General

  • Target

    d3441f161efcc0c004c8e80dca94e94c6969a95a442dad688b48e1074b16ef09

  • Size

    297KB

  • Sample

    230921-k4l62sfa31

  • MD5

    34247ef0b637b244b09e6a8b6ecc1bfa

  • SHA1

    7d25cbb0bc11557bf24725c812642a330d5e52e7

  • SHA256

    d3441f161efcc0c004c8e80dca94e94c6969a95a442dad688b48e1074b16ef09

  • SHA512

    2dc433c376e5035470277a278cb29b34d6e8f85343c15aed4d1a70b4bd1d8942e1e8358c2ba3efba66f00e92130581042ab06d7664928c2a3404d0df99cfbdfc

  • SSDEEP

    3072:vBXW1KNErc9NEt3xu2drTYJ6vlISDUI/fipREpHMRqmoAIJg8Xje:NCKqr+NEhU4rTY0vlvSl4moAig8T

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      d3441f161efcc0c004c8e80dca94e94c6969a95a442dad688b48e1074b16ef09

    • Size

      297KB

    • MD5

      34247ef0b637b244b09e6a8b6ecc1bfa

    • SHA1

      7d25cbb0bc11557bf24725c812642a330d5e52e7

    • SHA256

      d3441f161efcc0c004c8e80dca94e94c6969a95a442dad688b48e1074b16ef09

    • SHA512

      2dc433c376e5035470277a278cb29b34d6e8f85343c15aed4d1a70b4bd1d8942e1e8358c2ba3efba66f00e92130581042ab06d7664928c2a3404d0df99cfbdfc

    • SSDEEP

      3072:vBXW1KNErc9NEt3xu2drTYJ6vlISDUI/fipREpHMRqmoAIJg8Xje:NCKqr+NEhU4rTY0vlvSl4moAig8T

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks