General

  • Target

    eadee2ddd0e4095394cc9bcd2845eb74_JaffaCakes118

  • Size

    328KB

  • Sample

    240410-mn3vzaff9w

  • MD5

    eadee2ddd0e4095394cc9bcd2845eb74

  • SHA1

    d73ac158e23e6e68bb94d4b6954aefa70111a3ba

  • SHA256

    267fd2895cebeb5e3a1e9f487a2afcf610accb81216fbbab64c271a49e1b6921

  • SHA512

    fe86974f5df488a72ba428ae5567ff64552690555d73e71d90ce5a7f1350892b79a3633e9e0b4f413045a93235d412692cb610f2efa552eb6f001593e0636bfc

  • SSDEEP

    6144:QlmEuL5tfKFKqwnHl6qIHDNpjEbCmeHSrp9fP+/TnTa:yw5tyXwnXI5pY+DHWOrTa

Malware Config

Extracted

Family

smokeloader

Botnet

pub2

Extracted

Family

smokeloader

Version

2020

C2

http://conceitosseg.com/upload/

http://integrasidata.com/upload/

http://ozentekstil.com/upload/

http://finbelportal.com/upload/

http://telanganadigital.com/upload/

rc4.i32
rc4.i32

Targets

    • Target

      eadee2ddd0e4095394cc9bcd2845eb74_JaffaCakes118

    • Size

      328KB

    • MD5

      eadee2ddd0e4095394cc9bcd2845eb74

    • SHA1

      d73ac158e23e6e68bb94d4b6954aefa70111a3ba

    • SHA256

      267fd2895cebeb5e3a1e9f487a2afcf610accb81216fbbab64c271a49e1b6921

    • SHA512

      fe86974f5df488a72ba428ae5567ff64552690555d73e71d90ce5a7f1350892b79a3633e9e0b4f413045a93235d412692cb610f2efa552eb6f001593e0636bfc

    • SSDEEP

      6144:QlmEuL5tfKFKqwnHl6qIHDNpjEbCmeHSrp9fP+/TnTa:yw5tyXwnXI5pY+DHWOrTa

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks