General

  • Target

    3ba6971e3e7a7136824b2b1a92ca55e7

  • Size

    271KB

  • Sample

    240101-cw43wscgc2

  • MD5

    3ba6971e3e7a7136824b2b1a92ca55e7

  • SHA1

    2fb21afade8731ed860559716cf3b6a2d788d735

  • SHA256

    1fc4a88f0220817b729357d09fdaef4fdc80e414d947ad35a8b4ddbd6bf28801

  • SHA512

    38367546199facec607308e3a67c3060ef4523e10def2a2333c4070827ca6620781495756fe0f98bad69223aa40aa6bcd0084118a4da820ec9bcf4a28e32cd94

  • SSDEEP

    6144:KI4vN6Fu2g06tURgSyIUZLhzWBxnDqZrcJPSMPs:+vIFu2f6tURILQjnD+rm

Malware Config

Extracted

Family

smokeloader

Botnet

0708

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforjuly1.xyz/

http://readinglistforjuly2.xyz/

http://readinglistforjuly3.xyz/

http://readinglistforjuly4.xyz/

http://readinglistforjuly5.xyz/

http://readinglistforjuly6.xyz/

http://readinglistforjuly7.xyz/

http://readinglistforjuly8.xyz/

http://readinglistforjuly9.xyz/

http://readinglistforjuly10.xyz/

http://readinglistforjuly1.site/

http://readinglistforjuly2.site/

http://readinglistforjuly3.site/

http://readinglistforjuly4.site/

http://readinglistforjuly5.site/

http://readinglistforjuly6.site/

http://readinglistforjuly7.site/

http://readinglistforjuly8.site/

http://readinglistforjuly9.site/

http://readinglistforjuly10.site/

rc4.i32
rc4.i32

Targets

    • Target

      3ba6971e3e7a7136824b2b1a92ca55e7

    • Size

      271KB

    • MD5

      3ba6971e3e7a7136824b2b1a92ca55e7

    • SHA1

      2fb21afade8731ed860559716cf3b6a2d788d735

    • SHA256

      1fc4a88f0220817b729357d09fdaef4fdc80e414d947ad35a8b4ddbd6bf28801

    • SHA512

      38367546199facec607308e3a67c3060ef4523e10def2a2333c4070827ca6620781495756fe0f98bad69223aa40aa6bcd0084118a4da820ec9bcf4a28e32cd94

    • SSDEEP

      6144:KI4vN6Fu2g06tURgSyIUZLhzWBxnDqZrcJPSMPs:+vIFu2f6tURILQjnD+rm

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks