General

  • Target

    6963e897c11155508edf724ad0f11c4ca7c49a40af6c25c79e79430e61bdd29e

  • Size

    288KB

  • Sample

    231125-14h3dsde7v

  • MD5

    fdb3d848aa1ee356eae8d0217966e84b

  • SHA1

    fdecaf811b89932fa7aa6ff906590950b6cd0975

  • SHA256

    6963e897c11155508edf724ad0f11c4ca7c49a40af6c25c79e79430e61bdd29e

  • SHA512

    6f3f47397279b4bca1a3ffb783b4b23c602d6cf4f8a0c94d321ff43d601521c31dcca2b42b437681c723558799eff5d1699a0968cdd1aee85836352bd10ddf2a

  • SSDEEP

    3072:s8ZOtDX+3iND4kl93vgItB+YTVic0uBh7sV1AVQ5mgk05kVyBk3eFx/RiPB:xAtDsiZ93YItAkb3BhMIBg+

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      6963e897c11155508edf724ad0f11c4ca7c49a40af6c25c79e79430e61bdd29e

    • Size

      288KB

    • MD5

      fdb3d848aa1ee356eae8d0217966e84b

    • SHA1

      fdecaf811b89932fa7aa6ff906590950b6cd0975

    • SHA256

      6963e897c11155508edf724ad0f11c4ca7c49a40af6c25c79e79430e61bdd29e

    • SHA512

      6f3f47397279b4bca1a3ffb783b4b23c602d6cf4f8a0c94d321ff43d601521c31dcca2b42b437681c723558799eff5d1699a0968cdd1aee85836352bd10ddf2a

    • SSDEEP

      3072:s8ZOtDX+3iND4kl93vgItB+YTVic0uBh7sV1AVQ5mgk05kVyBk3eFx/RiPB:xAtDsiZ93YItAkb3BhMIBg+

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks