General

  • Target

    file.exe

  • Size

    320KB

  • Sample

    230111-xhgqnadh52

  • MD5

    7ce83753b21cef9fc55650943f1e3590

  • SHA1

    f564df522f8ecb32993b13539d0fd585e4f2362c

  • SHA256

    15a13461d5592118d7b4306de2b72b2b949d0c2e5eb35aa92b37a6b501bb870b

  • SHA512

    1ee01b553eb8d5aecd75da2dca7e99b0463539fabf5f331deda3ea7f789335a2b2aefc80751a4a1741e3dd3aabc7a49e5743086133ef6a29503c8aaf10d6a072

  • SSDEEP

    3072:h4XOGc8DPNIvTZr/Mv+VU50SYTpZdFKGMhUEyF1wgrvRt8HcMPjlP30bW3x7c5nD:hMPPiLMGVVjK5Oro8EjlP3Zi5hUxFzC

Malware Config

Targets

    • Target

      file.exe

    • Size

      320KB

    • MD5

      7ce83753b21cef9fc55650943f1e3590

    • SHA1

      f564df522f8ecb32993b13539d0fd585e4f2362c

    • SHA256

      15a13461d5592118d7b4306de2b72b2b949d0c2e5eb35aa92b37a6b501bb870b

    • SHA512

      1ee01b553eb8d5aecd75da2dca7e99b0463539fabf5f331deda3ea7f789335a2b2aefc80751a4a1741e3dd3aabc7a49e5743086133ef6a29503c8aaf10d6a072

    • SSDEEP

      3072:h4XOGc8DPNIvTZr/Mv+VU50SYTpZdFKGMhUEyF1wgrvRt8HcMPjlP30bW3x7c5nD:hMPPiLMGVVjK5Oro8EjlP3Zi5hUxFzC

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks