General

  • Target

    da0419198761d8b8ea3bf722ceef96cf3b27ffc4467a915c3ee3c58cdc809547

  • Size

    331KB

  • Sample

    221222-j8x9fahc8z

  • MD5

    3ef1b6606a77395968be5eee4a8b7d6e

  • SHA1

    89a1d29d6563a3df44c80106d9e4a2aad9819f12

  • SHA256

    da0419198761d8b8ea3bf722ceef96cf3b27ffc4467a915c3ee3c58cdc809547

  • SHA512

    5b1fd819831cfc3d756a346b5a345cadbe37400bd61449bab9399f835376fd546ebd6882ab97e610d239d000103225c302772b1120162ab8a2f287c90c113a5d

  • SSDEEP

    6144:xiX6LiIV2VboRHbL/5gU0WOnPAP9QwX61hJFIJfVAVrwU+:MqeI0bm7L/6Ul6AP9F6PHgtyQ

Malware Config

Targets

    • Target

      da0419198761d8b8ea3bf722ceef96cf3b27ffc4467a915c3ee3c58cdc809547

    • Size

      331KB

    • MD5

      3ef1b6606a77395968be5eee4a8b7d6e

    • SHA1

      89a1d29d6563a3df44c80106d9e4a2aad9819f12

    • SHA256

      da0419198761d8b8ea3bf722ceef96cf3b27ffc4467a915c3ee3c58cdc809547

    • SHA512

      5b1fd819831cfc3d756a346b5a345cadbe37400bd61449bab9399f835376fd546ebd6882ab97e610d239d000103225c302772b1120162ab8a2f287c90c113a5d

    • SSDEEP

      6144:xiX6LiIV2VboRHbL/5gU0WOnPAP9QwX61hJFIJfVAVrwU+:MqeI0bm7L/6Ul6AP9F6PHgtyQ

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks