General

  • Target

    67b4881f8ca0bd13f5802262ce3ca136

  • Size

    285KB

  • Sample

    240119-qf5w5sfca4

  • MD5

    67b4881f8ca0bd13f5802262ce3ca136

  • SHA1

    04bec877080609de3ed78bd4590cd3a86f3a8174

  • SHA256

    2522bb19e9b419120009d7d5224ef2dd556ba7f778e2b914b3e574a3d07df0dd

  • SHA512

    34eb7dbb0dcd18b64923fd48911d0e1c5f61fc09e734eb2e7f951da8dc8a4b91221094c5ac3c552a8954a1c6e35718631e2d23b30603fbcb3651b8e511a33cfe

  • SSDEEP

    6144:GsaPyMMOKrX/iSvLFmSimGny/6KnnNf5f:vwzMOKrX/9L8PpZKn

Malware Config

Extracted

Family

smokeloader

Botnet

0904

Extracted

Family

smokeloader

Version

2020

C2

http://999080321newfolder1002002131-service1002.space/

http://999080321newfolder1002002231-service1002.space/

http://999080321newfolder3100231-service1002.space/

http://999080321newfolder1002002431-service1002.space/

http://999080321newfolder1002002531-service1002.space/

http://999080321newfolder33417-012425999080321.space/

http://999080321test125831-service10020125999080321.space/

http://999080321test136831-service10020125999080321.space/

http://999080321test147831-service10020125999080321.space/

http://999080321test146831-service10020125999080321.space/

http://999080321test134831-service10020125999080321.space/

http://999080321est213531-service1002012425999080321.ru/

http://999080321yes1t3481-service10020125999080321.ru/

http://999080321test13561-service10020125999080321.su/

http://999080321test14781-service10020125999080321.info/

http://999080321test13461-service10020125999080321.net/

http://999080321test15671-service10020125999080321.tech/

http://999080321test12671-service10020125999080321.online/

http://999080321utest1341-service10020125999080321.ru/

http://999080321uest71-service100201dom25999080321.ru/

rc4.i32
rc4.i32

Targets

    • Target

      67b4881f8ca0bd13f5802262ce3ca136

    • Size

      285KB

    • MD5

      67b4881f8ca0bd13f5802262ce3ca136

    • SHA1

      04bec877080609de3ed78bd4590cd3a86f3a8174

    • SHA256

      2522bb19e9b419120009d7d5224ef2dd556ba7f778e2b914b3e574a3d07df0dd

    • SHA512

      34eb7dbb0dcd18b64923fd48911d0e1c5f61fc09e734eb2e7f951da8dc8a4b91221094c5ac3c552a8954a1c6e35718631e2d23b30603fbcb3651b8e511a33cfe

    • SSDEEP

      6144:GsaPyMMOKrX/iSvLFmSimGny/6KnnNf5f:vwzMOKrX/9L8PpZKn

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Modifies security service

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Disables taskbar notifications via registry modification

    • Disables use of System Restore points

    • Sets file execution options in registry

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks