General

  • Target

    b06e811afce64b8eabb091686aa00f17e29d5c78aaab64dc96d56710a3773fc8

  • Size

    121KB

  • Sample

    240417-rtccesbh96

  • MD5

    59f10cb531d61eb50c619d5a619d13a9

  • SHA1

    c11ae2f4f7628c69c5f61269c9a33b27c35e701e

  • SHA256

    b06e811afce64b8eabb091686aa00f17e29d5c78aaab64dc96d56710a3773fc8

  • SHA512

    8bf994178e2927d400d4221c0253427aa65314d9f3acb177e00ebeaf2b39b2424adfa5d31187c0ac57709ff35fc7c0a7d74bc7de2f2082e35ee1df1c11005f5c

  • SSDEEP

    3072:OHVwsD0SCjlahIeFaOh+Kl2gA2r8BecgJbsK4hTuQgTUpmx:O1we0SIau8aw+KlQ2gBec8sKfTUp0

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      ad09e6469ff6f776f4dda5c3bfd3ef3bda8d3e66a0f3656c19a003428ee43db7.exe

    • Size

      174KB

    • MD5

      20d467f075750c049e83ec92d895e531

    • SHA1

      d1dfbb732c9b883acd7cba5b4db5690d504dc885

    • SHA256

      ad09e6469ff6f776f4dda5c3bfd3ef3bda8d3e66a0f3656c19a003428ee43db7

    • SHA512

      10f4bb6cfa937e041edb9e523ae52bf8abc51e13012dd805907b22eb0295a79c3bebe5302cf45fa01a366a354143603577bd259934395d208ae6266448e870a6

    • SSDEEP

      3072:OGFLyRU39oZ2XmegMW1mMj0jPWg34RxbA13:7LyRKoZ2XmJt1ijPebA

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Deletes itself

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks