General

  • Target

    0a86d13db26c9a9ab8d5c7007f29e13c4d6622f85c1a4fb6caa7b0445276bf6b

  • Size

    473KB

  • Sample

    231001-mgcefaaa7t

  • MD5

    f10096360e1ca117a85a7e2e6e00d076

  • SHA1

    d6c2b34c10b1c7d5a86475d3b506088725e893dd

  • SHA256

    0a86d13db26c9a9ab8d5c7007f29e13c4d6622f85c1a4fb6caa7b0445276bf6b

  • SHA512

    dcf89b4748c3ed2f9040d2928987f8d26fd8c1ddbdf9be13f890aa24cdd324c46e6e7b1e8594dddcc0ce1861d4e15bd4a4dfc9928f1a0c3de3b33fe064bc91c9

  • SSDEEP

    12288:AX0VbDhm1jD/EHvjBpdBod8UvL3+R3Hsr6rY04:0KbD4VoPjvdB+7+RrW

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://servermlogs27.xyz/statweb255/

http://servmblog45.xyz/statweb255/

http://demblog575.xyz/statweb255/

http://admlogs85x.xyz/statweb255/

http://blogmstat389.xyz/statweb255/

http://blogmstat255.xyz/statweb255/

rc4.i32
rc4.i32

Targets

    • Target

      0a86d13db26c9a9ab8d5c7007f29e13c4d6622f85c1a4fb6caa7b0445276bf6b

    • Size

      473KB

    • MD5

      f10096360e1ca117a85a7e2e6e00d076

    • SHA1

      d6c2b34c10b1c7d5a86475d3b506088725e893dd

    • SHA256

      0a86d13db26c9a9ab8d5c7007f29e13c4d6622f85c1a4fb6caa7b0445276bf6b

    • SHA512

      dcf89b4748c3ed2f9040d2928987f8d26fd8c1ddbdf9be13f890aa24cdd324c46e6e7b1e8594dddcc0ce1861d4e15bd4a4dfc9928f1a0c3de3b33fe064bc91c9

    • SSDEEP

      12288:AX0VbDhm1jD/EHvjBpdBod8UvL3+R3Hsr6rY04:0KbD4VoPjvdB+7+RrW

    • Ammyy Admin

      Remote admin tool with various capabilities.

    • AmmyyAdmin payload

    • Detect Gurcu Stealer V3 payload

    • FlawedAmmyy RAT

      Remote-access trojan based on leaked code for the Ammyy remote admin software.

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • Phobos

      Phobos ransomware appeared at the beginning of 2019.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Renames multiple (54) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Scheduled Task/Job

1
T1053

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Indicator Removal

3
T1070

File Deletion

3
T1070.004

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Collection

Email Collection

1
T1114

Impact

Inhibit System Recovery

4
T1490

Tasks