General

  • Target

    4c19c053186dbe91f79872857581e6d7ef3bf1d383b42054e6ede398557e8007

  • Size

    353KB

  • Sample

    230109-j98rkade55

  • MD5

    7ed687ac3ea2d88751c61ee4242d2cb1

  • SHA1

    f4540c03affd6da03d56ebde96b3405877c4339d

  • SHA256

    4c19c053186dbe91f79872857581e6d7ef3bf1d383b42054e6ede398557e8007

  • SHA512

    cfa89214d7697471a57ea3aef851250ec3bed42f3daef40d7c976c5ea407a4a5e3ee1d5b22c3e0dc060e02e3fc321f265cca10b1efa15fe4348f0818e6fdb1c6

  • SSDEEP

    6144:lMp1X8LuBpx5L6/+G/2gV2QWRFCFuedp2PrT++g:lMph8qBDgH2gathn++g

Malware Config

Targets

    • Target

      4c19c053186dbe91f79872857581e6d7ef3bf1d383b42054e6ede398557e8007

    • Size

      353KB

    • MD5

      7ed687ac3ea2d88751c61ee4242d2cb1

    • SHA1

      f4540c03affd6da03d56ebde96b3405877c4339d

    • SHA256

      4c19c053186dbe91f79872857581e6d7ef3bf1d383b42054e6ede398557e8007

    • SHA512

      cfa89214d7697471a57ea3aef851250ec3bed42f3daef40d7c976c5ea407a4a5e3ee1d5b22c3e0dc060e02e3fc321f265cca10b1efa15fe4348f0818e6fdb1c6

    • SSDEEP

      6144:lMp1X8LuBpx5L6/+G/2gV2QWRFCFuedp2PrT++g:lMph8qBDgH2gathn++g

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks