General

  • Target

    7e89abb6c63fe75863aa690ab42f2a3f0036d729e138357fbb0640be0be83d72

  • Size

    273KB

  • Sample

    221005-nyv4jsedhj

  • MD5

    68467323a4ce2ba905d8eaa4d4776393

  • SHA1

    0e14019799ee85d2cdce58a6b79b1cce534b384b

  • SHA256

    7e89abb6c63fe75863aa690ab42f2a3f0036d729e138357fbb0640be0be83d72

  • SHA512

    3ce641c3b2e4e8b5062be7af127dfb6f477b1a69643dbae67518f4f58ea928f1197bfb3f73f98f4994595771c7ed18961b11d0b206ebd0684f3f78a765f59cac

  • SSDEEP

    6144:e+fq4ifLTv/LRmMgY20SV4buzbgwuW03wVf:eyq4ifPv/1GYquunnj

Malware Config

Targets

    • Target

      7e89abb6c63fe75863aa690ab42f2a3f0036d729e138357fbb0640be0be83d72

    • Size

      273KB

    • MD5

      68467323a4ce2ba905d8eaa4d4776393

    • SHA1

      0e14019799ee85d2cdce58a6b79b1cce534b384b

    • SHA256

      7e89abb6c63fe75863aa690ab42f2a3f0036d729e138357fbb0640be0be83d72

    • SHA512

      3ce641c3b2e4e8b5062be7af127dfb6f477b1a69643dbae67518f4f58ea928f1197bfb3f73f98f4994595771c7ed18961b11d0b206ebd0684f3f78a765f59cac

    • SSDEEP

      6144:e+fq4ifLTv/LRmMgY20SV4buzbgwuW03wVf:eyq4ifPv/1GYquunnj

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks