General

  • Target

    fba1d38fab52bac69ba86e1dbfba6619b1e15b161b86a2629cf85d660bdeb75a

  • Size

    353KB

  • Sample

    230416-tqrztaae97

  • MD5

    ef3a931a6252225a0a0a8ed3138f2e04

  • SHA1

    768695769ac5c80e9a74e98dbfdc14f0d897aae8

  • SHA256

    fba1d38fab52bac69ba86e1dbfba6619b1e15b161b86a2629cf85d660bdeb75a

  • SHA512

    423d87884e119c101763fc27253020434495104f45a015457b70963c1b48023e258e2fea1e91830c65b5c41c4efd303cf0fe467563fb75c06477140d5f3ec445

  • SSDEEP

    6144:lcRE4IgwaxrLMbP+emFXFtLWFFcWt1Vn2:lcyfxaxrLMiestL+X

Malware Config

Extracted

Family

smokeloader

Botnet

sprg

Extracted

Family

smokeloader

Version

2022

C2

http://hoh0aeghwugh2gie.com/

http://hie7doodohpae4na.com/

http://aek0aicifaloh1yo.com/

http://yic0oosaeiy7ahng.com/

http://wa5zu7sekai8xeih.com/

rc4.i32
rc4.i32

Extracted

Family

vidar

Version

3.4

Botnet

e749025c61b2caca10aa829a9e1a65a1

C2

https://steamcommunity.com/profiles/76561199494593681

https://t.me/auftriebs

Attributes
  • profile_id_v2

    e749025c61b2caca10aa829a9e1a65a1

  • user_agent

    Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0

Targets

    • Target

      fba1d38fab52bac69ba86e1dbfba6619b1e15b161b86a2629cf85d660bdeb75a

    • Size

      353KB

    • MD5

      ef3a931a6252225a0a0a8ed3138f2e04

    • SHA1

      768695769ac5c80e9a74e98dbfdc14f0d897aae8

    • SHA256

      fba1d38fab52bac69ba86e1dbfba6619b1e15b161b86a2629cf85d660bdeb75a

    • SHA512

      423d87884e119c101763fc27253020434495104f45a015457b70963c1b48023e258e2fea1e91830c65b5c41c4efd303cf0fe467563fb75c06477140d5f3ec445

    • SSDEEP

      6144:lcRE4IgwaxrLMbP+emFXFtLWFFcWt1Vn2:lcyfxaxrLMiestL+X

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks