General

  • Target

    bce1ec6a85c3c28e516d68f23949e213fc02126cee986796be7658b1d7a082c4

  • Size

    673KB

  • Sample

    240501-3vxwasag6z

  • MD5

    6a923e65041f43e9bef4d54bfe1494ea

  • SHA1

    af71e57d4b7a9217e8b58804c620fbebbde4ed0c

  • SHA256

    bce1ec6a85c3c28e516d68f23949e213fc02126cee986796be7658b1d7a082c4

  • SHA512

    544bcf56f6d40d0420bc8558575bdae8b25fda86d31718b7b0641aac4052ca8ba6570c925b38459813f039ca22d3867e9630527ad31272eabc385e22a697b44f

  • SSDEEP

    12288:VXdgVz3JSUIRhiJ7ik6l1gDe85nMZstLjGzhTjdBztew17Fly1TMiwJeV1+n:VXdgWU7YlWDeqtLjWjdBhewQ15OE8n

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://cellc.org/tmp/index.php

http://h-c-v.ru/tmp/index.php

http://icebrasilpr.com/tmp/index.php

http://piratia-life.ru/tmp/index.php

http://piratia.su/tmp/index.php

rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

pub3

Targets

    • Target

      bce1ec6a85c3c28e516d68f23949e213fc02126cee986796be7658b1d7a082c4

    • Size

      673KB

    • MD5

      6a923e65041f43e9bef4d54bfe1494ea

    • SHA1

      af71e57d4b7a9217e8b58804c620fbebbde4ed0c

    • SHA256

      bce1ec6a85c3c28e516d68f23949e213fc02126cee986796be7658b1d7a082c4

    • SHA512

      544bcf56f6d40d0420bc8558575bdae8b25fda86d31718b7b0641aac4052ca8ba6570c925b38459813f039ca22d3867e9630527ad31272eabc385e22a697b44f

    • SSDEEP

      12288:VXdgVz3JSUIRhiJ7ik6l1gDe85nMZstLjGzhTjdBztew17Fly1TMiwJeV1+n:VXdgWU7YlWDeqtLjWjdBhewQ15OE8n

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Information Discovery

2
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Tasks