Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_c3dd1257159d89cb69777602161caad4_karagany_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-13_c3dd1257159d89cb69777602161caad4_karagany_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_c3dd1257159d89cb69777602161caad4_karagany_mafia.exe
-
Size
268KB
-
MD5
c3dd1257159d89cb69777602161caad4
-
SHA1
8df894c333ed3798dbf1a0210b3664992075ead8
-
SHA256
8728d5d646b55bb1c1ca2e5cb6764f4a718127fe791d810b695e275c3a5bc992
-
SHA512
6f70af25770cf049c86cb91b85826d0b64aa132550b5c235dce1c9f908ccb6c0fe06b24dd2b7b9a6cc53b921e03170c7780bde2fe86e6f2a65f735c8000ea9da
-
SSDEEP
3072:/9lRjsVE6yEmOCPT+wBNJjNvdMKEnv5yZN7nUZmfjWVoqnM49:/9kVE4XCqYP3MN8IZmfjWWAM49
Malware Config
Extracted
smokeloader
2018
http://xrbwgb.com/gate.php
http://th5ijd5gds.xyz/gate.php
http://c82psxpjd8.top/gate.php
http://7ui3n2rezz.top/gate.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2024-03-13_c3dd1257159d89cb69777602161caad4_karagany_mafia.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 2024-03-13_c3dd1257159d89cb69777602161caad4_karagany_mafia.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 464 2024-03-13_c3dd1257159d89cb69777602161caad4_karagany_mafia.exe 464 2024-03-13_c3dd1257159d89cb69777602161caad4_karagany_mafia.exe