General

  • Target

    27625eb4d2d819e18fc24c7efacd5481e21c49e1375f70677feeaaf3b314baea

  • Size

    225KB

  • Sample

    230421-rlkc3ahh5t

  • MD5

    c13e583eb6f4107dd68779493f903dfe

  • SHA1

    0940533a7054c0ff8b1ae4a07c0403582344f18f

  • SHA256

    27625eb4d2d819e18fc24c7efacd5481e21c49e1375f70677feeaaf3b314baea

  • SHA512

    20ede7f136047b00238a5806c8bc8e45ec1a01d6854e91a48b5f1babbbc00372a1264d48e3a6da4f7c90e843a23f3c85476e84742e1a86ee5edf30b54c1097bf

  • SSDEEP

    3072:k1nUljoiQMim2At1+UJRHhDCwD7eLC165YDGaZIE5x4hFl:QnnHM4o+UJ5hDfeLC1X

Malware Config

Extracted

Family

smokeloader

Botnet

pu10

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      27625eb4d2d819e18fc24c7efacd5481e21c49e1375f70677feeaaf3b314baea

    • Size

      225KB

    • MD5

      c13e583eb6f4107dd68779493f903dfe

    • SHA1

      0940533a7054c0ff8b1ae4a07c0403582344f18f

    • SHA256

      27625eb4d2d819e18fc24c7efacd5481e21c49e1375f70677feeaaf3b314baea

    • SHA512

      20ede7f136047b00238a5806c8bc8e45ec1a01d6854e91a48b5f1babbbc00372a1264d48e3a6da4f7c90e843a23f3c85476e84742e1a86ee5edf30b54c1097bf

    • SSDEEP

      3072:k1nUljoiQMim2At1+UJRHhDCwD7eLC165YDGaZIE5x4hFl:QnnHM4o+UJ5hDfeLC1X

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks