General

  • Target

    cc0e75b4f2894bd3b00e3dc29239f33b4b30b36df421f6ef4c2fea1472c7c41f

  • Size

    303KB

  • Sample

    240111-w6wztaefg6

  • MD5

    77f08e8e008915ff37e94539c0364632

  • SHA1

    7c3af8d7a9f467c61d834a2559327226d0317589

  • SHA256

    cc0e75b4f2894bd3b00e3dc29239f33b4b30b36df421f6ef4c2fea1472c7c41f

  • SHA512

    7ab40f12a114ffb9e21078917d5f0074650d5121734efad98fd0122f544e3c9be96f4c36766d7d5616f08853aec6d6e2f2f6d7294aa76ab22dda9157f9dc44bf

  • SSDEEP

    3072:WzME0LornOmwseIlLz2y+Hw0H6i5Q3o5Zc3i+Fwj0:U+Lo9wPAp6H66c3i3

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      cc0e75b4f2894bd3b00e3dc29239f33b4b30b36df421f6ef4c2fea1472c7c41f

    • Size

      303KB

    • MD5

      77f08e8e008915ff37e94539c0364632

    • SHA1

      7c3af8d7a9f467c61d834a2559327226d0317589

    • SHA256

      cc0e75b4f2894bd3b00e3dc29239f33b4b30b36df421f6ef4c2fea1472c7c41f

    • SHA512

      7ab40f12a114ffb9e21078917d5f0074650d5121734efad98fd0122f544e3c9be96f4c36766d7d5616f08853aec6d6e2f2f6d7294aa76ab22dda9157f9dc44bf

    • SSDEEP

      3072:WzME0LornOmwseIlLz2y+Hw0H6i5Q3o5Zc3i+Fwj0:U+Lo9wPAp6H66c3i3

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Modifies security service

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Disables taskbar notifications via registry modification

    • Disables use of System Restore points

    • Sets file execution options in registry

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks