General

  • Target

    ad8f4809df9a7429e0a3dbbaeafae78056f10584f042bcfde4b8fdab553077ad

  • Size

    663KB

  • Sample

    240504-2lqvysha48

  • MD5

    cf783d751a0c45d4fdead46ac29d831e

  • SHA1

    30826caa615ea57877699a5b9062f89685b01e19

  • SHA256

    ad8f4809df9a7429e0a3dbbaeafae78056f10584f042bcfde4b8fdab553077ad

  • SHA512

    8dacbec85e93700cdbb783b57d2421a110133592c7ff75a176f2bc0ee6c71625c02ef2b9d41427b12c1da3b99a0b7ecca3cc1019ceb19cd252fa0836bbfa3fc2

  • SSDEEP

    12288:2MwC2DnOQyOmir722i6N0hwQ929tHih31p+dFYTsmkcVT5xXd/o9OrsR9KGPGm+N:2MwC2DUOjP3Nmw5jHih31p+dFYTVTo9k

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://cellc.org/tmp/index.php

http://h-c-v.ru/tmp/index.php

http://icebrasilpr.com/tmp/index.php

http://piratia-life.ru/tmp/index.php

http://piratia.su/tmp/index.php

rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

pub3

Targets

    • Target

      ad8f4809df9a7429e0a3dbbaeafae78056f10584f042bcfde4b8fdab553077ad

    • Size

      663KB

    • MD5

      cf783d751a0c45d4fdead46ac29d831e

    • SHA1

      30826caa615ea57877699a5b9062f89685b01e19

    • SHA256

      ad8f4809df9a7429e0a3dbbaeafae78056f10584f042bcfde4b8fdab553077ad

    • SHA512

      8dacbec85e93700cdbb783b57d2421a110133592c7ff75a176f2bc0ee6c71625c02ef2b9d41427b12c1da3b99a0b7ecca3cc1019ceb19cd252fa0836bbfa3fc2

    • SSDEEP

      12288:2MwC2DnOQyOmir722i6N0hwQ929tHih31p+dFYTsmkcVT5xXd/o9OrsR9KGPGm+N:2MwC2DUOjP3Nmw5jHih31p+dFYTVTo9k

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Tasks