General

  • Target

    file.exe

  • Size

    151KB

  • Sample

    221127-pxbh7ace8y

  • MD5

    bf14f798fef9d4c0e57a419e49c969bb

  • SHA1

    f846d1529c88f0dcd5dd7207164b8670e9cf7e74

  • SHA256

    36c2e7fbf3282969bfceb2306a6943eafbaaa375cfc1304e718e7bb98ba4ad92

  • SHA512

    3ba059936fb74b0557b2035cf9a4f0686741efded03593382b766677ac7fb2ada5f84751e03a867fc6cdd9bf439c340a9eb8b80a7c607c386ea4d09b5a5b8084

  • SSDEEP

    3072:gjmlwqY3/sq0JlO8W5zoGZAcSzaIOG41+5B9DoqvrbLF:B7JqelOMggVj4UL9UqvLF

Malware Config

Targets

    • Target

      file.exe

    • Size

      151KB

    • MD5

      bf14f798fef9d4c0e57a419e49c969bb

    • SHA1

      f846d1529c88f0dcd5dd7207164b8670e9cf7e74

    • SHA256

      36c2e7fbf3282969bfceb2306a6943eafbaaa375cfc1304e718e7bb98ba4ad92

    • SHA512

      3ba059936fb74b0557b2035cf9a4f0686741efded03593382b766677ac7fb2ada5f84751e03a867fc6cdd9bf439c340a9eb8b80a7c607c386ea4d09b5a5b8084

    • SSDEEP

      3072:gjmlwqY3/sq0JlO8W5zoGZAcSzaIOG41+5B9DoqvrbLF:B7JqelOMggVj4UL9UqvLF

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks