General

  • Target

    010cf803e4769a7cea57443a1728e15a2e9041783c04905a3822a11d57dfca4c

  • Size

    317KB

  • Sample

    220927-jxpg6aeadj

  • MD5

    85451987dd88c1337b6c0cab4777525a

  • SHA1

    b2fd78bc76f8a2060bbde5c616418101014ebfe5

  • SHA256

    010cf803e4769a7cea57443a1728e15a2e9041783c04905a3822a11d57dfca4c

  • SHA512

    7ca4fe244739ae144481c3b287672a7c45f498c741c81bbc5b8e1e34f690ff6d8513eace345d3a4f1d07efb11757798cf8d97ca5fb20459be028a90dac3ee537

  • SSDEEP

    3072:+AXQFNeXrbJ9ZG2QjVq57yR85fctEGTEQdHHaFxvqg0KcCfteV7pM/h3BsxkgaB8:+0ps2tJfcnDEFxig0nZBpnigabwVf

Malware Config

Targets

    • Target

      010cf803e4769a7cea57443a1728e15a2e9041783c04905a3822a11d57dfca4c

    • Size

      317KB

    • MD5

      85451987dd88c1337b6c0cab4777525a

    • SHA1

      b2fd78bc76f8a2060bbde5c616418101014ebfe5

    • SHA256

      010cf803e4769a7cea57443a1728e15a2e9041783c04905a3822a11d57dfca4c

    • SHA512

      7ca4fe244739ae144481c3b287672a7c45f498c741c81bbc5b8e1e34f690ff6d8513eace345d3a4f1d07efb11757798cf8d97ca5fb20459be028a90dac3ee537

    • SSDEEP

      3072:+AXQFNeXrbJ9ZG2QjVq57yR85fctEGTEQdHHaFxvqg0KcCfteV7pM/h3BsxkgaB8:+0ps2tJfcnDEFxig0nZBpnigabwVf

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks