General

  • Target

    741a4adf79d60db1ff4d13e84129beffe78d2fd0be9e58b3b076052b121ad1b6.exe

  • Size

    308KB

  • Sample

    240324-cw75jsbb31

  • MD5

    6506d5c0294b836710848586a7b8df80

  • SHA1

    4058872c28eed549c3d891c470d9995690f405fa

  • SHA256

    741a4adf79d60db1ff4d13e84129beffe78d2fd0be9e58b3b076052b121ad1b6

  • SHA512

    102bc7446f1dd5e4dd386a1190c4a025004a92ce90ec40e5574c98deb4793a4a9967d75cdb730a802e93dd94167f197ccc2730bfdd2e7693a9717f0c2cfdc569

  • SSDEEP

    3072:DGmUR5Wgf491+wYYmEXzwF2D3v+j8PQf4hsFhQgQaVaZUXkb7K:jURzg1LloRjeQf4CzQgQaVGUUbu

Malware Config

Extracted

Family

smokeloader

Botnet

tfd5

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      741a4adf79d60db1ff4d13e84129beffe78d2fd0be9e58b3b076052b121ad1b6.exe

    • Size

      308KB

    • MD5

      6506d5c0294b836710848586a7b8df80

    • SHA1

      4058872c28eed549c3d891c470d9995690f405fa

    • SHA256

      741a4adf79d60db1ff4d13e84129beffe78d2fd0be9e58b3b076052b121ad1b6

    • SHA512

      102bc7446f1dd5e4dd386a1190c4a025004a92ce90ec40e5574c98deb4793a4a9967d75cdb730a802e93dd94167f197ccc2730bfdd2e7693a9717f0c2cfdc569

    • SSDEEP

      3072:DGmUR5Wgf491+wYYmEXzwF2D3v+j8PQf4hsFhQgQaVaZUXkb7K:jURzg1LloRjeQf4CzQgQaVGUUbu

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Detects executables packed with unregistered version of .NET Reactor

    • Downloads MZ/PE file

    • Deletes itself

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks