHA1

      c7fa01546a5407c5f652789d5960321799dc79c9

    • SHA256

      4ba216371decc1e0a7f268f786b34d4d3aafbe5e9df44ccbd4f7efe29ec48e8b

    • SHA512

      015e3b366b119428f6ba36f6aafdf563d49b4ddc283c1567c7ed737aeeb4d100f9d4bc786fbeab2def81bd177063f0b445d8dd58602d283296e633e34209d9b9

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks