General

  • Target

    toolspub2.exe

  • Size

    186KB

  • Sample

    231011-zg6z9sce2v

  • MD5

    f0ba7739cc07608c54312e79abaf9ece

  • SHA1

    38b075b2e04bc8eee78b89766c1cede5ad889a7e

  • SHA256

    9e96d77f013c6ca17f641c947be11a1bb8921937ed79ec98c4b49ef4c641ae5f

  • SHA512

    15da0554fdd9fb80325883344349b3b4d7b5a612c13eecb810c488621f805ab59c159a54c526ae92f1b81064949bf408f9f2ad07a4c8eda424b2a8f89ea6e165

  • SSDEEP

    3072:Sr/cVOw2YAGMPmmdTpKJbhiA0ecpUFx51An0zj:SYVOw2YAomd1K62qUzAW

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      toolspub2.exe

    • Size

      186KB

    • MD5

      f0ba7739cc07608c54312e79abaf9ece

    • SHA1

      38b075b2e04bc8eee78b89766c1cede5ad889a7e

    • SHA256

      9e96d77f013c6ca17f641c947be11a1bb8921937ed79ec98c4b49ef4c641ae5f

    • SHA512

      15da0554fdd9fb80325883344349b3b4d7b5a612c13eecb810c488621f805ab59c159a54c526ae92f1b81064949bf408f9f2ad07a4c8eda424b2a8f89ea6e165

    • SSDEEP

      3072:Sr/cVOw2YAGMPmmdTpKJbhiA0ecpUFx51An0zj:SYVOw2YAomd1K62qUzAW

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks