General

  • Target

    file.exe

  • Size

    334KB

  • Sample

    230103-jjnzgaea5y

  • MD5

    4757415db2cb6f0c2fe7deb0cc2640a7

  • SHA1

    f28b5fbc920703bafe414d4e4ce6c9e4965963d0

  • SHA256

    60fe43fe56681f11075849841523ef3ba8e20a68fb0191f8d31b0e12ac94d00f

  • SHA512

    9f98d8963bd9afd1e6d66fe3db2c7b34e329456c9e3db7785f7917a22b17fcb44f457d8ba3a1cc2eb5042c65bca4c367b9b4bd4bd113d012ad342ebcf9026a0e

  • SSDEEP

    6144:IDsLXWohp/BGIBmE8FhC1n28gqjAWTM4xVvkHb+ewx:yszWoz/BJZ8FsJ2QXTMENi+r

Malware Config

Targets

    • Target

      file.exe

    • Size

      334KB

    • MD5

      4757415db2cb6f0c2fe7deb0cc2640a7

    • SHA1

      f28b5fbc920703bafe414d4e4ce6c9e4965963d0

    • SHA256

      60fe43fe56681f11075849841523ef3ba8e20a68fb0191f8d31b0e12ac94d00f

    • SHA512

      9f98d8963bd9afd1e6d66fe3db2c7b34e329456c9e3db7785f7917a22b17fcb44f457d8ba3a1cc2eb5042c65bca4c367b9b4bd4bd113d012ad342ebcf9026a0e

    • SSDEEP

      6144:IDsLXWohp/BGIBmE8FhC1n28gqjAWTM4xVvkHb+ewx:yszWoz/BJZ8FsJ2QXTMENi+r

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks