General

  • Target

    3cefdedbfe0f7261767e53c30551ab3bd46456cb47a667ebdba615b95d3ca2de

  • Size

    158KB

  • Sample

    240417-qabfcagd85

  • MD5

    ca5f1f98cc9a81d1875aa13762480078

  • SHA1

    0817d26bbd57061403b9aa2ad898288a2cda8b08

  • SHA256

    3cefdedbfe0f7261767e53c30551ab3bd46456cb47a667ebdba615b95d3ca2de

  • SHA512

    5597df6872dcf01d8f7d2b1400191759cb85f11dc683184e3d7cbf9362086c291a3719fddd36544f46ec4fe0a2a798823a8400ff494e0146014f08554a305120

  • SSDEEP

    3072:hQJiCzvqW540Mdm+FpzS4MakP8qhaZ/5yW+ffrd7YWJenQ6/:6J/qW54z8+F/MzEoaZ/IvfjJYQR6/

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      b1637a25a2959c9a6da241d94d8ddac92f3e542d86dbebdc47c1a06a4f6190a0.exe

    • Size

      293KB

    • MD5

      5360fe5781d535acfbaeedd08e9c5b04

    • SHA1

      1d1aede764c4396086a9847c193b1ee15b528ea2

    • SHA256

      b1637a25a2959c9a6da241d94d8ddac92f3e542d86dbebdc47c1a06a4f6190a0

    • SHA512

      68a8943c4bffa60864d90c286d0423a06f9ddaaa8f85d4c6d92e091f938c57dd1a92865014dfac6ad3ecc2dc67c9b3e161e479112d2aa77ab8b6a1b422b5f6bf

    • SSDEEP

      3072:p/c24x3493JSl4C+VunyX/Bo7bAGGT6XL1MS6DdWcvMNm2zDngP9mQ6FIwG:p/Yl4CAi/o6XCSwMNm2a9m1I

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Deletes itself

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks