General

  • Target

    file

  • Size

    265KB

  • Sample

    231205-h2m98ahf7z

  • MD5

    d7752d31728c6341a41b3aa476fa3529

  • SHA1

    d243602f189bf7c5978d929ffd4a9aa321712138

  • SHA256

    08a646fa562d3e3f447b7001356424cc5d7c7296873a8d1d94be35bd52a3b58d

  • SHA512

    6040276c9c6206132e2dced287bd4452222c494e4f1d4191d51dbd43861e8d02d2abaf704ebe12462a8fb2eb59431eca684a0d20ee25f7f0fe76d5a2d38973c0

  • SSDEEP

    3072:Q7FaQEw9YltfXFZ/yxSeLjRtrgssGbuHhmPcuddu2M93fzC7G/56YEZ4:oFHP0vFZ6xSehtzFjzAvzC

Malware Config

Extracted

Family

smokeloader

Botnet

pub4

Extracted

Family

smokeloader

Version

2022

C2

http://humydrole.com/tmp/index.php

http://trunk-co.ru/tmp/index.php

http://weareelight.com/tmp/index.php

http://pirateking.online/tmp/index.php

http://piratia.pw/tmp/index.php

http://go-piratia.ru/tmp/index.php

rc4.i32
rc4.i32

Targets

    • Target

      file

    • Size

      265KB

    • MD5

      d7752d31728c6341a41b3aa476fa3529

    • SHA1

      d243602f189bf7c5978d929ffd4a9aa321712138

    • SHA256

      08a646fa562d3e3f447b7001356424cc5d7c7296873a8d1d94be35bd52a3b58d

    • SHA512

      6040276c9c6206132e2dced287bd4452222c494e4f1d4191d51dbd43861e8d02d2abaf704ebe12462a8fb2eb59431eca684a0d20ee25f7f0fe76d5a2d38973c0

    • SSDEEP

      3072:Q7FaQEw9YltfXFZ/yxSeLjRtrgssGbuHhmPcuddu2M93fzC7G/56YEZ4:oFHP0vFZ6xSehtzFjzAvzC

    • Detect PureLogs payload

    • PureLogs

      PureLogs is an infostealer written in C#.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks