General

  • Target

    49eadf247a319f1ed386288b2d7a4a74

  • Size

    262KB

  • Sample

    240107-174s9sfcgk

  • MD5

    49eadf247a319f1ed386288b2d7a4a74

  • SHA1

    543f40390319dbc47d25a08501bb8be1287f8d71

  • SHA256

    dd78d58bf51e05510f783c4d1181c36efe85966a57a2aaa6acdf863f7cdb11e2

  • SHA512

    03bf7d8a4258c5b3633a38d9009ec1ad1fdcf102818bec75188041093cf42973681edb0d407ab7d98445ab104cab9519de398bbfa87aa3a5e7d1aafc32e4e562

  • SSDEEP

    6144:rL6l/Yi9soUT7NrkHHQlykdUD2uvGefdnCy6D4:Kl/Go6NrGQckd07SZD

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforaugust1.xyz/

http://readinglistforaugust2.xyz/

http://readinglistforaugust3.xyz/

http://readinglistforaugust4.xyz/

http://readinglistforaugust5.xyz/

http://readinglistforaugust6.xyz/

http://readinglistforaugust7.xyz/

http://readinglistforaugust8.xyz/

http://readinglistforaugust9.xyz/

http://readinglistforaugust10.xyz/

http://readinglistforaugust1.site/

http://readinglistforaugust2.site/

http://readinglistforaugust3.site/

http://readinglistforaugust4.site/

http://readinglistforaugust5.site/

http://readinglistforaugust6.site/

http://readinglistforaugust7.site/

http://readinglistforaugust8.site/

http://readinglistforaugust9.site/

http://readinglistforaugust10.site/

rc4.i32
rc4.i32

Targets

    • Target

      49eadf247a319f1ed386288b2d7a4a74

    • Size

      262KB

    • MD5

      49eadf247a319f1ed386288b2d7a4a74

    • SHA1

      543f40390319dbc47d25a08501bb8be1287f8d71

    • SHA256

      dd78d58bf51e05510f783c4d1181c36efe85966a57a2aaa6acdf863f7cdb11e2

    • SHA512

      03bf7d8a4258c5b3633a38d9009ec1ad1fdcf102818bec75188041093cf42973681edb0d407ab7d98445ab104cab9519de398bbfa87aa3a5e7d1aafc32e4e562

    • SSDEEP

      6144:rL6l/Yi9soUT7NrkHHQlykdUD2uvGefdnCy6D4:Kl/Go6NrGQckd07SZD

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks