General

  • Target

    1cae7e40933c543d85b22fd00cf88898a5daa6118c8c50e9875472736a53eb7c.zip

  • Size

    154KB

  • Sample

    230308-mglywafd95

  • MD5

    36ad303aedbcbef7583c7cba4a3e7a11

  • SHA1

    67b2b7817714cb74f65c3690e986929533fa80c3

  • SHA256

    6e70a819b149228fc61c36d423439bad40fb7298b961e5568a9922b9997f453b

  • SHA512

    1c3db344912f2eac70406bc8adb38daad9d65124b694edd1a1d8422fa00abbe0b14e488226c999b798b7f611d4e81cc350e1568c0d181cdb34d88acd94edc1d4

  • SSDEEP

    3072:3Hy9QBovqFPR6QcxwqjPnTA76L66HXZUIveOmLbU5Sg7K0y:3AQBovAPR6FxwoA767ZUIvek5P7dy

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      1cae7e40933c543d85b22fd00cf88898a5daa6118c8c50e9875472736a53eb7c.exe

    • Size

      265KB

    • MD5

      c42da644d3c00284fcb5ffcd7a988283

    • SHA1

      8bb52deb73e9c39bbfccf4ca7aaa55b247d6473c

    • SHA256

      1cae7e40933c543d85b22fd00cf88898a5daa6118c8c50e9875472736a53eb7c

    • SHA512

      2c3dbe61c25e227a33f15320033ab98eea4c9a154299a1a58c3e67c0965a301ddb064e3b5b1e6a79654ee96527b6d0234715fdca68d0e1e5dd20a308355c1e97

    • SSDEEP

      6144:YwT07LtmFcwelq90aRB8F0nG4s4eZeqm:Yq07hm+Vq90O8lZg

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks