General

  • Target

    fa0f4e959fa71afb411b0e389bd9b6401407c7074a8fd049d557cba683f7a856

  • Size

    1.4MB

  • Sample

    221116-ksbk6sdg5w

  • MD5

    fc330692d17e8cbea9ebe300ed6077de

  • SHA1

    93e67adbf89bed48a8f9d81de6d15baa88721795

  • SHA256

    fa0f4e959fa71afb411b0e389bd9b6401407c7074a8fd049d557cba683f7a856

  • SHA512

    7732430ba48f1a541f687be30eacfec57e24fa2cd22fb416fd135d3db59c7e681e93611e575688d42f8497186411a65d04d6d1f9aba73cc30a26ed215b70b941

  • SSDEEP

    24576:dcEttPVEw1JS1ttl9hnsfQEvIHWBZlRrzl5qPcWOO7BkSG1L1BAT:X9iwSblAfQiI2jz/qPcWBKzLA

Malware Config

Targets

    • Target

      fa0f4e959fa71afb411b0e389bd9b6401407c7074a8fd049d557cba683f7a856

    • Size

      1.4MB

    • MD5

      fc330692d17e8cbea9ebe300ed6077de

    • SHA1

      93e67adbf89bed48a8f9d81de6d15baa88721795

    • SHA256

      fa0f4e959fa71afb411b0e389bd9b6401407c7074a8fd049d557cba683f7a856

    • SHA512

      7732430ba48f1a541f687be30eacfec57e24fa2cd22fb416fd135d3db59c7e681e93611e575688d42f8497186411a65d04d6d1f9aba73cc30a26ed215b70b941

    • SSDEEP

      24576:dcEttPVEw1JS1ttl9hnsfQEvIHWBZlRrzl5qPcWOO7BkSG1L1BAT:X9iwSblAfQiI2jz/qPcWBKzLA

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Detects Smokeloader packer

    • Modifies security service

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Stops running service(s)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

2
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Impair Defenses

1
T1562

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Impact

Service Stop

1
T1489

Tasks