General

  • Target

    c0a0fbc6485f4545d0914ddff5fd8ed0_NEAS

  • Size

    208KB

  • Sample

    240507-wk1qwagh5z

  • MD5

    c0a0fbc6485f4545d0914ddff5fd8ed0

  • SHA1

    56dbd199dd4f31fdc9db8782c4817a49bc28b429

  • SHA256

    4f792ce3a467572688a6aa4b389254b860fa79bcda9142af0be0e94c8eda8f93

  • SHA512

    ee208aefeb55b998d245609957e677bd8c3ab049f1d844efc283d25e8c7913fbd1ee5277e41a05bf00bc1eed92f78db3feeef1e745fac35e01c0e5077b7b9dea

  • SSDEEP

    3072:Bw1Y91VV3eJI1g9BIwuk7znyX/8BcB5RDLTcZ1:gY91zYggEuznS9TcZ

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      c0a0fbc6485f4545d0914ddff5fd8ed0_NEAS

    • Size

      208KB

    • MD5

      c0a0fbc6485f4545d0914ddff5fd8ed0

    • SHA1

      56dbd199dd4f31fdc9db8782c4817a49bc28b429

    • SHA256

      4f792ce3a467572688a6aa4b389254b860fa79bcda9142af0be0e94c8eda8f93

    • SHA512

      ee208aefeb55b998d245609957e677bd8c3ab049f1d844efc283d25e8c7913fbd1ee5277e41a05bf00bc1eed92f78db3feeef1e745fac35e01c0e5077b7b9dea

    • SSDEEP

      3072:Bw1Y91VV3eJI1g9BIwuk7znyX/8BcB5RDLTcZ1:gY91zYggEuznS9TcZ

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Modifies Installed Components in the registry

    • Deletes itself

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks