General

  • Target

    858e306a02c8e7aa646c3434e0f5ffa7eb3f52bbf79d81c23990bc37cf79cd97

  • Size

    246KB

  • Sample

    231012-qeqe3add55

  • MD5

    7fac4c616b0b94697c05c3542fb1a5c6

  • SHA1

    5b76400db9e14b5bd8d67d41bd8c36ad20d4c20e

  • SHA256

    858e306a02c8e7aa646c3434e0f5ffa7eb3f52bbf79d81c23990bc37cf79cd97

  • SHA512

    d17c25d3eb281733f57d895cfaeabf780c37984d383a74e4bb2cd42bb052e4e396ea27ccdd2425f953d449eaab13a472fecc2a71fba9938e274452876227ad0f

  • SSDEEP

    3072:BwgqbvVB0wysyoxLxJ3p7/w+IiwJTlGIQ4vBQm6:MbvVZyIZHolhnvBQ

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      858e306a02c8e7aa646c3434e0f5ffa7eb3f52bbf79d81c23990bc37cf79cd97

    • Size

      246KB

    • MD5

      7fac4c616b0b94697c05c3542fb1a5c6

    • SHA1

      5b76400db9e14b5bd8d67d41bd8c36ad20d4c20e

    • SHA256

      858e306a02c8e7aa646c3434e0f5ffa7eb3f52bbf79d81c23990bc37cf79cd97

    • SHA512

      d17c25d3eb281733f57d895cfaeabf780c37984d383a74e4bb2cd42bb052e4e396ea27ccdd2425f953d449eaab13a472fecc2a71fba9938e274452876227ad0f

    • SSDEEP

      3072:BwgqbvVB0wysyoxLxJ3p7/w+IiwJTlGIQ4vBQm6:MbvVZyIZHolhnvBQ

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks