General

  • Target

    096a86278b5a2403ccf74e05f023b4a5c5f2d851e71d7455df89e2d0c6f10849

  • Size

    210KB

  • Sample

    231031-felf1age9t

  • MD5

    12df46017981e0f1ad1894b68556e08f

  • SHA1

    052ae5c53452a9d00533dfd4dc562a9c8ef40030

  • SHA256

    096a86278b5a2403ccf74e05f023b4a5c5f2d851e71d7455df89e2d0c6f10849

  • SHA512

    4d39a03c3cf62104fbb9d1ddf959032b1c4067cb3f30de601c7e4a89460c29ccf60124f1a941b45aaf80b6c75769c05309a8071acaad9f00ac5c791e2e12c184

  • SSDEEP

    3072:R5XoQAHTSBDpqamLH2sFAtiYgZ5YYzprviGYs5Zc:3tITSBJuH2tiYoYehYs5

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      096a86278b5a2403ccf74e05f023b4a5c5f2d851e71d7455df89e2d0c6f10849

    • Size

      210KB

    • MD5

      12df46017981e0f1ad1894b68556e08f

    • SHA1

      052ae5c53452a9d00533dfd4dc562a9c8ef40030

    • SHA256

      096a86278b5a2403ccf74e05f023b4a5c5f2d851e71d7455df89e2d0c6f10849

    • SHA512

      4d39a03c3cf62104fbb9d1ddf959032b1c4067cb3f30de601c7e4a89460c29ccf60124f1a941b45aaf80b6c75769c05309a8071acaad9f00ac5c791e2e12c184

    • SSDEEP

      3072:R5XoQAHTSBDpqamLH2sFAtiYgZ5YYzprviGYs5Zc:3tITSBJuH2tiYoYehYs5

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks