General

  • Target

    Shipping Docs INV & Packing list I3839.xls

  • Size

    1.2MB

  • Sample

    230718-g267nagf28

  • MD5

    ecb215c449f5f2da3f17322b9e02fec6

  • SHA1

    5baee7de1f257ded084326bef798c2740e919f5a

  • SHA256

    8468f6e913606e807195d7b49c4bed104e2dadb94a663000f7b173d37f447615

  • SHA512

    0e08b528209e4358bc85afd9e725fbe0d33dfab3094ced95627c337e64d5e2822f772006ba5f1e48ad7ee1ced955f4c9176bc7fa063d120f73b726ef634c74b4

  • SSDEEP

    24576:vgu9V1ZyFw6VkAZyFw6VNQpbFcwTA5S8cNfnwLx:vgu396Vkyd6VoFjTBNfng

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://cletonmy.com/

http://alpatrik.com/

rc4.i32
rc4.i32

Targets

    • Target

      Shipping Docs INV & Packing list I3839.xls

    • Size

      1.2MB

    • MD5

      ecb215c449f5f2da3f17322b9e02fec6

    • SHA1

      5baee7de1f257ded084326bef798c2740e919f5a

    • SHA256

      8468f6e913606e807195d7b49c4bed104e2dadb94a663000f7b173d37f447615

    • SHA512

      0e08b528209e4358bc85afd9e725fbe0d33dfab3094ced95627c337e64d5e2822f772006ba5f1e48ad7ee1ced955f4c9176bc7fa063d120f73b726ef634c74b4

    • SSDEEP

      24576:vgu9V1ZyFw6VkAZyFw6VNQpbFcwTA5S8cNfnwLx:vgu396Vkyd6VoFjTBNfng

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks