General

  • Target

    98c354da1924430d377c1c0c2d690c5f64031e2acb38c2e821a73f1fd0a283b6

  • Size

    197KB

  • Sample

    231014-cje81aba6s

  • MD5

    a326189fc8a60b730fda45d9b9e760ec

  • SHA1

    5d3682e8424f446a9e4d1948e44ade152d629b63

  • SHA256

    98c354da1924430d377c1c0c2d690c5f64031e2acb38c2e821a73f1fd0a283b6

  • SHA512

    a93aea0bc79e7b5cd108ca091ca5ef71f4791ce425e63e401caf8f395a0bf459fd2fc0f0bde3cbd25f4478c23f8a088baf5219001d993c2cc3c2ad3c00ec5513

  • SSDEEP

    3072:ykthsgLGOUJDDmGZFgehI/gJcCOITQgyZ7ZbUIg+w7blNNVPlhf56uz/TTR4P:5sgLGTF+bgrOITwbjg57Tww/TV4

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      98c354da1924430d377c1c0c2d690c5f64031e2acb38c2e821a73f1fd0a283b6

    • Size

      197KB

    • MD5

      a326189fc8a60b730fda45d9b9e760ec

    • SHA1

      5d3682e8424f446a9e4d1948e44ade152d629b63

    • SHA256

      98c354da1924430d377c1c0c2d690c5f64031e2acb38c2e821a73f1fd0a283b6

    • SHA512

      a93aea0bc79e7b5cd108ca091ca5ef71f4791ce425e63e401caf8f395a0bf459fd2fc0f0bde3cbd25f4478c23f8a088baf5219001d993c2cc3c2ad3c00ec5513

    • SSDEEP

      3072:ykthsgLGOUJDDmGZFgehI/gJcCOITQgyZ7ZbUIg+w7blNNVPlhf56uz/TTR4P:5sgLGTF+bgrOITwbjg57Tww/TV4

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks