General

  • Target

    538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185

  • Size

    693KB

  • Sample

    240501-239dmahg6z

  • MD5

    83741bbca9631aa4925203fbddc0ad7d

  • SHA1

    f636ef4f3279cd49d1036a70293f8390ecc96a3e

  • SHA256

    538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185

  • SHA512

    55ee1b215e46024c3bb3722518d476be148c3c48d60d744c53fecba48b7a02ba9ab2f58b436b9657e4748d72d6696bc5e6f477f7805f91fa66841debd00b9a5b

  • SSDEEP

    12288:tXBffJMAUAyQAg8Y3ElBvCm5KUwzq2uE2na367joJqTOX7gXX7:tXBfmPQXMqm5wzq2uDa367joJqaXQ7

Malware Config

Extracted

Family

smokeloader

Botnet

pub3

Extracted

Family

smokeloader

Version

2022

C2

http://cellc.org/tmp/index.php

http://h-c-v.ru/tmp/index.php

http://icebrasilpr.com/tmp/index.php

http://piratia-life.ru/tmp/index.php

http://piratia.su/tmp/index.php

rc4.i32
rc4.i32

Targets

    • Target

      538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185

    • Size

      693KB

    • MD5

      83741bbca9631aa4925203fbddc0ad7d

    • SHA1

      f636ef4f3279cd49d1036a70293f8390ecc96a3e

    • SHA256

      538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185

    • SHA512

      55ee1b215e46024c3bb3722518d476be148c3c48d60d744c53fecba48b7a02ba9ab2f58b436b9657e4748d72d6696bc5e6f477f7805f91fa66841debd00b9a5b

    • SSDEEP

      12288:tXBffJMAUAyQAg8Y3ElBvCm5KUwzq2uE2na367joJqTOX7gXX7:tXBfmPQXMqm5wzq2uDa367joJqaXQ7

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Tasks