General

  • Target

    1c014efbbeaf1876a4268402d5f99add8038fbaf144541a651cb4655b242b68c

  • Size

    167KB

  • Sample

    230221-j2wf9sfh9t

  • MD5

    03756e19b1250c70f33c90351c216642

  • SHA1

    e3fd6cf609a3521b4e26772857241e6f198191c7

  • SHA256

    1c014efbbeaf1876a4268402d5f99add8038fbaf144541a651cb4655b242b68c

  • SHA512

    7e49243e41b648155a13b2968ee06b58af04dc57c43d0c90ef754aa9b6ce424f000757acefa2474baeceb178ef5c3878d3f9e3be90f3148c9d2e4662efa9243a

  • SSDEEP

    3072:5KrZHC1uxYTQNzCpesKxRIWQ8N4TmyFJhAqX:5UZHC1bTCzCMrE8NoAq

Malware Config

Targets

    • Target

      1c014efbbeaf1876a4268402d5f99add8038fbaf144541a651cb4655b242b68c

    • Size

      167KB

    • MD5

      03756e19b1250c70f33c90351c216642

    • SHA1

      e3fd6cf609a3521b4e26772857241e6f198191c7

    • SHA256

      1c014efbbeaf1876a4268402d5f99add8038fbaf144541a651cb4655b242b68c

    • SHA512

      7e49243e41b648155a13b2968ee06b58af04dc57c43d0c90ef754aa9b6ce424f000757acefa2474baeceb178ef5c3878d3f9e3be90f3148c9d2e4662efa9243a

    • SSDEEP

      3072:5KrZHC1uxYTQNzCpesKxRIWQ8N4TmyFJhAqX:5UZHC1bTCzCMrE8NoAq

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

Tasks