General

  • Target

    0daebde971a5f21690f26c1ed8bf8813.bin

  • Size

    178KB

  • Sample

    240207-bda7eschfl

  • MD5

    6ec9ef048a1575cce22f1079758fb30b

  • SHA1

    cd37b68808f0321a7f7e272dd185bdcc5b7a69ca

  • SHA256

    36a393fe2f9dc53f5b094ca2da3e76621e7b5c2f9ef524f76a1b7d2609041cea

  • SHA512

    9a7bd2d76b45eceffaffff4251a1366f788ccc6c602b6a1757bcdf67a1dd460ab260920f48f23c0459279d7cb713624e3b8be6a69a34c8597acd1917017bd480

  • SSDEEP

    3072:LQ2wKnqUxdrRJ/ZxB62X/Su7J9+cKlh7FMqOGCYDPrLhROEboey9:sG/fxB626oY3xM5CXOEE9

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

rc4.i32
rc4.i32

Targets

    • Target

      7abf5ad882fd72332b0b7fb530c8c6505852d4f7ea39edfe444218bdcd9c7f0e.exe

    • Size

      311KB

    • MD5

      0daebde971a5f21690f26c1ed8bf8813

    • SHA1

      361417ed0552958448b0fde6aeb980fcbec9572a

    • SHA256

      7abf5ad882fd72332b0b7fb530c8c6505852d4f7ea39edfe444218bdcd9c7f0e

    • SHA512

      1ac209e287a79aa14a8448418b78383b3fab3712f8f3d59946f39aabab9b035628735ef9362eec5146966562cc15b0bfa0dbc00d6e104789e1e799d3f9259a7a

    • SSDEEP

      6144:QKILYpVy5qgOWp99sfQ+a/HTXbvOREnsE0aV:zIspVy5qgP2fQv/HbbZns

    • Detect Poverty Stealer Payload

    • Poverty Stealer

      Poverty Stealer is a crypto and infostealer written in C++.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks