General

  • Target

    88435ba7fb6f9822e93336c4c37291d6d5ebaddf9706b94de191bfaaf8574317

  • Size

    158KB

  • Sample

    240417-qez99sgg64

  • MD5

    5ffcf476ff98dccb60d04c61b8dae324

  • SHA1

    de11a4fdce9b9bcf383f4b14f14ffcdd6abbff35

  • SHA256

    88435ba7fb6f9822e93336c4c37291d6d5ebaddf9706b94de191bfaaf8574317

  • SHA512

    a5322a1366993e6f630c2944b064d940c6699a2581ee0c7b87eca0103b061be730acaddb1295b714c2acdd40c779ff5a54dd6b6a62aa5f9a10bff090c3bb2c46

  • SSDEEP

    3072:6JfXO6lqPPf708y88K7xwmzB/gxuO4W4at1oqgYlz6RHHd1weRyNGh5:6Jfe6l4Y81vB/gxuzWZFvzod1JRyNGh5

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      b1637a25a2959c9a6da241d94d8ddac92f3e542d86dbebdc47c1a06a4f6190a0.exe

    • Size

      293KB

    • MD5

      5360fe5781d535acfbaeedd08e9c5b04

    • SHA1

      1d1aede764c4396086a9847c193b1ee15b528ea2

    • SHA256

      b1637a25a2959c9a6da241d94d8ddac92f3e542d86dbebdc47c1a06a4f6190a0

    • SHA512

      68a8943c4bffa60864d90c286d0423a06f9ddaaa8f85d4c6d92e091f938c57dd1a92865014dfac6ad3ecc2dc67c9b3e161e479112d2aa77ab8b6a1b422b5f6bf

    • SSDEEP

      3072:p/c24x3493JSl4C+VunyX/Bo7bAGGT6XL1MS6DdWcvMNm2zDngP9mQ6FIwG:p/Yl4CAi/o6XCSwMNm2a9m1I

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Deletes itself

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks