General

  • Target

    da801f9be5789cf6109e457ec3db20ce2f660c95fe2bf7154379ec7e28b37874

  • Size

    234KB

  • Sample

    230421-gs97ysee29

  • MD5

    9cd26ab1187c3c94e029c40789912b8d

  • SHA1

    f5b768e1a84a56ae72c361ffd0dd4ff32c61c963

  • SHA256

    da801f9be5789cf6109e457ec3db20ce2f660c95fe2bf7154379ec7e28b37874

  • SHA512

    331eddbb87ac6bd289357534dba748b00f1fcbe4977da2ca4e29c452d0b0786bdfa0fa66578f2f502838c9a3117d8b71fce86d9be91cc45baf826df4d5983385

  • SSDEEP

    3072:U36T5ZHC9qwXjnT6R3wntUKBwCH5pD8vg/DQp8p1:U+HS9eGttD8vg/Do8p1

Malware Config

Extracted

Family

smokeloader

Botnet

pu10

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      da801f9be5789cf6109e457ec3db20ce2f660c95fe2bf7154379ec7e28b37874

    • Size

      234KB

    • MD5

      9cd26ab1187c3c94e029c40789912b8d

    • SHA1

      f5b768e1a84a56ae72c361ffd0dd4ff32c61c963

    • SHA256

      da801f9be5789cf6109e457ec3db20ce2f660c95fe2bf7154379ec7e28b37874

    • SHA512

      331eddbb87ac6bd289357534dba748b00f1fcbe4977da2ca4e29c452d0b0786bdfa0fa66578f2f502838c9a3117d8b71fce86d9be91cc45baf826df4d5983385

    • SSDEEP

      3072:U36T5ZHC9qwXjnT6R3wntUKBwCH5pD8vg/DQp8p1:U+HS9eGttD8vg/Do8p1

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks