General

  • Target

    05d0ff85e4bc02aed7f0d3472b0e46bc

  • Size

    177KB

  • Sample

    231229-2jy4jsabf5

  • MD5

    05d0ff85e4bc02aed7f0d3472b0e46bc

  • SHA1

    c19e208ddc3eb3693b639982db7ac79089504743

  • SHA256

    907f6b8f9c0e1e15fb052deaa36b96fe53c6bd8d1e3b15f9297b4f1295c16271

  • SHA512

    2b1d70e05f26a2b02315f89612a87e98caaaab52dcdefe1c7aa8b54ff06a94e556a5bdb302b8e199eee45ca9b8d41871bf20b6e78e008c21afda7304b2269a4e

  • SSDEEP

    3072:tCfFJxAKiWYg6cL+35YSeFfVHwhZoWC9sI5/DuT61m:toag6c6qJXHwhZU9sI5/

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforaugust1.xyz/

http://readinglistforaugust2.xyz/

http://readinglistforaugust3.xyz/

http://readinglistforaugust4.xyz/

http://readinglistforaugust5.xyz/

http://readinglistforaugust6.xyz/

http://readinglistforaugust7.xyz/

http://readinglistforaugust8.xyz/

http://readinglistforaugust9.xyz/

http://readinglistforaugust10.xyz/

http://readinglistforaugust1.site/

http://readinglistforaugust2.site/

http://readinglistforaugust3.site/

http://readinglistforaugust4.site/

http://readinglistforaugust5.site/

http://readinglistforaugust6.site/

http://readinglistforaugust7.site/

http://readinglistforaugust8.site/

http://readinglistforaugust9.site/

http://readinglistforaugust10.site/

rc4.i32
rc4.i32

Targets

    • Target

      05d0ff85e4bc02aed7f0d3472b0e46bc

    • Size

      177KB

    • MD5

      05d0ff85e4bc02aed7f0d3472b0e46bc

    • SHA1

      c19e208ddc3eb3693b639982db7ac79089504743

    • SHA256

      907f6b8f9c0e1e15fb052deaa36b96fe53c6bd8d1e3b15f9297b4f1295c16271

    • SHA512

      2b1d70e05f26a2b02315f89612a87e98caaaab52dcdefe1c7aa8b54ff06a94e556a5bdb302b8e199eee45ca9b8d41871bf20b6e78e008c21afda7304b2269a4e

    • SSDEEP

      3072:tCfFJxAKiWYg6cL+35YSeFfVHwhZoWC9sI5/DuT61m:toag6c6qJXHwhZU9sI5/

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks