General

  • Target

    8adad0cfb96413c12af79d8a2309d5dcaacd92ddc5f038cad1bd5b32353aa13f

  • Size

    222KB

  • Sample

    230918-31mmhsfe99

  • MD5

    be8469b30d87f96a475a3dc9ce890563

  • SHA1

    163a1de2cfff6ab6ddbbfc3d619e469574cf9dc8

  • SHA256

    8adad0cfb96413c12af79d8a2309d5dcaacd92ddc5f038cad1bd5b32353aa13f

  • SHA512

    5d1e2964d73cbc709ffdcab3086b87c837cf36bfad7640d4ebf675193ec21e305c6ce27ccf354f04fddfd7f31faff519de7cecec689762dc157f8b4c9f508ef0

  • SSDEEP

    3072:X3b4MqcL4WaNpC3uk9cQbsOcpe+nuXUfgFfrgz8X4AihvKPm05mWnWTs:b4pcLDaNk3ukaQbsOISzJ+YmTWnWT

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      8adad0cfb96413c12af79d8a2309d5dcaacd92ddc5f038cad1bd5b32353aa13f

    • Size

      222KB

    • MD5

      be8469b30d87f96a475a3dc9ce890563

    • SHA1

      163a1de2cfff6ab6ddbbfc3d619e469574cf9dc8

    • SHA256

      8adad0cfb96413c12af79d8a2309d5dcaacd92ddc5f038cad1bd5b32353aa13f

    • SHA512

      5d1e2964d73cbc709ffdcab3086b87c837cf36bfad7640d4ebf675193ec21e305c6ce27ccf354f04fddfd7f31faff519de7cecec689762dc157f8b4c9f508ef0

    • SSDEEP

      3072:X3b4MqcL4WaNpC3uk9cQbsOcpe+nuXUfgFfrgz8X4AihvKPm05mWnWTs:b4pcLDaNk3ukaQbsOISzJ+YmTWnWT

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks