General

  • Target

    42047db1472484141c9822b6d69d0e8559b8c7a71bee7979f03bbb8044a31bc4

  • Size

    327KB

  • Sample

    230111-gdlwtaae92

  • MD5

    88fa1f48600231135873976a314ecbeb

  • SHA1

    4e03e4c61ff3c97b4fb7e32f37c93f02ba5e8d4f

  • SHA256

    42047db1472484141c9822b6d69d0e8559b8c7a71bee7979f03bbb8044a31bc4

  • SHA512

    865f89d457299614161fe863ac84c1d3f8dbd29054f028923075bf015f7b1ed6ff32801308278c2f1c6ae3c5516b4243a2ebc515455020a224a917428b554e6a

  • SSDEEP

    6144:XQmF+DQW3N2WE8tctZC8Pzl5hyyDqCF5RTG9:XF0PBtIU8Pzl5NOC9G

Malware Config

Targets

    • Target

      42047db1472484141c9822b6d69d0e8559b8c7a71bee7979f03bbb8044a31bc4

    • Size

      327KB

    • MD5

      88fa1f48600231135873976a314ecbeb

    • SHA1

      4e03e4c61ff3c97b4fb7e32f37c93f02ba5e8d4f

    • SHA256

      42047db1472484141c9822b6d69d0e8559b8c7a71bee7979f03bbb8044a31bc4

    • SHA512

      865f89d457299614161fe863ac84c1d3f8dbd29054f028923075bf015f7b1ed6ff32801308278c2f1c6ae3c5516b4243a2ebc515455020a224a917428b554e6a

    • SSDEEP

      6144:XQmF+DQW3N2WE8tctZC8Pzl5hyyDqCF5RTG9:XF0PBtIU8Pzl5NOC9G

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks