General

  • Target

    5d676cca0c493faae994040ca98ad4966ac64a90f2e92e5fdada8ed454b3ba11

  • Size

    203KB

  • Sample

    231012-flvy1sgd9s

  • MD5

    e95640f18c5fcf2737977e3805d72008

  • SHA1

    1b4c5f8c48908daaa92e01bd35ecc143b9d4f5a7

  • SHA256

    5d676cca0c493faae994040ca98ad4966ac64a90f2e92e5fdada8ed454b3ba11

  • SHA512

    678082d61e4191386e7cc5f5405c0428af5d50ab021d055c8a1ca1325242f8f5ddfee87fc5f263787dfebe0248f37e57c97ee837cdd9f2cb85010ccf0389e3cc

  • SSDEEP

    3072:aXJ/Qkp454XQLxSy3p97M0ROAUSrkZpY1zc51ZGBCzaC:6NQG4GA/f7dwCOOCZqI

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      5d676cca0c493faae994040ca98ad4966ac64a90f2e92e5fdada8ed454b3ba11

    • Size

      203KB

    • MD5

      e95640f18c5fcf2737977e3805d72008

    • SHA1

      1b4c5f8c48908daaa92e01bd35ecc143b9d4f5a7

    • SHA256

      5d676cca0c493faae994040ca98ad4966ac64a90f2e92e5fdada8ed454b3ba11

    • SHA512

      678082d61e4191386e7cc5f5405c0428af5d50ab021d055c8a1ca1325242f8f5ddfee87fc5f263787dfebe0248f37e57c97ee837cdd9f2cb85010ccf0389e3cc

    • SSDEEP

      3072:aXJ/Qkp454XQLxSy3p97M0ROAUSrkZpY1zc51ZGBCzaC:6NQG4GA/f7dwCOOCZqI

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks