General

  • Target

    33e45949b10d17e6af3e9c1f9ede4fc91f37c2ab0bbc7e49510eeee3dae39e01

  • Size

    222KB

  • Sample

    230329-jkt7wagh9w

  • MD5

    09a274af5477a249d161233b1cc46907

  • SHA1

    a05a28828c2eacdb14ff20f5509edd496a7a5b03

  • SHA256

    33e45949b10d17e6af3e9c1f9ede4fc91f37c2ab0bbc7e49510eeee3dae39e01

  • SHA512

    291542a10f5c190d1dbed7c91126b1bedb9951bc7da6ec41d33f4859910cbf4a7662037c6ff325d36307fe0d5ba11b2f0e1ec1b27aba94562ef636533f9c6c97

  • SSDEEP

    3072:Km78UiUKarAiVVLg1H6Y3lZuKszTP1jGW6MwCNw1Gh5zRASM:uUioVVLOH6QZuBnVGW63YR

Malware Config

Extracted

Family

smokeloader

Botnet

lab

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      33e45949b10d17e6af3e9c1f9ede4fc91f37c2ab0bbc7e49510eeee3dae39e01

    • Size

      222KB

    • MD5

      09a274af5477a249d161233b1cc46907

    • SHA1

      a05a28828c2eacdb14ff20f5509edd496a7a5b03

    • SHA256

      33e45949b10d17e6af3e9c1f9ede4fc91f37c2ab0bbc7e49510eeee3dae39e01

    • SHA512

      291542a10f5c190d1dbed7c91126b1bedb9951bc7da6ec41d33f4859910cbf4a7662037c6ff325d36307fe0d5ba11b2f0e1ec1b27aba94562ef636533f9c6c97

    • SSDEEP

      3072:Km78UiUKarAiVVLg1H6Y3lZuKszTP1jGW6MwCNw1Gh5zRASM:uUioVVLOH6QZuBnVGW63YR

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks