General

  • Target

    22f33dea86638b485e3d53e50b3f646e904be95d4ca16f3bac3b8a38c81c5bb1

  • Size

    239KB

  • Sample

    230923-18mw5scd84

  • MD5

    448a585c9a4a6f561af40866684dea09

  • SHA1

    84f70bf3f53803a56b2e3d0e28e3b9101b3eb82a

  • SHA256

    22f33dea86638b485e3d53e50b3f646e904be95d4ca16f3bac3b8a38c81c5bb1

  • SHA512

    05402410f640b4c5a76c1a034867dc83eefad6e4167830aa2e2be2cc1a51d171377c2bc15369a1fce457b42353693abd64fa571a1aaf2bf950d276839c64aa99

  • SSDEEP

    6144:2D46fuYXChoQTjlFgLuCY1dRuAOQcZYLQw8y0:2MYzXChdTbv1bu1qLQw8y

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

up3

Targets

    • Target

      22f33dea86638b485e3d53e50b3f646e904be95d4ca16f3bac3b8a38c81c5bb1

    • Size

      239KB

    • MD5

      448a585c9a4a6f561af40866684dea09

    • SHA1

      84f70bf3f53803a56b2e3d0e28e3b9101b3eb82a

    • SHA256

      22f33dea86638b485e3d53e50b3f646e904be95d4ca16f3bac3b8a38c81c5bb1

    • SHA512

      05402410f640b4c5a76c1a034867dc83eefad6e4167830aa2e2be2cc1a51d171377c2bc15369a1fce457b42353693abd64fa571a1aaf2bf950d276839c64aa99

    • SSDEEP

      6144:2D46fuYXChoQTjlFgLuCY1dRuAOQcZYLQw8y0:2MYzXChdTbv1bu1qLQw8y

    • Detected google phishing page

    • Phobos

      Phobos ransomware appeared at the beginning of 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

5
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks