General

  • Target

    file.exe

  • Size

    267KB

  • Sample

    230110-ze9y5sdc9w

  • MD5

    a056926912b314b80b32412e2822eac0

  • SHA1

    fa8c809c329c983b6e030c74def61e9216f4aa60

  • SHA256

    7b8aacd51b19dbf6e0d66d7773fac1cc7fe6241eb4e46111af49285379c9d78d

  • SHA512

    8198ba3046d4d01841fc390b2a1accaf2c415795892038e65f9d818e9b7f780833900ad373cab84cd0e1e0e5863c2e1df3b04e0b2cd6caebe7663444f3dc2291

  • SSDEEP

    3072:6XEeUfdKynH1LUF14q75/Iff7CMsYGMXj3qfpuxUJvNBNCanng0Pb:a8dxVLpqczCMsYGwj39UJTNng6

Malware Config

Targets

    • Target

      file.exe

    • Size

      267KB

    • MD5

      a056926912b314b80b32412e2822eac0

    • SHA1

      fa8c809c329c983b6e030c74def61e9216f4aa60

    • SHA256

      7b8aacd51b19dbf6e0d66d7773fac1cc7fe6241eb4e46111af49285379c9d78d

    • SHA512

      8198ba3046d4d01841fc390b2a1accaf2c415795892038e65f9d818e9b7f780833900ad373cab84cd0e1e0e5863c2e1df3b04e0b2cd6caebe7663444f3dc2291

    • SSDEEP

      3072:6XEeUfdKynH1LUF14q75/Iff7CMsYGMXj3qfpuxUJvNBNCanng0Pb:a8dxVLpqczCMsYGwj39UJTNng6

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks