General

  • Target

    3e4c646496909d59e89575b7d3560f645aa8fcc4d696112f1f21d635e93f7b7c

  • Size

    144KB

  • Sample

    240417-p9rqyahh5y

  • MD5

    c781a7a29e09e671343bc3e2e155869e

  • SHA1

    089b999c4f95efe9243c9fe0e86e41b8c82f0dc5

  • SHA256

    3e4c646496909d59e89575b7d3560f645aa8fcc4d696112f1f21d635e93f7b7c

  • SHA512

    81abb81865592eba26ef2f841a2c8f91ef523682b296ddca6b0dbe316fa156fc9374bdcd32e1ef023e16b3d16370be8db76fc1971a777fab90b6a8ece1391a4d

  • SSDEEP

    3072:ZrtOo8up/YMcFsXou0SdTtb1hl3T/ka79yre6Lwoy92QbPhR:ZrtOo8udYfFs4d0hzJUe6LwoyvbP3

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      e9839a31cca5038608b57f6e13e75f43aa845a2f892c917a77b3c4f0bcc35c7e.exe

    • Size

      259KB

    • MD5

      b05a74505fa03339578dff002ba57c69

    • SHA1

      b9851e84dbd2c8b2ecccb30452ddccb0496ef974

    • SHA256

      e9839a31cca5038608b57f6e13e75f43aa845a2f892c917a77b3c4f0bcc35c7e

    • SHA512

      616337efd4b6a84f0590226b52d8c7398723afe43bb1fc879089a7474b7fd8949e16353bb4ff713da4295dbc4885d5eb34d9483d7441b726592371bb8f285dd3

    • SSDEEP

      3072:NCEgl6HLc0iImEkhg569+wjkabBB2n2qr4j54wCxe9yFfqdwiB9ez/WnQEbK3Zk:NsUrc06Fue/kZr4j5vwbb0WWnQEbe

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Deletes itself

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks