General

  • Target

    98578b9a02ab1a4c7f98439fd8bc184c1705f0270183d735d61a5256d6322cf6

  • Size

    245KB

  • Sample

    230329-pbkvqshg8v

  • MD5

    4588cb1e6b34273e7d941341bbbb2cc7

  • SHA1

    f2d0a3e918ed37b2782b948e391760c234a6a98e

  • SHA256

    98578b9a02ab1a4c7f98439fd8bc184c1705f0270183d735d61a5256d6322cf6

  • SHA512

    8552fce799a1d9cb1d1bebb35279e8b1cac6ad9ff1d944957ffd4f5860cc0c6e2002b6f811defe0f6531455bb295df00929d64a7a521787970f928e6a7055c0b

  • SSDEEP

    3072:+8T5NuayL4RrwEB52MuRuNhlhiZxrZmsieQ505fylP/:H5ryL41B5PmKqrZmbety

Malware Config

Extracted

Family

smokeloader

Botnet

lab

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      98578b9a02ab1a4c7f98439fd8bc184c1705f0270183d735d61a5256d6322cf6

    • Size

      245KB

    • MD5

      4588cb1e6b34273e7d941341bbbb2cc7

    • SHA1

      f2d0a3e918ed37b2782b948e391760c234a6a98e

    • SHA256

      98578b9a02ab1a4c7f98439fd8bc184c1705f0270183d735d61a5256d6322cf6

    • SHA512

      8552fce799a1d9cb1d1bebb35279e8b1cac6ad9ff1d944957ffd4f5860cc0c6e2002b6f811defe0f6531455bb295df00929d64a7a521787970f928e6a7055c0b

    • SSDEEP

      3072:+8T5NuayL4RrwEB52MuRuNhlhiZxrZmsieQ505fylP/:H5ryL41B5PmKqrZmbety

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks