General

  • Target

    file.exe

  • Size

    186KB

  • Sample

    221123-zwkqksdh87

  • MD5

    212889c268e37fdf0052b3ec0e6dd6fe

  • SHA1

    78037cf5caa71fb7ab0f9fa44b22dc988cfab2c0

  • SHA256

    438aa9cc91d13dfa86644426b8f90be7f3302bbdbb70fcd71b3ede8c5ff9e464

  • SHA512

    549c9adc2d0346162854d34aeea5d55490e071e64705c8549f8e41a18af75502bbf913afb095240380e748fe67a906c82115948f924f0aa33e1b9f1899d878b4

  • SSDEEP

    3072:WkfRIWEJ/Fk2wLE4k3Vxj5RttJFtDQ5KMoupWGERWM:XfKwLE4iXbJFDhVGEg

Malware Config

Targets

    • Target

      file.exe

    • Size

      186KB

    • MD5

      212889c268e37fdf0052b3ec0e6dd6fe

    • SHA1

      78037cf5caa71fb7ab0f9fa44b22dc988cfab2c0

    • SHA256

      438aa9cc91d13dfa86644426b8f90be7f3302bbdbb70fcd71b3ede8c5ff9e464

    • SHA512

      549c9adc2d0346162854d34aeea5d55490e071e64705c8549f8e41a18af75502bbf913afb095240380e748fe67a906c82115948f924f0aa33e1b9f1899d878b4

    • SSDEEP

      3072:WkfRIWEJ/Fk2wLE4k3Vxj5RttJFtDQ5KMoupWGERWM:XfKwLE4iXbJFDhVGEg

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks