General

  • Target

    1a35eccd0a1259c1f97800465f0158b3198ab40d415141c583ea8cea90f60cc8

  • Size

    144KB

  • Sample

    240417-p9npaahh5v

  • MD5

    1de14c41d28ea42d0ce96248b0b94d50

  • SHA1

    99d2e0c0e9786ee1f5fb650b18e622170f7c76ef

  • SHA256

    1a35eccd0a1259c1f97800465f0158b3198ab40d415141c583ea8cea90f60cc8

  • SHA512

    1add7c179d5fd427eb36ba60c1a0edcd029dc591eabee7ff5f55720c3cf5ae44ba83e14271a8bea88e54644f498921f4bf4a74fcabb991a63692039f0ff46f60

  • SSDEEP

    3072:8W0XUSsu0bPf0+g6E8ZxXkj68uf5CKHAihYdAw5W9mnABr/VsbFxi7v5mJHpHv2:8fp0bX0Z6ELzufw9ihJcWEz+7v5UP2

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      91e8fd048fb5df071ba6e3d7917edcb53122d9cbd9e57dcf4b5e50c72d575c7a.exe

    • Size

      259KB

    • MD5

      e5477d6420e21e75a4bb411a3947201a

    • SHA1

      7120bf0ba0196ecc8cc04dd0c3166185ee3f7892

    • SHA256

      91e8fd048fb5df071ba6e3d7917edcb53122d9cbd9e57dcf4b5e50c72d575c7a

    • SHA512

      de56dddda25e1cf9c5835613e38375f463bbcabe858b846077359b704493ef75b14e6187f21f110103bde70cc61efe17e5dac6d229456271b33afa3406c7020d

    • SSDEEP

      6144:K7vq2CD3/WTO/Ukgn4olUKm4shprkwnf8/9tQ:ERM3/WTO/dgxUWshprDnatQ

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Deletes itself

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks