General

  • Target

    cc45ecb392b6ead669afcca3f27fa64b

  • Size

    328KB

  • Sample

    240315-yh7shshf21

  • MD5

    cc45ecb392b6ead669afcca3f27fa64b

  • SHA1

    2275e857cdd825578bedd978ed516a942c768f79

  • SHA256

    d08f76dbb88b7a02d8f2ac71bed7d337cb46f7f13369dd2d33f471218f1d0e47

  • SHA512

    4b0c5a476d281098f277dad687535456d4d5fcc637ae6cbdac8d8a6a649165f878aa2acd46ff59ad8a6e0c55f93d8dc45702c8ba3de3ee844e67e75c75f6b722

  • SSDEEP

    6144:66Dqu5Z385JKDPrA3sWk5YmV5zQEHjH2XrTtWh3P9L0TrK2IAKk:EyZ3+6Pr6s9YmbZDH27pWh3PHGK

Malware Config

Extracted

Family

smokeloader

Botnet

pub2

Extracted

Family

smokeloader

Version

2020

C2

http://conceitosseg.com/upload/

http://integrasidata.com/upload/

http://ozentekstil.com/upload/

http://finbelportal.com/upload/

http://telanganadigital.com/upload/

rc4.i32
rc4.i32

Targets

    • Target

      cc45ecb392b6ead669afcca3f27fa64b

    • Size

      328KB

    • MD5

      cc45ecb392b6ead669afcca3f27fa64b

    • SHA1

      2275e857cdd825578bedd978ed516a942c768f79

    • SHA256

      d08f76dbb88b7a02d8f2ac71bed7d337cb46f7f13369dd2d33f471218f1d0e47

    • SHA512

      4b0c5a476d281098f277dad687535456d4d5fcc637ae6cbdac8d8a6a649165f878aa2acd46ff59ad8a6e0c55f93d8dc45702c8ba3de3ee844e67e75c75f6b722

    • SSDEEP

      6144:66Dqu5Z385JKDPrA3sWk5YmV5zQEHjH2XrTtWh3P9L0TrK2IAKk:EyZ3+6Pr6s9YmbZDH27pWh3PHGK

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks