General

  • Target

    003803cdc1de9fc11ca3a6cb7fbab0abd814b7dddc045abd04a4aa2595af6a26

  • Size

    207KB

  • Sample

    240422-sngwdscf62

  • MD5

    d584f3483c75bf10b1abd4120f4f3bfb

  • SHA1

    184a30b2b1cb90f6db78da8203d0ae961caa5f72

  • SHA256

    003803cdc1de9fc11ca3a6cb7fbab0abd814b7dddc045abd04a4aa2595af6a26

  • SHA512

    04f84ee424e96ddd7022a1ca22997eab69a5e9c856afbdf4529fb6148f01f8768d236b6b32b1b8e398ef70917c1788d645cee98fd714128bdfda0fdc717bcb56

  • SSDEEP

    3072:pxqxx9XQz4uZht5ewB+HVRuJTZ8wBubmxySAEduvrccwSGHmsD+7pvUThACSSY:Lmx+PveT1Rs8wdySBs4clGH/+2eCXY

Malware Config

Extracted

Family

smokeloader

Botnet

2210

Extracted

Family

smokeloader

Version

2019

C2

http://10022020newfolder1002002131-service1002.space/

http://10022020newfolder1002002231-service1002.space/

http://10022020newfolder3100231-service1002.space/

http://10022020newfolder1002002431-service1002.space/

http://10022020newfolder1002002531-service1002.space/

http://10022020newfolder33417-01242510022020.space/

http://10022020test125831-service1002012510022020.space/

http://10022020test136831-service1002012510022020.space/

http://10022020test147831-service1002012510022020.space/

http://10022020test146831-service1002012510022020.space/

http://10022020test134831-service1002012510022020.space/

http://10022020est213531-service100201242510022020.ru/

http://10022020yes1t3481-service1002012510022020.ru/

http://10022020test13561-service1002012510022020.su/

http://10022020test14781-service1002012510022020.info/

http://10022020test13461-service1002012510022020.net/

http://10022020test15671-service1002012510022020.tech/

http://10022020test12671-service1002012510022020.online/

http://10022020utest1341-service1002012510022020.ru/

http://10022020uest71-service100201dom2510022020.ru/

rc4.i32
rc4.i32

Targets

    • Target

      003803cdc1de9fc11ca3a6cb7fbab0abd814b7dddc045abd04a4aa2595af6a26

    • Size

      207KB

    • MD5

      d584f3483c75bf10b1abd4120f4f3bfb

    • SHA1

      184a30b2b1cb90f6db78da8203d0ae961caa5f72

    • SHA256

      003803cdc1de9fc11ca3a6cb7fbab0abd814b7dddc045abd04a4aa2595af6a26

    • SHA512

      04f84ee424e96ddd7022a1ca22997eab69a5e9c856afbdf4529fb6148f01f8768d236b6b32b1b8e398ef70917c1788d645cee98fd714128bdfda0fdc717bcb56

    • SSDEEP

      3072:pxqxx9XQz4uZht5ewB+HVRuJTZ8wBubmxySAEduvrccwSGHmsD+7pvUThACSSY:Lmx+PveT1Rs8wdySBs4clGH/+2eCXY

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks