General

  • Target

    626f40c47bd60050baf1e2a11d1432262966cd2dce68703759c61b540e13bb50

  • Size

    250KB

  • Sample

    231105-2apthsfd34

  • MD5

    afd0c512b12587ef3bf1c9d5f2943b49

  • SHA1

    43588b8ba0e27c624d1d7315f1ef6ad927022cdf

  • SHA256

    626f40c47bd60050baf1e2a11d1432262966cd2dce68703759c61b540e13bb50

  • SHA512

    071195290ec51fbdfb79e8575f96496cd16eda9b247226a1b5884b4dabc9fbda5c30b30997929e99c64d9db7ec76f83939e2e9585d061e16450695eaee606924

  • SSDEEP

    3072:E9Mszd5axu+KxXKzXPTBzrXVOpkRWG8CUW4pPJoz0Lx9+6u:Md5axWxXKjPNrXVckhNUWCPJoU

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      626f40c47bd60050baf1e2a11d1432262966cd2dce68703759c61b540e13bb50

    • Size

      250KB

    • MD5

      afd0c512b12587ef3bf1c9d5f2943b49

    • SHA1

      43588b8ba0e27c624d1d7315f1ef6ad927022cdf

    • SHA256

      626f40c47bd60050baf1e2a11d1432262966cd2dce68703759c61b540e13bb50

    • SHA512

      071195290ec51fbdfb79e8575f96496cd16eda9b247226a1b5884b4dabc9fbda5c30b30997929e99c64d9db7ec76f83939e2e9585d061e16450695eaee606924

    • SSDEEP

      3072:E9Mszd5axu+KxXKzXPTBzrXVOpkRWG8CUW4pPJoz0Lx9+6u:Md5axWxXKjPNrXVckhNUWCPJoU

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks