General

  • Target

    a4de6aed3be74586cd9a3b581ba73378ae5e71aac00e5d69a0f65b08cf5331b0

  • Size

    208KB

  • Sample

    230920-2yc5madb72

  • MD5

    49cbe4c6f90e45e832576237b394113e

  • SHA1

    2f47698aae59bbaff45aee533eec1cd86566a5b5

  • SHA256

    a4de6aed3be74586cd9a3b581ba73378ae5e71aac00e5d69a0f65b08cf5331b0

  • SHA512

    75fc52adbff17c03b117738cb2a69f55dfe34e531ec52c7f61232df319b10f30e91ef7fb88b69403bead3a8dad8a34055294b6d525f43b197430bae7f543758c

  • SSDEEP

    3072:XXtkURvhDwBk7ibomyYYPSk32QoXhBWPlmrtMTvmhqD95BRsT/uL6:HHlZwBLof6m2QJsujgq9RsTmL6

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      a4de6aed3be74586cd9a3b581ba73378ae5e71aac00e5d69a0f65b08cf5331b0

    • Size

      208KB

    • MD5

      49cbe4c6f90e45e832576237b394113e

    • SHA1

      2f47698aae59bbaff45aee533eec1cd86566a5b5

    • SHA256

      a4de6aed3be74586cd9a3b581ba73378ae5e71aac00e5d69a0f65b08cf5331b0

    • SHA512

      75fc52adbff17c03b117738cb2a69f55dfe34e531ec52c7f61232df319b10f30e91ef7fb88b69403bead3a8dad8a34055294b6d525f43b197430bae7f543758c

    • SSDEEP

      3072:XXtkURvhDwBk7ibomyYYPSk32QoXhBWPlmrtMTvmhqD95BRsT/uL6:HHlZwBLof6m2QJsujgq9RsTmL6

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks