General

  • Target

    130ef444d7e6cd446c98932ce64ec44b56653258965cea4180baba5b570e4b75

  • Size

    245KB

  • Sample

    240506-fjkp9shg9x

  • MD5

    eab8a9b818ef4e23bd92d7420ee33b77

  • SHA1

    f4751ca6ff4d24c3bfada9ad043835a27f04d2f5

  • SHA256

    130ef444d7e6cd446c98932ce64ec44b56653258965cea4180baba5b570e4b75

  • SHA512

    ce77e817741e460aa813d4efe1750f24f149bb4f7df23a06b7986c4ef09dc5303d0e0585928b78bf2b12dfa76a93f5bc8873fa03c8febe82b9c960ad41d1ff9f

  • SSDEEP

    3072:TPh2xwoltiUJSigMfpzGUaG1v5jCnj95E:tWwoacgIyUaGzCjT

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      130ef444d7e6cd446c98932ce64ec44b56653258965cea4180baba5b570e4b75

    • Size

      245KB

    • MD5

      eab8a9b818ef4e23bd92d7420ee33b77

    • SHA1

      f4751ca6ff4d24c3bfada9ad043835a27f04d2f5

    • SHA256

      130ef444d7e6cd446c98932ce64ec44b56653258965cea4180baba5b570e4b75

    • SHA512

      ce77e817741e460aa813d4efe1750f24f149bb4f7df23a06b7986c4ef09dc5303d0e0585928b78bf2b12dfa76a93f5bc8873fa03c8febe82b9c960ad41d1ff9f

    • SSDEEP

      3072:TPh2xwoltiUJSigMfpzGUaG1v5jCnj95E:tWwoacgIyUaGzCjT

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Modifies Installed Components in the registry

    • Deletes itself

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks