General

  • Target

    a23df2fd3d2e57b1c0168c24f3b791fc51d65bae99570ee3fe18c31a6689a6d8

  • Size

    202KB

  • Sample

    230921-e2z28sdb3z

  • MD5

    63efb435f4e4d80babcf8765acef323f

  • SHA1

    83d62ffb409753c92b859a841b1ffaa105aa195b

  • SHA256

    a23df2fd3d2e57b1c0168c24f3b791fc51d65bae99570ee3fe18c31a6689a6d8

  • SHA512

    cf1d66d03877e9e199561a049a73dbc3c62ebe4abf66b2add032beb6cc037ba7d408a7355d635a1416013da00850a0550b4b9423f70d30fe761d09908a4b2d9c

  • SSDEEP

    3072:wqXWtMfafSRoT0CsV3aUjjMU7vaTSCGwsGG5u4zpe2:PMMieoT0CsV3VcEv+SC4z

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://gudintas.at/tmp/

http://pik96.ru/tmp/

http://rosatiauto.com/tmp/

http://kingpirate.ru/tmp/

rc4.i32
rc4.i32

Targets

    • Target

      a23df2fd3d2e57b1c0168c24f3b791fc51d65bae99570ee3fe18c31a6689a6d8

    • Size

      202KB

    • MD5

      63efb435f4e4d80babcf8765acef323f

    • SHA1

      83d62ffb409753c92b859a841b1ffaa105aa195b

    • SHA256

      a23df2fd3d2e57b1c0168c24f3b791fc51d65bae99570ee3fe18c31a6689a6d8

    • SHA512

      cf1d66d03877e9e199561a049a73dbc3c62ebe4abf66b2add032beb6cc037ba7d408a7355d635a1416013da00850a0550b4b9423f70d30fe761d09908a4b2d9c

    • SSDEEP

      3072:wqXWtMfafSRoT0CsV3aUjjMU7vaTSCGwsGG5u4zpe2:PMMieoT0CsV3VcEv+SC4z

MITRE ATT&CK Enterprise v15

Tasks