General

  • Target

    file.exe

  • Size

    214KB

  • Sample

    230105-n46ggafd2v

  • MD5

    0b3ee0bf994dbb2ad736a509873451ae

  • SHA1

    19b1adad451ae83b574e7f615e2d70936842e4ca

  • SHA256

    d5913a5f36f9a1c46349b8d0ba2bcc9e793336c11e33838e5359ebefaccee92b

  • SHA512

    761f29d56dbe0bcda043c08c3d3b79bb4cc6e2d3c478f95258ea2c2fc437b6d427b02ef927d6f72850f15f73c98ec56e7da7c0c827bdae7d6756ad5e58cd19fe

  • SSDEEP

    3072:bXpWxA7BXnkeLWSYmMG+s2F5kkvOmLL9PrZIlVFrG+uSpCP8IJaYZKmcTd8deVl:zbUeLWBG+s2vOqhNIbRG+DCP8p6mude

Malware Config

Targets

    • Target

      file.exe

    • Size

      214KB

    • MD5

      0b3ee0bf994dbb2ad736a509873451ae

    • SHA1

      19b1adad451ae83b574e7f615e2d70936842e4ca

    • SHA256

      d5913a5f36f9a1c46349b8d0ba2bcc9e793336c11e33838e5359ebefaccee92b

    • SHA512

      761f29d56dbe0bcda043c08c3d3b79bb4cc6e2d3c478f95258ea2c2fc437b6d427b02ef927d6f72850f15f73c98ec56e7da7c0c827bdae7d6756ad5e58cd19fe

    • SSDEEP

      3072:bXpWxA7BXnkeLWSYmMG+s2F5kkvOmLL9PrZIlVFrG+uSpCP8IJaYZKmcTd8deVl:zbUeLWBG+s2vOqhNIbRG+DCP8p6mude

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks