General

  • Target

    36574c94cba499e6013700cd26cd93d648a38f61f0c724a7778ccb2275fe76dd

  • Size

    186KB

  • Sample

    230315-e7j8zadd7t

  • MD5

    a5a71f1084c72dc196db2483bfc335f1

  • SHA1

    23c7a8afa70e32029cc3ee3541533bc182016928

  • SHA256

    36574c94cba499e6013700cd26cd93d648a38f61f0c724a7778ccb2275fe76dd

  • SHA512

    bc590b5677c46fd50329a408186408ec69a3e33b71e55ee888e99dc55731d0e09b79abf2a9ff64a34704c974bbf6345a03e5ed94af00b35049b4bb2f7c3732ea

  • SSDEEP

    3072:fxpBKk2QxnmI0z4dgtPog0ci+g/uMJCHLhAP:hKk2Q8sytArN+suMJCHL6

Malware Config

Extracted

Family

smokeloader

Botnet

lab

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      36574c94cba499e6013700cd26cd93d648a38f61f0c724a7778ccb2275fe76dd

    • Size

      186KB

    • MD5

      a5a71f1084c72dc196db2483bfc335f1

    • SHA1

      23c7a8afa70e32029cc3ee3541533bc182016928

    • SHA256

      36574c94cba499e6013700cd26cd93d648a38f61f0c724a7778ccb2275fe76dd

    • SHA512

      bc590b5677c46fd50329a408186408ec69a3e33b71e55ee888e99dc55731d0e09b79abf2a9ff64a34704c974bbf6345a03e5ed94af00b35049b4bb2f7c3732ea

    • SSDEEP

      3072:fxpBKk2QxnmI0z4dgtPog0ci+g/uMJCHLhAP:hKk2Q8sytArN+suMJCHL6

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks