General

  • Target

    1b7e2ddcacb26f4c02291ff2b977a1394e76f36d4d773e67d7af33a1eb74118d.exe

  • Size

    626KB

  • Sample

    240430-bhcwtagb9t

  • MD5

    6b54a758faca53461548bba794e3c026

  • SHA1

    4238324dbc9af56518cf22b9eefb46c49e070329

  • SHA256

    1b7e2ddcacb26f4c02291ff2b977a1394e76f36d4d773e67d7af33a1eb74118d

  • SHA512

    53dd25deb1caf0f7060ad6123f8c611c0aadb224eacaa22d9f29fa29a90d67aec5bf1f1a13858854d508507828b660f891dd0732b1c924a6b4786d534795efcf

  • SSDEEP

    12288:oXJGlsluNcS0XIjLEQkU2ZXgRkGKJ28XxNZbLrJh/QgjzdhSaxejcvJ0QS:oXJBlzSkYLOUiXgrKo8jZbnwAqagyJ

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://cellc.org/tmp/index.php

http://h-c-v.ru/tmp/index.php

http://icebrasilpr.com/tmp/index.php

http://piratia-life.ru/tmp/index.php

http://piratia.su/tmp/index.php

rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

pub3

Targets

    • Target

      1b7e2ddcacb26f4c02291ff2b977a1394e76f36d4d773e67d7af33a1eb74118d.exe

    • Size

      626KB

    • MD5

      6b54a758faca53461548bba794e3c026

    • SHA1

      4238324dbc9af56518cf22b9eefb46c49e070329

    • SHA256

      1b7e2ddcacb26f4c02291ff2b977a1394e76f36d4d773e67d7af33a1eb74118d

    • SHA512

      53dd25deb1caf0f7060ad6123f8c611c0aadb224eacaa22d9f29fa29a90d67aec5bf1f1a13858854d508507828b660f891dd0732b1c924a6b4786d534795efcf

    • SSDEEP

      12288:oXJGlsluNcS0XIjLEQkU2ZXgRkGKJ28XxNZbLrJh/QgjzdhSaxejcvJ0QS:oXJBlzSkYLOUiXgrKo8jZbnwAqagyJ

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Tasks