General

  • Target

    file.exe

  • Size

    187KB

  • Sample

    221123-halmbadf78

  • MD5

    d50151680615c2bcd433c1e60e41056e

  • SHA1

    ebb801bbf3d49670d485c6fd5e7aff568aa090a4

  • SHA256

    2bffd5b400289f8b921a8f338e4603f3d373d24dc61ecb085f02ed573b99983d

  • SHA512

    c1985931d97325e4ad219a572da8e33f14ab74f9b8e482c3718f203542c2d2c21a23c5d32a9cfece9ca37d049ffdd27307e1f7d312b5639926f23b7527e20636

  • SSDEEP

    3072:hEKdQd8soLGUiWZwvj5EWUaQrZ/bcm8uiROpZhqG6tzrsj/:1d1LGUiS1raMtb2ui0Z0tzq

Malware Config

Targets

    • Target

      file.exe

    • Size

      187KB

    • MD5

      d50151680615c2bcd433c1e60e41056e

    • SHA1

      ebb801bbf3d49670d485c6fd5e7aff568aa090a4

    • SHA256

      2bffd5b400289f8b921a8f338e4603f3d373d24dc61ecb085f02ed573b99983d

    • SHA512

      c1985931d97325e4ad219a572da8e33f14ab74f9b8e482c3718f203542c2d2c21a23c5d32a9cfece9ca37d049ffdd27307e1f7d312b5639926f23b7527e20636

    • SSDEEP

      3072:hEKdQd8soLGUiWZwvj5EWUaQrZ/bcm8uiROpZhqG6tzrsj/:1d1LGUiS1raMtb2ui0Z0tzq

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks