General

  • Target

    c8e013303ccd9105c2042b0d35e923d95eae9b6294550a9a206fdbfad6eae057

  • Size

    719KB

  • Sample

    240505-2w46bsbf78

  • MD5

    91ed4ffb7fa8faafd3f2f348b4e8865d

  • SHA1

    cda8bdf2f64ea04cc15685a79d0c11f8ab4192f8

  • SHA256

    c8e013303ccd9105c2042b0d35e923d95eae9b6294550a9a206fdbfad6eae057

  • SHA512

    da333665c18a7c376a0f3eaf746e2f31255dc629b40e2de9852bba67649a7a9743a1c3ff3197e86812f29d8293f602334817b1588184d322ed91cbac0bbf4171

  • SSDEEP

    12288:VXQvjGeNWM74nhfIZkQCYepr1wa21kpv9AzAllUYWnTYRG6GMZ0PIBFfc65T+G:VXQ7pWM0nJJQCYe4a21kNWzAKTu+ArzN

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://cellc.org/tmp/index.php

http://h-c-v.ru/tmp/index.php

http://icebrasilpr.com/tmp/index.php

http://piratia-life.ru/tmp/index.php

http://piratia.su/tmp/index.php

rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

pub3

Targets

    • Target

      c8e013303ccd9105c2042b0d35e923d95eae9b6294550a9a206fdbfad6eae057

    • Size

      719KB

    • MD5

      91ed4ffb7fa8faafd3f2f348b4e8865d

    • SHA1

      cda8bdf2f64ea04cc15685a79d0c11f8ab4192f8

    • SHA256

      c8e013303ccd9105c2042b0d35e923d95eae9b6294550a9a206fdbfad6eae057

    • SHA512

      da333665c18a7c376a0f3eaf746e2f31255dc629b40e2de9852bba67649a7a9743a1c3ff3197e86812f29d8293f602334817b1588184d322ed91cbac0bbf4171

    • SSDEEP

      12288:VXQvjGeNWM74nhfIZkQCYepr1wa21kpv9AzAllUYWnTYRG6GMZ0PIBFfc65T+G:VXQ7pWM0nJJQCYe4a21kNWzAKTu+ArzN

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Information Discovery

2
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Tasks