General

  • Target

    setup.exe

  • Size

    351KB

  • Sample

    230416-ay3azagd28

  • MD5

    ea007e374c956f9e79f371c972dee903

  • SHA1

    d77bacb293f273bb1bb26f5c741df56fe8edf692

  • SHA256

    7ce2b0a650ffc873553fefc362662af8e8bd1fb924f91c5c7b535e51e39e4898

  • SHA512

    1bfbe9057017b2bfca503818d7f98eb65ebff9959e704a2f2ba8c52588588f51731ae2032af0f2b4dbd7733b9d2c94098e5331fe559f77f897f1ae2f82c1df1b

  • SSDEEP

    3072:OBN5CO1YQcbaseoZyfxAcSYXKh2Nr0ezQra1eICGZx66oUr0ppNA0DAWpfB5cFAP:yNWQ636fZT3Uw6ze0pAXWpESwe4

Malware Config

Extracted

Family

smokeloader

Botnet

pu10

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      setup.exe

    • Size

      351KB

    • MD5

      ea007e374c956f9e79f371c972dee903

    • SHA1

      d77bacb293f273bb1bb26f5c741df56fe8edf692

    • SHA256

      7ce2b0a650ffc873553fefc362662af8e8bd1fb924f91c5c7b535e51e39e4898

    • SHA512

      1bfbe9057017b2bfca503818d7f98eb65ebff9959e704a2f2ba8c52588588f51731ae2032af0f2b4dbd7733b9d2c94098e5331fe559f77f897f1ae2f82c1df1b

    • SSDEEP

      3072:OBN5CO1YQcbaseoZyfxAcSYXKh2Nr0ezQra1eICGZx66oUr0ppNA0DAWpfB5cFAP:yNWQ636fZT3Uw6ze0pAXWpESwe4

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks