General

  • Target

    8516369997ae4be2ced8003eb839166eb94b0be52ebfaaaf6d6347e2e3b4afdb

  • Size

    252KB

  • Sample

    230323-mll5fafa58

  • MD5

    30dff4ca5ae2f6fc6527525b00ba0d02

  • SHA1

    3942098b1b0773b2c5efe442ab2ff16e07bf7a67

  • SHA256

    8516369997ae4be2ced8003eb839166eb94b0be52ebfaaaf6d6347e2e3b4afdb

  • SHA512

    60f16fc7ab840699148d71cacb74dbe06c2c16ef31a4cd4b320030a41ab1e479957cf221c77d9fd3c119ebc7daa682735598c25963722021cbd92aaabaa3d250

  • SSDEEP

    6144:1JhY/LfIc/shtaSEIe6WYPB6Hdbr/k+sAO:5Y/Mc/sRwYpUrFI

Malware Config

Extracted

Family

smokeloader

Botnet

sprg

Extracted

Family

smokeloader

Version

2022

C2

http://hoh0aeghwugh2gie.com/

http://hie7doodohpae4na.com/

http://aek0aicifaloh1yo.com/

http://yic0oosaeiy7ahng.com/

http://wa5zu7sekai8xeih.com/

rc4.i32
rc4.i32

Targets

    • Target

      8516369997ae4be2ced8003eb839166eb94b0be52ebfaaaf6d6347e2e3b4afdb

    • Size

      252KB

    • MD5

      30dff4ca5ae2f6fc6527525b00ba0d02

    • SHA1

      3942098b1b0773b2c5efe442ab2ff16e07bf7a67

    • SHA256

      8516369997ae4be2ced8003eb839166eb94b0be52ebfaaaf6d6347e2e3b4afdb

    • SHA512

      60f16fc7ab840699148d71cacb74dbe06c2c16ef31a4cd4b320030a41ab1e479957cf221c77d9fd3c119ebc7daa682735598c25963722021cbd92aaabaa3d250

    • SSDEEP

      6144:1JhY/LfIc/shtaSEIe6WYPB6Hdbr/k+sAO:5Y/Mc/sRwYpUrFI

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks