General

  • Target

    a6776ef1e46363fca58f61d924df96207149ee3a227c2fc99196ed558729e146

  • Size

    320KB

  • Sample

    230111-x4433saa2t

  • MD5

    89f15d802bf38669f08e968c540f84fa

  • SHA1

    150297e4b855520daef7bc08057433af8f89545c

  • SHA256

    a6776ef1e46363fca58f61d924df96207149ee3a227c2fc99196ed558729e146

  • SHA512

    38664eb504d1a50cca53dedbcaf94192e93fcc285e11442149f896ad82afb988280697e6ac12f23b54a386e73112ffb8e82aa438261494bafd843b01fd74ed93

  • SSDEEP

    6144:y74vkD9LxF5p2eoM/vri4UjPlP3Zi5bcxFzC:GCkD9B0M/vrXUh3Zixc

Malware Config

Targets

    • Target

      a6776ef1e46363fca58f61d924df96207149ee3a227c2fc99196ed558729e146

    • Size

      320KB

    • MD5

      89f15d802bf38669f08e968c540f84fa

    • SHA1

      150297e4b855520daef7bc08057433af8f89545c

    • SHA256

      a6776ef1e46363fca58f61d924df96207149ee3a227c2fc99196ed558729e146

    • SHA512

      38664eb504d1a50cca53dedbcaf94192e93fcc285e11442149f896ad82afb988280697e6ac12f23b54a386e73112ffb8e82aa438261494bafd843b01fd74ed93

    • SSDEEP

      6144:y74vkD9LxF5p2eoM/vri4UjPlP3Zi5bcxFzC:GCkD9B0M/vrXUh3Zixc

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks