General

  • Target

    82531f8bfc703bdac635684b3446aa011bc320b4542683499163ab644e2dfef7

  • Size

    245KB

  • Sample

    231010-2f9qwahg65

  • MD5

    0da78f6ac7f81956c6b3b73aa43ef60d

  • SHA1

    7712c1f533e6068a1036b07b6a5f87f03072310f

  • SHA256

    82531f8bfc703bdac635684b3446aa011bc320b4542683499163ab644e2dfef7

  • SHA512

    6385d4b8af5cdb8fc84ee706d617b4a2e0503d8949c80d966dc0875ca0b831b74ff2a6cc1eed1db162ca0d0f5a90eef5049f1a5eb136c6ff3f4056b934b8c64c

  • SSDEEP

    3072:NXrf43UsH7MoLYwal8tJrPM2+h0yA5ZEFW9IPEYa0H+6528Tp33YT8p:JD4PHYF+rR5ZEFoFn4p33YT8

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      82531f8bfc703bdac635684b3446aa011bc320b4542683499163ab644e2dfef7

    • Size

      245KB

    • MD5

      0da78f6ac7f81956c6b3b73aa43ef60d

    • SHA1

      7712c1f533e6068a1036b07b6a5f87f03072310f

    • SHA256

      82531f8bfc703bdac635684b3446aa011bc320b4542683499163ab644e2dfef7

    • SHA512

      6385d4b8af5cdb8fc84ee706d617b4a2e0503d8949c80d966dc0875ca0b831b74ff2a6cc1eed1db162ca0d0f5a90eef5049f1a5eb136c6ff3f4056b934b8c64c

    • SSDEEP

      3072:NXrf43UsH7MoLYwal8tJrPM2+h0yA5ZEFW9IPEYa0H+6528Tp33YT8p:JD4PHYF+rR5ZEFoFn4p33YT8

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks