General

  • Target

    toolspab2.exe

  • Size

    207KB

  • Sample

    240114-24j55aedg5

  • MD5

    38cb64fa3339058ae21850bb66b82279

  • SHA1

    4ab731f54aec2b9a8c49bf5e38fe294e9745b604

  • SHA256

    ef743dcfbc3b85460416d9708cd43452354c148b375ef94075aaa79207c6467b

  • SHA512

    23ac1bfc8e21b879d347867e7a66af3a2b907265ce8fe415e6315ba7e1b9631c9c32d14b51e95e226661c1630f43d2d0e10e5d17705b9b6fe3200a3a1c13b3a7

  • SSDEEP

    3072:JXNxFFqcLXdCOck2DLO5LE99KsIv3UVmi2nRpMqC3L4EkwAD:t3bqcLtL2LMMPa3UVxIyqCb41p

Malware Config

Extracted

Family

smokeloader

Botnet

pub2

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Targets

    • Target

      toolspab2.exe

    • Size

      207KB

    • MD5

      38cb64fa3339058ae21850bb66b82279

    • SHA1

      4ab731f54aec2b9a8c49bf5e38fe294e9745b604

    • SHA256

      ef743dcfbc3b85460416d9708cd43452354c148b375ef94075aaa79207c6467b

    • SHA512

      23ac1bfc8e21b879d347867e7a66af3a2b907265ce8fe415e6315ba7e1b9631c9c32d14b51e95e226661c1630f43d2d0e10e5d17705b9b6fe3200a3a1c13b3a7

    • SSDEEP

      3072:JXNxFFqcLXdCOck2DLO5LE99KsIv3UVmi2nRpMqC3L4EkwAD:t3bqcLtL2LMMPa3UVxIyqCb41p

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Modifies security service

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Disables taskbar notifications via registry modification

    • Disables use of System Restore points

    • Sets file execution options in registry

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks