General

  • Target

    ec49ea3da7d627ad17042d48b66b1c8fbfd840e3e2b5920ea0509a735d9175d2

  • Size

    240KB

  • Sample

    240107-2e6ylageh3

  • MD5

    9d388c582710b08133e6d37a77a8ce90

  • SHA1

    0ba1fac8bf12d9095c64cc3c5f787ca2da17a49e

  • SHA256

    ec49ea3da7d627ad17042d48b66b1c8fbfd840e3e2b5920ea0509a735d9175d2

  • SHA512

    ff50426f0add5bba2eee4b8105ad6faef6f0f836200d67213cd141206f34ce0f2ab28a4051694877fecc01d16810c05a1d9445219b54e7c3b14780991cfc8e8b

  • SSDEEP

    3072:LQT/QLtwugecm9rQ1EUJBfJzbSHSpw8waU+tLO03geRp:LE/QLXge19rsBfJXSHwNge

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      ec49ea3da7d627ad17042d48b66b1c8fbfd840e3e2b5920ea0509a735d9175d2

    • Size

      240KB

    • MD5

      9d388c582710b08133e6d37a77a8ce90

    • SHA1

      0ba1fac8bf12d9095c64cc3c5f787ca2da17a49e

    • SHA256

      ec49ea3da7d627ad17042d48b66b1c8fbfd840e3e2b5920ea0509a735d9175d2

    • SHA512

      ff50426f0add5bba2eee4b8105ad6faef6f0f836200d67213cd141206f34ce0f2ab28a4051694877fecc01d16810c05a1d9445219b54e7c3b14780991cfc8e8b

    • SSDEEP

      3072:LQT/QLtwugecm9rQ1EUJBfJzbSHSpw8waU+tLO03geRp:LE/QLXge19rsBfJXSHwNge

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Modifies security service

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Disables taskbar notifications via registry modification

    • Disables use of System Restore points

    • Sets file execution options in registry

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks