General

  • Target

    00ae9bed0c590a9742d587d2381cc738_JaffaCakes118

  • Size

    212KB

  • Sample

    240426-nr7trsfe4w

  • MD5

    00ae9bed0c590a9742d587d2381cc738

  • SHA1

    5f50ffd258f2477b758a183786cde20b2992bedf

  • SHA256

    c914d8a39cc17402e2c3f5232766db612da4f6a6792893686f76ab8659a6eb69

  • SHA512

    44f2814a8aacba7b152e20623bbae706341a8f196dc2b72e81def514b957f9e28ca3e5d6ecf986f3e0642270151c29a4950a5277191551cedabfdee046e724cf

  • SSDEEP

    3072:yhkLBNk/snTUoJi1/IoQrRxAHOTRmkTpb1/Z53aIGs:MkLPk/B9/IeHgR/Tjis

Malware Config

Extracted

Family

smokeloader

Botnet

pa1

Extracted

Family

smokeloader

Version

2019

C2

http://10022020newfolder1002002131-service1002.space/

http://10022020newfolder1002002231-service1002.space/

http://10022020newfolder3100231-service1002.space/

http://10022020newfolder1002002431-service1002.space/

http://10022020newfolder1002002531-service1002.space/

http://10022020newfolder33417-01242510022020.space/

http://10022020test125831-service1002012510022020.space/

http://10022020test136831-service1002012510022020.space/

http://10022020test147831-service1002012510022020.space/

http://10022020test146831-service1002012510022020.space/

http://10022020test134831-service1002012510022020.space/

http://10022020est213531-service100201242510022020.ru/

http://10022020yes1t3481-service1002012510022020.ru/

http://10022020test13561-service1002012510022020.su/

http://10022020test14781-service1002012510022020.info/

http://10022020test13461-service1002012510022020.net/

http://10022020test15671-service1002012510022020.tech/

http://10022020test12671-service1002012510022020.online/

http://10022020utest1341-service1002012510022020.ru/

http://10022020uest71-service100201dom2510022020.ru/

rc4.i32
rc4.i32

Targets

    • Target

      00ae9bed0c590a9742d587d2381cc738_JaffaCakes118

    • Size

      212KB

    • MD5

      00ae9bed0c590a9742d587d2381cc738

    • SHA1

      5f50ffd258f2477b758a183786cde20b2992bedf

    • SHA256

      c914d8a39cc17402e2c3f5232766db612da4f6a6792893686f76ab8659a6eb69

    • SHA512

      44f2814a8aacba7b152e20623bbae706341a8f196dc2b72e81def514b957f9e28ca3e5d6ecf986f3e0642270151c29a4950a5277191551cedabfdee046e724cf

    • SSDEEP

      3072:yhkLBNk/snTUoJi1/IoQrRxAHOTRmkTpb1/Z53aIGs:MkLPk/B9/IeHgR/Tjis

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks