General

  • Target

    5a4e01658cb9f3c14e231a0e5b61290606f6f379b52ac0dec7cf7836006ddf00

  • Size

    144KB

  • Sample

    240417-qh6lfsae6v

  • MD5

    22e56c1f66254b25065ed43dc5f0ce12

  • SHA1

    80968f4ba8d1831e384ba89dacf1cb5a557b892c

  • SHA256

    5a4e01658cb9f3c14e231a0e5b61290606f6f379b52ac0dec7cf7836006ddf00

  • SHA512

    92f745ee151f8b892df9c1088e3c7243aeb34ede669c2672b1d26e794b5f922714c07f9672fe015a7f35f67cb56c4178b5f2fc4b51ff33c557babe2184db37c6

  • SSDEEP

    3072:6RRaw2c1gqc++kusfJfxkHB3/+EcnoN/M6nuWYOej/RylBiKnuzoja5V:mRPNtcrkff7mP+RnAtnYUUKuzojgV

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      91e8fd048fb5df071ba6e3d7917edcb53122d9cbd9e57dcf4b5e50c72d575c7a.exe

    • Size

      259KB

    • MD5

      e5477d6420e21e75a4bb411a3947201a

    • SHA1

      7120bf0ba0196ecc8cc04dd0c3166185ee3f7892

    • SHA256

      91e8fd048fb5df071ba6e3d7917edcb53122d9cbd9e57dcf4b5e50c72d575c7a

    • SHA512

      de56dddda25e1cf9c5835613e38375f463bbcabe858b846077359b704493ef75b14e6187f21f110103bde70cc61efe17e5dac6d229456271b33afa3406c7020d

    • SSDEEP

      6144:K7vq2CD3/WTO/Ukgn4olUKm4shprkwnf8/9tQ:ERM3/WTO/dgxUWshprDnatQ

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Deletes itself

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks