General

  • Target

    file

  • Size

    202KB

  • Sample

    231009-gvffcsda55

  • MD5

    03a72710efcdf882a5d49be4f866665e

  • SHA1

    63a22bc5fbe6eb95d0c85ca6905dc3a151d56caa

  • SHA256

    cc81fd50c7c8174f158219f8d0d01e07b320af642961687a0b9e8aaffbb97964

  • SHA512

    d40b0bc953340a164322eb061bf6f0fcacd7ef48c16ce980b4ea373f71d2a900c83ddfdbe13d701ea5778906a2bd465ca225b1b6a51e6f83721ac46d9ec340a7

  • SSDEEP

    3072:auHX7P5VoBro+RFkzULhQBZkVMcFX0NhzjZ5OcgqkKNS5DZDBM:aUroBrolzUF6ZkVxFX0NPgqLNQM

Malware Config

Extracted

Family

smokeloader

Botnet

pub4

Extracted

Family

smokeloader

Version

2022

C2

http://gudintas.at/tmp/

http://pik96.ru/tmp/

http://rosatiauto.com/tmp/

http://kingpirate.ru/tmp/

rc4.i32
rc4.i32

Targets

    • Target

      file

    • Size

      202KB

    • MD5

      03a72710efcdf882a5d49be4f866665e

    • SHA1

      63a22bc5fbe6eb95d0c85ca6905dc3a151d56caa

    • SHA256

      cc81fd50c7c8174f158219f8d0d01e07b320af642961687a0b9e8aaffbb97964

    • SHA512

      d40b0bc953340a164322eb061bf6f0fcacd7ef48c16ce980b4ea373f71d2a900c83ddfdbe13d701ea5778906a2bd465ca225b1b6a51e6f83721ac46d9ec340a7

    • SSDEEP

      3072:auHX7P5VoBro+RFkzULhQBZkVMcFX0NhzjZ5OcgqkKNS5DZDBM:aUroBrolzUF6ZkVxFX0NPgqLNQM

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks