General

  • Target

    3b185899f2740994cbd26434811649409e95ad17ebd46703a105b6a61d3b60e5

  • Size

    257KB

  • Sample

    231106-gm9z1aah98

  • MD5

    d9a62482435d3256e2cd63f0746f682c

  • SHA1

    b09b66e915145ba7de05da6b36c5f919c2f470a8

  • SHA256

    3b185899f2740994cbd26434811649409e95ad17ebd46703a105b6a61d3b60e5

  • SHA512

    c59886e29ac1631de288da72ad155f3c7ad682a11ab09b687b3ef3a4a752bad847f93c6072c2bb0df0ca8245f884582bbaa5f395e0558d9c472ecd5ca5a7688c

  • SSDEEP

    3072:1T6lr2KC6xcxVZjXq0KaWItHoZv+CbwtXw4fdHzF5Q3gLeZH4oGOUZ:9KC6U1q0KQRfcUX9lhqgKZH4o

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      3b185899f2740994cbd26434811649409e95ad17ebd46703a105b6a61d3b60e5

    • Size

      257KB

    • MD5

      d9a62482435d3256e2cd63f0746f682c

    • SHA1

      b09b66e915145ba7de05da6b36c5f919c2f470a8

    • SHA256

      3b185899f2740994cbd26434811649409e95ad17ebd46703a105b6a61d3b60e5

    • SHA512

      c59886e29ac1631de288da72ad155f3c7ad682a11ab09b687b3ef3a4a752bad847f93c6072c2bb0df0ca8245f884582bbaa5f395e0558d9c472ecd5ca5a7688c

    • SSDEEP

      3072:1T6lr2KC6xcxVZjXq0KaWItHoZv+CbwtXw4fdHzF5Q3gLeZH4oGOUZ:9KC6U1q0KQRfcUX9lhqgKZH4o

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks