General

  • Target

    a1351a9eb59719f644ab51bc3d820c8dab2dc221b83af66bdad4049522ded6d9

  • Size

    297KB

  • Sample

    230915-fmblrsgh21

  • MD5

    8e006ccb677465df6c4d2ad39c36810a

  • SHA1

    5ac02eefbfd2970b32f5985f9a0a6a32b187bc0f

  • SHA256

    a1351a9eb59719f644ab51bc3d820c8dab2dc221b83af66bdad4049522ded6d9

  • SHA512

    2f134bbbcd6293ab7781c66956fb1d79afa4cd4c962258dfcb05b71294ac4ed49c1670d99760b45863a3522e01bff13bc1bb507fdade97d26eec036d99c01369

  • SSDEEP

    3072:H+Lw8YSX1FKpNhmx93BDfUE9/3KKUyZIrUhwJTpMLrEWz6qQI+ZzN09t87v:eLwWX1FK/h4RWoIHYX6qf8

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      a1351a9eb59719f644ab51bc3d820c8dab2dc221b83af66bdad4049522ded6d9

    • Size

      297KB

    • MD5

      8e006ccb677465df6c4d2ad39c36810a

    • SHA1

      5ac02eefbfd2970b32f5985f9a0a6a32b187bc0f

    • SHA256

      a1351a9eb59719f644ab51bc3d820c8dab2dc221b83af66bdad4049522ded6d9

    • SHA512

      2f134bbbcd6293ab7781c66956fb1d79afa4cd4c962258dfcb05b71294ac4ed49c1670d99760b45863a3522e01bff13bc1bb507fdade97d26eec036d99c01369

    • SSDEEP

      3072:H+Lw8YSX1FKpNhmx93BDfUE9/3KKUyZIrUhwJTpMLrEWz6qQI+ZzN09t87v:eLwWX1FK/h4RWoIHYX6qf8

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks