General

  • Target

    d1757b0dc3f7df935251c19cd541eed8c3667f5b4ef0b6c52b6fbb1831f675c1

  • Size

    320KB

  • Sample

    240409-3zyy6aeb3z

  • MD5

    4740da546fc591e33f0b6dea2e57c619

  • SHA1

    51400b36de1caa1dcac1ab3607a53aa9cfa391e3

  • SHA256

    d1757b0dc3f7df935251c19cd541eed8c3667f5b4ef0b6c52b6fbb1831f675c1

  • SHA512

    353fd747ff31f5ab281ec01b03ca91ce0cbea6cd47e0b7364bd6f14308b9b344e1be0d03a3eded59d4fa8145aa1d7a37746060792d3fc7d1cc1271d5c6b0f7df

  • SSDEEP

    6144:9Z/9u0AZFTv4+6TcMAUhGXAXydg/x1wWx1w:9ZDAZ52TcMAgsdA1wS1w

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

lumma

C2

https://appliedgrandyjuiw.shop/api

https://birdpenallitysydw.shop/api

https://cinemaclinicttanwk.shop/api

https://disagreemenywyws.shop/api

https://speedparticipatewo.shop/api

https://fixturewordbakewos.shop/api

https://colorprioritytubbew.shop/api

https://abuselinenaidwjuew.shop/api

https://methodgreenglassdatw.shop/api

Targets

    • Target

      d1757b0dc3f7df935251c19cd541eed8c3667f5b4ef0b6c52b6fbb1831f675c1

    • Size

      320KB

    • MD5

      4740da546fc591e33f0b6dea2e57c619

    • SHA1

      51400b36de1caa1dcac1ab3607a53aa9cfa391e3

    • SHA256

      d1757b0dc3f7df935251c19cd541eed8c3667f5b4ef0b6c52b6fbb1831f675c1

    • SHA512

      353fd747ff31f5ab281ec01b03ca91ce0cbea6cd47e0b7364bd6f14308b9b344e1be0d03a3eded59d4fa8145aa1d7a37746060792d3fc7d1cc1271d5c6b0f7df

    • SSDEEP

      6144:9Z/9u0AZFTv4+6TcMAUhGXAXydg/x1wWx1w:9ZDAZ52TcMAgsdA1wS1w

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Deletes itself

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks