General

  • Target

    949478e10fd2dd78c21907dccb13a95ad8dd93c442c5417412cbc014fa105468

  • Size

    261KB

  • Sample

    231016-s14kxshf8v

  • MD5

    c1cb6116e691b382d7f2bcbde5b8baba

  • SHA1

    df18afa5cf2dd8eefbb0a7a50264b3f5d40632f5

  • SHA256

    949478e10fd2dd78c21907dccb13a95ad8dd93c442c5417412cbc014fa105468

  • SHA512

    b9c65c58be686e239e9ad474466dfe09d548d4388691e13b77aef53d5f29f1d9b52793713c7f640c42a71ee3ad2ff299d8a7253503015a2b6f46a030f456ce28

  • SSDEEP

    3072:GGBNKu1X7ndOlxurKERzLFOt+1LiIElpz/7SRemuu/4Cc96av:Ga5XzdOlxurvOt+1LXElpnqeZLCc

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      949478e10fd2dd78c21907dccb13a95ad8dd93c442c5417412cbc014fa105468

    • Size

      261KB

    • MD5

      c1cb6116e691b382d7f2bcbde5b8baba

    • SHA1

      df18afa5cf2dd8eefbb0a7a50264b3f5d40632f5

    • SHA256

      949478e10fd2dd78c21907dccb13a95ad8dd93c442c5417412cbc014fa105468

    • SHA512

      b9c65c58be686e239e9ad474466dfe09d548d4388691e13b77aef53d5f29f1d9b52793713c7f640c42a71ee3ad2ff299d8a7253503015a2b6f46a030f456ce28

    • SSDEEP

      3072:GGBNKu1X7ndOlxurKERzLFOt+1LiIElpz/7SRemuu/4Cc96av:Ga5XzdOlxurvOt+1LXElpnqeZLCc

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks