General

  • Target

    ab903b850cab0b55a7fa711a82338e91b3c83649a1c024ca53a86f844d0c9868

  • Size

    144KB

  • Sample

    240417-qfbcjaac9v

  • MD5

    14b832c0dca4c15919963ff3d0d7b968

  • SHA1

    de65a2413e14f8461ca99281ee9721cb536f4d7c

  • SHA256

    ab903b850cab0b55a7fa711a82338e91b3c83649a1c024ca53a86f844d0c9868

  • SHA512

    fbda69b1622627764830fc1334892e34fea7b18197c447349c393f057f2ae93c224b4363c7110818db6c15974de9c7725e190eb6187bd030ac247acc83c491d9

  • SSDEEP

    3072:qXtpPZNGfG3Aw1Oy4c1iYJo3oflNwfL9duEtP:qXPZsf6AwfmloflNKDd

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      91e8fd048fb5df071ba6e3d7917edcb53122d9cbd9e57dcf4b5e50c72d575c7a.exe

    • Size

      259KB

    • MD5

      e5477d6420e21e75a4bb411a3947201a

    • SHA1

      7120bf0ba0196ecc8cc04dd0c3166185ee3f7892

    • SHA256

      91e8fd048fb5df071ba6e3d7917edcb53122d9cbd9e57dcf4b5e50c72d575c7a

    • SHA512

      de56dddda25e1cf9c5835613e38375f463bbcabe858b846077359b704493ef75b14e6187f21f110103bde70cc61efe17e5dac6d229456271b33afa3406c7020d

    • SSDEEP

      6144:K7vq2CD3/WTO/Ukgn4olUKm4shprkwnf8/9tQ:ERM3/WTO/dgxUWshprDnatQ

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Deletes itself

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks