General

  • Target

    ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c

  • Size

    254KB

  • Sample

    240418-29h51shg39

  • MD5

    73196807c34d7f9185867d4c7e2a2dfc

  • SHA1

    b6d82e3fe2d82bd6aee6c5efe13c9d61bb979aaa

  • SHA256

    ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c

  • SHA512

    b6483816973be1c78dc2f033e16fcbd1aa7fe0d833ba7bf3b144a2249137a68d502fe5f54275300bfdbfb3060cdcca75ed7f7f1e30979fc50b05b3047cbcec9c

  • SSDEEP

    3072:YCLa+1FRVlGnriaStbk5AFosHbwVNE5+cQRM/+1CB44:YCLv1F7kudtbsyos7m/cQRaR

Malware Config

Extracted

Family

smokeloader

Botnet

pub3

Extracted

Family

smokeloader

Version

2022

C2

http://nidoe.org/tmp/index.php

http://sodez.ru/tmp/index.php

http://uama.com.ua/tmp/index.php

http://talesofpirates.net/tmp/index.php

rc4.i32
rc4.i32

Targets

    • Target

      ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c

    • Size

      254KB

    • MD5

      73196807c34d7f9185867d4c7e2a2dfc

    • SHA1

      b6d82e3fe2d82bd6aee6c5efe13c9d61bb979aaa

    • SHA256

      ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c

    • SHA512

      b6483816973be1c78dc2f033e16fcbd1aa7fe0d833ba7bf3b144a2249137a68d502fe5f54275300bfdbfb3060cdcca75ed7f7f1e30979fc50b05b3047cbcec9c

    • SSDEEP

      3072:YCLa+1FRVlGnriaStbk5AFosHbwVNE5+cQRM/+1CB44:YCLv1F7kudtbsyos7m/cQRaR

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks