General

  • Target

    01216bca227a81a152b9796d2d0f66ab_JaffaCakes118

  • Size

    208KB

  • Sample

    240426-tccmzafh2v

  • MD5

    01216bca227a81a152b9796d2d0f66ab

  • SHA1

    c463d0f6574605d23bfc66c3d3e42595c13d50f3

  • SHA256

    e8b306a0c742d34f976c7af1ee7a63fe65f2c2403fe5fc1eced82848f07fd1b3

  • SHA512

    6239d03a39ed6dfde7327a712adfcb5a97d358c820f9ccf98fef72f5dd3ea2083fbaa6f61473df1d202b7173e7dc50969f02588fa52945f2bec3d39ae9e97e9a

  • SSDEEP

    3072:qs6XG+smdcLzMexSApk7vXtyTnz0M1QmLipV32FZsR/MPV09Q6u:EXtGXMeVot+4M1QmLi/GFmR/M2Z

Malware Config

Extracted

Family

smokeloader

Version

2017

C2

http://securityupdateserver3.com/blog/wp.php

http://securityupdateserver4.com/blog/wp.php

http://securityupdateserver5.com/blog/wp.php

Targets

    • Target

      01216bca227a81a152b9796d2d0f66ab_JaffaCakes118

    • Size

      208KB

    • MD5

      01216bca227a81a152b9796d2d0f66ab

    • SHA1

      c463d0f6574605d23bfc66c3d3e42595c13d50f3

    • SHA256

      e8b306a0c742d34f976c7af1ee7a63fe65f2c2403fe5fc1eced82848f07fd1b3

    • SHA512

      6239d03a39ed6dfde7327a712adfcb5a97d358c820f9ccf98fef72f5dd3ea2083fbaa6f61473df1d202b7173e7dc50969f02588fa52945f2bec3d39ae9e97e9a

    • SSDEEP

      3072:qs6XG+smdcLzMexSApk7vXtyTnz0M1QmLipV32FZsR/MPV09Q6u:EXtGXMeVot+4M1QmLi/GFmR/M2Z

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks