General

  • Target

    d51e52d04ae30864e781db7f25a8fd158271b6a4aa07e0c581e612e193aacecf.exe

  • Size

    311KB

  • Sample

    240111-y9g16sggg6

  • MD5

    26c831a68f5075911285e5fc2ff5ccde

  • SHA1

    d8995c67eca4d3ca1ebe0f9517db578fcf672e09

  • SHA256

    d51e52d04ae30864e781db7f25a8fd158271b6a4aa07e0c581e612e193aacecf

  • SHA512

    dfe68e9ccec3e32a322b1a1b42420c473f4d3c95a1cff67e715b8ddc6ec130ed9affb474fbbe00e120b7dab87747f552cff7371b11c8de50f8c22e4c02bf7365

  • SSDEEP

    6144:tljLRcxjd81aCtghK/oXpX7C+3Sg0gf7G/N:zdCdyfD/SC+3Sbz

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      d51e52d04ae30864e781db7f25a8fd158271b6a4aa07e0c581e612e193aacecf.exe

    • Size

      311KB

    • MD5

      26c831a68f5075911285e5fc2ff5ccde

    • SHA1

      d8995c67eca4d3ca1ebe0f9517db578fcf672e09

    • SHA256

      d51e52d04ae30864e781db7f25a8fd158271b6a4aa07e0c581e612e193aacecf

    • SHA512

      dfe68e9ccec3e32a322b1a1b42420c473f4d3c95a1cff67e715b8ddc6ec130ed9affb474fbbe00e120b7dab87747f552cff7371b11c8de50f8c22e4c02bf7365

    • SSDEEP

      6144:tljLRcxjd81aCtghK/oXpX7C+3Sg0gf7G/N:zdCdyfD/SC+3Sbz

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Modifies security service

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Disables taskbar notifications via registry modification

    • Disables use of System Restore points

    • Looks for VMWare services registry key.

    • Sets file execution options in registry

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks