General

  • Target

    file.exe

  • Size

    222KB

  • Sample

    230329-ka911shb2x

  • MD5

    09a274af5477a249d161233b1cc46907

  • SHA1

    a05a28828c2eacdb14ff20f5509edd496a7a5b03

  • SHA256

    33e45949b10d17e6af3e9c1f9ede4fc91f37c2ab0bbc7e49510eeee3dae39e01

  • SHA512

    291542a10f5c190d1dbed7c91126b1bedb9951bc7da6ec41d33f4859910cbf4a7662037c6ff325d36307fe0d5ba11b2f0e1ec1b27aba94562ef636533f9c6c97

  • SSDEEP

    3072:Km78UiUKarAiVVLg1H6Y3lZuKszTP1jGW6MwCNw1Gh5zRASM:uUioVVLOH6QZuBnVGW63YR

Malware Config

Extracted

Family

smokeloader

Botnet

lab

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      file.exe

    • Size

      222KB

    • MD5

      09a274af5477a249d161233b1cc46907

    • SHA1

      a05a28828c2eacdb14ff20f5509edd496a7a5b03

    • SHA256

      33e45949b10d17e6af3e9c1f9ede4fc91f37c2ab0bbc7e49510eeee3dae39e01

    • SHA512

      291542a10f5c190d1dbed7c91126b1bedb9951bc7da6ec41d33f4859910cbf4a7662037c6ff325d36307fe0d5ba11b2f0e1ec1b27aba94562ef636533f9c6c97

    • SSDEEP

      3072:Km78UiUKarAiVVLg1H6Y3lZuKszTP1jGW6MwCNw1Gh5zRASM:uUioVVLOH6QZuBnVGW63YR

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks