General

  • Target

    6d7d4cbe15a9b3b26de7434faa95786007f6b68e35b4c54dd3915cb0077374f4

  • Size

    225KB

  • Sample

    230201-j6rnwace55

  • MD5

    f00812630f7f031d25e0f115410f296c

  • SHA1

    80011feb0103ee3982c3d475dbfbd5f9f9647407

  • SHA256

    6d7d4cbe15a9b3b26de7434faa95786007f6b68e35b4c54dd3915cb0077374f4

  • SHA512

    45346c660146de0cbd191a0cf0bd6904c58e767d9f61cabf3965555cdfd50846e13e02b2beaf79c9749b6b0d1b6ca98f3a91cb4504bf1dc4c20fea23d832a573

  • SSDEEP

    3072:aWdGehLVhHdjLTLX/W0I5kT09f0v+fGAPYx4ZavyDf:aWdzh9jnLX/l49cmfuxyA8

Malware Config

Targets

    • Target

      6d7d4cbe15a9b3b26de7434faa95786007f6b68e35b4c54dd3915cb0077374f4

    • Size

      225KB

    • MD5

      f00812630f7f031d25e0f115410f296c

    • SHA1

      80011feb0103ee3982c3d475dbfbd5f9f9647407

    • SHA256

      6d7d4cbe15a9b3b26de7434faa95786007f6b68e35b4c54dd3915cb0077374f4

    • SHA512

      45346c660146de0cbd191a0cf0bd6904c58e767d9f61cabf3965555cdfd50846e13e02b2beaf79c9749b6b0d1b6ca98f3a91cb4504bf1dc4c20fea23d832a573

    • SSDEEP

      3072:aWdGehLVhHdjLTLX/W0I5kT09f0v+fGAPYx4ZavyDf:aWdzh9jnLX/l49cmfuxyA8

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks