General

  • Target

    961847146f193d0bade76808dc59a81247845f7aad72accd49647f0778bd2f29

  • Size

    254KB

  • Sample

    231012-xxngraad6v

  • MD5

    90fe11439095120521ad236cf9d824bf

  • SHA1

    23685fd685d68ad418193a10ff211383784d8a95

  • SHA256

    961847146f193d0bade76808dc59a81247845f7aad72accd49647f0778bd2f29

  • SHA512

    1b18a428b9fb3d3c86123236a0216fba562c38c0429509fd18fa89dad57e18282969320041aca4127c5c24cb9e4c3eb02066aba77cf95488ffbe7ce4561f0d98

  • SSDEEP

    3072:HpUmM1qyg7+a3+a1XHE9hGk7lXcTfNX0:jMcygJOaBHCG0lO

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      961847146f193d0bade76808dc59a81247845f7aad72accd49647f0778bd2f29

    • Size

      254KB

    • MD5

      90fe11439095120521ad236cf9d824bf

    • SHA1

      23685fd685d68ad418193a10ff211383784d8a95

    • SHA256

      961847146f193d0bade76808dc59a81247845f7aad72accd49647f0778bd2f29

    • SHA512

      1b18a428b9fb3d3c86123236a0216fba562c38c0429509fd18fa89dad57e18282969320041aca4127c5c24cb9e4c3eb02066aba77cf95488ffbe7ce4561f0d98

    • SSDEEP

      3072:HpUmM1qyg7+a3+a1XHE9hGk7lXcTfNX0:jMcygJOaBHCG0lO

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks