General

  • Target

    619d2b9a66642a9c5507a9ce7cea9a7233d7530a9742897251edd9b0c672d711

  • Size

    304KB

  • Sample

    230103-zvb22sgb5w

  • MD5

    f7fb60c463f74c16560572d5a22708f4

  • SHA1

    17dc4e3b1c1a25d839a0b64684a1b07d74ef24bc

  • SHA256

    619d2b9a66642a9c5507a9ce7cea9a7233d7530a9742897251edd9b0c672d711

  • SHA512

    9264331dcd67adf6074b52282f94a7cc8dc0fc84a46144ddfabb5808c867b3f23ea78c88fb2c3a487d0387d9416f00b02c47e1b2fceb33144ffa8c2aa8d89982

  • SSDEEP

    6144:FsdchLqWykzOPTGZQLbzv5dUVIr+yPXD3cAyjcbx:heWlSL1ZmVI6qDMAygV

Malware Config

Targets

    • Target

      619d2b9a66642a9c5507a9ce7cea9a7233d7530a9742897251edd9b0c672d711

    • Size

      304KB

    • MD5

      f7fb60c463f74c16560572d5a22708f4

    • SHA1

      17dc4e3b1c1a25d839a0b64684a1b07d74ef24bc

    • SHA256

      619d2b9a66642a9c5507a9ce7cea9a7233d7530a9742897251edd9b0c672d711

    • SHA512

      9264331dcd67adf6074b52282f94a7cc8dc0fc84a46144ddfabb5808c867b3f23ea78c88fb2c3a487d0387d9416f00b02c47e1b2fceb33144ffa8c2aa8d89982

    • SSDEEP

      6144:FsdchLqWykzOPTGZQLbzv5dUVIr+yPXD3cAyjcbx:heWlSL1ZmVI6qDMAygV

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks