General

  • Target

    file.exe

  • Size

    327KB

  • Sample

    220927-1bbgvafgcj

  • MD5

    f7d6ed5098ddee5b5dcc13e14c897cb5

  • SHA1

    c26568b832642693500dc11fb83b9ecb28ae61c9

  • SHA256

    769843da42daf9319291b34e5910726d19ed2b339ba339218a92116fe6714456

  • SHA512

    3a971918b18ba84f227661e4bb6cc2da83430a267b78711e36274eddc31da2b3def23d7ef91353d25bffdbd52b9457868bc303c08d51938142be372e7da7d3e6

  • SSDEEP

    6144:tubXjKXVyAkQS2f6axLWn08AnigabwVfs:tubzmY+S2frtNiB

Malware Config

Targets

    • Target

      file.exe

    • Size

      327KB

    • MD5

      f7d6ed5098ddee5b5dcc13e14c897cb5

    • SHA1

      c26568b832642693500dc11fb83b9ecb28ae61c9

    • SHA256

      769843da42daf9319291b34e5910726d19ed2b339ba339218a92116fe6714456

    • SHA512

      3a971918b18ba84f227661e4bb6cc2da83430a267b78711e36274eddc31da2b3def23d7ef91353d25bffdbd52b9457868bc303c08d51938142be372e7da7d3e6

    • SSDEEP

      6144:tubXjKXVyAkQS2f6axLWn08AnigabwVfs:tubzmY+S2frtNiB

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks