General

  • Target

    2e42b0bed4d0228cde60b27436b54eef.exe

  • Size

    275KB

  • Sample

    221010-wkqkxachel

  • MD5

    2e42b0bed4d0228cde60b27436b54eef

  • SHA1

    0ad015065304467a659575eca8e322485982eda2

  • SHA256

    7e24caf0355d2816bec83ce942643a52213d676f5ebf03f2ff40d46c2af8ce21

  • SHA512

    1519f668f81b7fc412e29c0726b7c46a216dc8adb64117eb7533d8e0cc2e676a2510965d022e255384cf54d5b6c0f33c33ca0e38fef255bf5d21228f64300e27

  • SSDEEP

    3072:uXrN9JMhlH3THrjUggq5fbn8+F2XNrEuZ29rBFrDv2i2bC0QhOM/h3qpZa9uD6Vq:2Z9JMTHbEYbnOXWNzr7HHhOrwVfquS

Malware Config

Targets

    • Target

      2e42b0bed4d0228cde60b27436b54eef.exe

    • Size

      275KB

    • MD5

      2e42b0bed4d0228cde60b27436b54eef

    • SHA1

      0ad015065304467a659575eca8e322485982eda2

    • SHA256

      7e24caf0355d2816bec83ce942643a52213d676f5ebf03f2ff40d46c2af8ce21

    • SHA512

      1519f668f81b7fc412e29c0726b7c46a216dc8adb64117eb7533d8e0cc2e676a2510965d022e255384cf54d5b6c0f33c33ca0e38fef255bf5d21228f64300e27

    • SSDEEP

      3072:uXrN9JMhlH3THrjUggq5fbn8+F2XNrEuZ29rBFrDv2i2bC0QhOM/h3qpZa9uD6Vq:2Z9JMTHbEYbnOXWNzr7HHhOrwVfquS

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks