General

  • Target

    c85d49282af87df7a122b9e8de6d232fe7804b1f4cb0276a98a08165e53955dd

  • Size

    177KB

  • Sample

    231029-11hmfshd8y

  • MD5

    4c4f6d3f8b2c33595e0b67b8d17fb354

  • SHA1

    d3fde483f12f73e317de2087d3abcf2cf8fda86b

  • SHA256

    c85d49282af87df7a122b9e8de6d232fe7804b1f4cb0276a98a08165e53955dd

  • SHA512

    6b78603e762f578172923be4740937d8dfc6b1de53559a393a625cded1706f96eb05b44420487c5994d9104b80e4c1fb78b4e8304ea17c8c5b92ca6dfb5b539a

  • SSDEEP

    3072:tpX9JKJxWCrqNfQyhK3CIr2ZIyxsj0A8k95fm63gJi62uPtTTr:j7KPWCrofQyk3Nqy6sD8r6g8AV

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      c85d49282af87df7a122b9e8de6d232fe7804b1f4cb0276a98a08165e53955dd

    • Size

      177KB

    • MD5

      4c4f6d3f8b2c33595e0b67b8d17fb354

    • SHA1

      d3fde483f12f73e317de2087d3abcf2cf8fda86b

    • SHA256

      c85d49282af87df7a122b9e8de6d232fe7804b1f4cb0276a98a08165e53955dd

    • SHA512

      6b78603e762f578172923be4740937d8dfc6b1de53559a393a625cded1706f96eb05b44420487c5994d9104b80e4c1fb78b4e8304ea17c8c5b92ca6dfb5b539a

    • SSDEEP

      3072:tpX9JKJxWCrqNfQyhK3CIr2ZIyxsj0A8k95fm63gJi62uPtTTr:j7KPWCrofQyk3Nqy6sD8r6g8AV

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks