General

  • Target

    8611d1e03d8fff50fd6e5c7379f1f1beccd104271b7fa09b63781055d587059b

  • Size

    267KB

  • Sample

    231013-d9j6bach6y

  • MD5

    94bc47f91a540c7d4f293bd3208ca79d

  • SHA1

    641aa079c31390ee951a0eb40ead4634d4180736

  • SHA256

    8611d1e03d8fff50fd6e5c7379f1f1beccd104271b7fa09b63781055d587059b

  • SHA512

    a589d56bf07e7de9a9a472766e764165789064e6c9dfb0b4bd10bdfe731d07ef994811b5b0327a4dbc3adb95d819dfa91a532b40c3646fcd748c3e5efc3f6713

  • SSDEEP

    3072:NrW2PMtQv+oFD63pXAZwID4BhWL4M9ME7YvTYpBxMCOoQGbQpnxNBYrcxqbY:VW2pv+oFD63py6oD9MSxC7EQpNYrY

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      8611d1e03d8fff50fd6e5c7379f1f1beccd104271b7fa09b63781055d587059b

    • Size

      267KB

    • MD5

      94bc47f91a540c7d4f293bd3208ca79d

    • SHA1

      641aa079c31390ee951a0eb40ead4634d4180736

    • SHA256

      8611d1e03d8fff50fd6e5c7379f1f1beccd104271b7fa09b63781055d587059b

    • SHA512

      a589d56bf07e7de9a9a472766e764165789064e6c9dfb0b4bd10bdfe731d07ef994811b5b0327a4dbc3adb95d819dfa91a532b40c3646fcd748c3e5efc3f6713

    • SSDEEP

      3072:NrW2PMtQv+oFD63pXAZwID4BhWL4M9ME7YvTYpBxMCOoQGbQpnxNBYrcxqbY:VW2pv+oFD63py6oD9MSxC7EQpNYrY

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks