General

  • Target

    bd0c44aee3737e568e51f108450bb0de

  • Size

    149KB

  • Sample

    240309-24qynsdd84

  • MD5

    bd0c44aee3737e568e51f108450bb0de

  • SHA1

    cb9a580f112686fb14a4e91e222a154d99acbde7

  • SHA256

    8e0ac4a5412aabae3905743d498e6501d795dc80d4d8bd605357302c70a5d68b

  • SHA512

    680fa57a9e80dd65a6c94ab1ef41c7e4d57b39b48c1a78cad14e178aa9b8a8bd516044dd5cefa0bcfd6164304771b6b7f54ab2b8e4342482420bf3a680bf83d1

  • SSDEEP

    1536:PhJZX/M/SYQ7kT0gZKuK+k32hPxz5x5bG/3LAfpqvFfJATEL+hItC3nf:xLYQVBn0z5x5b2FfJQKt

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforaugust1.xyz/

http://readinglistforaugust2.xyz/

http://readinglistforaugust3.xyz/

http://readinglistforaugust4.xyz/

http://readinglistforaugust5.xyz/

http://readinglistforaugust6.xyz/

http://readinglistforaugust7.xyz/

http://readinglistforaugust8.xyz/

http://readinglistforaugust9.xyz/

http://readinglistforaugust10.xyz/

http://readinglistforaugust1.site/

http://readinglistforaugust2.site/

http://readinglistforaugust3.site/

http://readinglistforaugust4.site/

http://readinglistforaugust5.site/

http://readinglistforaugust6.site/

http://readinglistforaugust7.site/

http://readinglistforaugust8.site/

http://readinglistforaugust9.site/

http://readinglistforaugust10.site/

rc4.i32
rc4.i32

Targets

    • Target

      bd0c44aee3737e568e51f108450bb0de

    • Size

      149KB

    • MD5

      bd0c44aee3737e568e51f108450bb0de

    • SHA1

      cb9a580f112686fb14a4e91e222a154d99acbde7

    • SHA256

      8e0ac4a5412aabae3905743d498e6501d795dc80d4d8bd605357302c70a5d68b

    • SHA512

      680fa57a9e80dd65a6c94ab1ef41c7e4d57b39b48c1a78cad14e178aa9b8a8bd516044dd5cefa0bcfd6164304771b6b7f54ab2b8e4342482420bf3a680bf83d1

    • SSDEEP

      1536:PhJZX/M/SYQ7kT0gZKuK+k32hPxz5x5bG/3LAfpqvFfJATEL+hItC3nf:xLYQVBn0z5x5b2FfJQKt

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks