General

  • Target

    file.exe

  • Size

    274KB

  • Sample

    221128-v52y1agf3y

  • MD5

    813f190675956149cd60c0186c99eada

  • SHA1

    b289b67c7a8b940fd405aa94b1446929101baec6

  • SHA256

    e97eee4a59c1b94dfa4b759b89c68d213a2e585496b76b4233aa25079e6793e6

  • SHA512

    414c0efc127a7683cc9ca83ce1bec2872445217c9badcc4623755a55144abd503436772792958f91ba5e41c14f7b177731c41ffc7a059e65643f4f7c7b2ea6b2

  • SSDEEP

    6144:msSA7L/2WqsSNYe8BDqI5QCTI8N8LVFvg4/FQF:YGL/4ZNYVqyQiMDgSm

Malware Config

Targets

    • Target

      file.exe

    • Size

      274KB

    • MD5

      813f190675956149cd60c0186c99eada

    • SHA1

      b289b67c7a8b940fd405aa94b1446929101baec6

    • SHA256

      e97eee4a59c1b94dfa4b759b89c68d213a2e585496b76b4233aa25079e6793e6

    • SHA512

      414c0efc127a7683cc9ca83ce1bec2872445217c9badcc4623755a55144abd503436772792958f91ba5e41c14f7b177731c41ffc7a059e65643f4f7c7b2ea6b2

    • SSDEEP

      6144:msSA7L/2WqsSNYe8BDqI5QCTI8N8LVFvg4/FQF:YGL/4ZNYVqyQiMDgSm

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Email Collection

2
T1114

Tasks