General

  • Target

    afd8d796e3b6dcfb948980d5f9c439bb1598776e5eb67f1c38943b48c413e27f

  • Size

    265KB

  • Sample

    240424-t1m4lsdc38

  • MD5

    774c731444d9058530cae08a5e8f816f

  • SHA1

    a1cda1f644427d16c2809b5f2fc53825527a937f

  • SHA256

    afd8d796e3b6dcfb948980d5f9c439bb1598776e5eb67f1c38943b48c413e27f

  • SHA512

    ff0da5921a38ac471d66a1d12ac6d26bf83184d4c1689cf9d3d2e436cf81e6dba2d65e75358aeeafa2f498c9f5540ae2c187913483ab458a3c3c527f42df8ee5

  • SSDEEP

    3072:q1L7ZTfpJGtkW+6HPiX2Ai7QhdgHrBre6HkXChWLGW9VlzfVlVUPBBu:GzGSWw/066C3VNd/UPB

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      afd8d796e3b6dcfb948980d5f9c439bb1598776e5eb67f1c38943b48c413e27f

    • Size

      265KB

    • MD5

      774c731444d9058530cae08a5e8f816f

    • SHA1

      a1cda1f644427d16c2809b5f2fc53825527a937f

    • SHA256

      afd8d796e3b6dcfb948980d5f9c439bb1598776e5eb67f1c38943b48c413e27f

    • SHA512

      ff0da5921a38ac471d66a1d12ac6d26bf83184d4c1689cf9d3d2e436cf81e6dba2d65e75358aeeafa2f498c9f5540ae2c187913483ab458a3c3c527f42df8ee5

    • SSDEEP

      3072:q1L7ZTfpJGtkW+6HPiX2Ai7QhdgHrBre6HkXChWLGW9VlzfVlVUPBBu:GzGSWw/066C3VNd/UPB

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks