General

  • Target

    file.exe

  • Size

    186KB

  • Sample

    221123-k56l3sac66

  • MD5

    a1459c570face3f3eae78496ac288a06

  • SHA1

    6169a9da842c46f53423d1ffc5fed891824664e7

  • SHA256

    c0b3e8361edf417d689ce08ed889646d0d396bcaa8a52feb1e5dbb6fd39c7432

  • SHA512

    295df76711999f63d652745af7f21b68d534fe2b90aa1d25cfa38755f2d86d982d7d4486615f4baaa030c8d6fa2df05a4e547a6df7059b7cf4dfb510203c0b3e

  • SSDEEP

    3072:3BIElgxVBhL8JafGW8wD52poHtv8YxhOAYi0cF73VTBCBkZ:aEyDLgafG/nwkDLFcZ5A2

Malware Config

Targets

    • Target

      file.exe

    • Size

      186KB

    • MD5

      a1459c570face3f3eae78496ac288a06

    • SHA1

      6169a9da842c46f53423d1ffc5fed891824664e7

    • SHA256

      c0b3e8361edf417d689ce08ed889646d0d396bcaa8a52feb1e5dbb6fd39c7432

    • SHA512

      295df76711999f63d652745af7f21b68d534fe2b90aa1d25cfa38755f2d86d982d7d4486615f4baaa030c8d6fa2df05a4e547a6df7059b7cf4dfb510203c0b3e

    • SSDEEP

      3072:3BIElgxVBhL8JafGW8wD52poHtv8YxhOAYi0cF73VTBCBkZ:aEyDLgafG/nwkDLFcZ5A2

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks