General

  • Target

    cd18f6507d1618aeab81f86569c00b3b38d84bd18202525e93dd37e7f2d1b548

  • Size

    651KB

  • Sample

    240501-3y7jxada36

  • MD5

    292883544ecb6516789ac22f40fb3fb2

  • SHA1

    29dd18c9388ff86eed94d6b75716b2600df5e280

  • SHA256

    cd18f6507d1618aeab81f86569c00b3b38d84bd18202525e93dd37e7f2d1b548

  • SHA512

    08313e51d65175a7c93bf81da3b568bec104b610aedab69e2bc49cbc3bad46838e559846e879a0e9965531a4d5704fb492f01ffc70172b9a261c54fff314000b

  • SSDEEP

    12288:fXi+JKgD3+EB4yuBnJvI+aXM8Kz13SjZIBa0deoPdoYn9clL1:fXi+hj4y+JSMBz1CjD0d56jd1

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://cellc.org/tmp/index.php

http://h-c-v.ru/tmp/index.php

http://icebrasilpr.com/tmp/index.php

http://piratia-life.ru/tmp/index.php

http://piratia.su/tmp/index.php

rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

pub3

Targets

    • Target

      cd18f6507d1618aeab81f86569c00b3b38d84bd18202525e93dd37e7f2d1b548

    • Size

      651KB

    • MD5

      292883544ecb6516789ac22f40fb3fb2

    • SHA1

      29dd18c9388ff86eed94d6b75716b2600df5e280

    • SHA256

      cd18f6507d1618aeab81f86569c00b3b38d84bd18202525e93dd37e7f2d1b548

    • SHA512

      08313e51d65175a7c93bf81da3b568bec104b610aedab69e2bc49cbc3bad46838e559846e879a0e9965531a4d5704fb492f01ffc70172b9a261c54fff314000b

    • SSDEEP

      12288:fXi+JKgD3+EB4yuBnJvI+aXM8Kz13SjZIBa0deoPdoYn9clL1:fXi+hj4y+JSMBz1CjD0d56jd1

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Tasks