General

  • Target

    4ee994a990d86877f5c74f7c9026c2bcbd24334d912e7622021b1d55712e4ed0

  • Size

    189KB

  • Sample

    221124-3x43dsge23

  • MD5

    2d18170d2cb46c100e86f2d48edbb98c

  • SHA1

    d418d5a5a6a0b3b62ffc6234a86e8c07c7bec74d

  • SHA256

    4ee994a990d86877f5c74f7c9026c2bcbd24334d912e7622021b1d55712e4ed0

  • SHA512

    d9980d03babc9f5274f5d7170bac8c19cfd9034748924a56fafcf79c308a27692d97b74530f5980111477425a59715b1537b9150d023769ede8012d340a5ba98

  • SSDEEP

    3072:7Dp0P9WeVftNLVt6IG54KD55cchZ520kRG1mxV6PqIGBxvi2swB5SPxNa8:vpULVt6Ivm/LkRG1oV6PqDzDgpo8

Malware Config

Targets

    • Target

      4ee994a990d86877f5c74f7c9026c2bcbd24334d912e7622021b1d55712e4ed0

    • Size

      189KB

    • MD5

      2d18170d2cb46c100e86f2d48edbb98c

    • SHA1

      d418d5a5a6a0b3b62ffc6234a86e8c07c7bec74d

    • SHA256

      4ee994a990d86877f5c74f7c9026c2bcbd24334d912e7622021b1d55712e4ed0

    • SHA512

      d9980d03babc9f5274f5d7170bac8c19cfd9034748924a56fafcf79c308a27692d97b74530f5980111477425a59715b1537b9150d023769ede8012d340a5ba98

    • SSDEEP

      3072:7Dp0P9WeVftNLVt6IG54KD55cchZ520kRG1mxV6PqIGBxvi2swB5SPxNa8:vpULVt6Ivm/LkRG1oV6PqDzDgpo8

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks