General

  • Target

    bd795e6baf037837d0d8f1d80cf5975cf2e145137d2398758cd03df083b54c5b

  • Size

    764KB

  • Sample

    240508-3t5jraee6s

  • MD5

    5db607859b88d1e2a2e3c6d14c4a1512

  • SHA1

    a036563c4057ed49281bf19f9764f9acbbeae517

  • SHA256

    bd795e6baf037837d0d8f1d80cf5975cf2e145137d2398758cd03df083b54c5b

  • SHA512

    fb5230fc62e29fe1b620b6ba01e91291030d2ae147f51bb87dedf6bb4f87fe5a6bb71fa2c73bd401bffc7b5533d3438b6dc6deb012a2cf5c4830cf598fa5210c

  • SSDEEP

    12288:5MwNrpcQxPNrtU1C5BnoTgMo7p2eCU7Vu4tJ2NMbUqwd3a8wzST38:5MwN+gA1qBnoMMol2fU7VdtJSM5wd3Tm

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://cellc.org/tmp/index.php

http://h-c-v.ru/tmp/index.php

http://icebrasilpr.com/tmp/index.php

http://piratia-life.ru/tmp/index.php

http://piratia.su/tmp/index.php

rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

pub3

Targets

    • Target

      bd795e6baf037837d0d8f1d80cf5975cf2e145137d2398758cd03df083b54c5b

    • Size

      764KB

    • MD5

      5db607859b88d1e2a2e3c6d14c4a1512

    • SHA1

      a036563c4057ed49281bf19f9764f9acbbeae517

    • SHA256

      bd795e6baf037837d0d8f1d80cf5975cf2e145137d2398758cd03df083b54c5b

    • SHA512

      fb5230fc62e29fe1b620b6ba01e91291030d2ae147f51bb87dedf6bb4f87fe5a6bb71fa2c73bd401bffc7b5533d3438b6dc6deb012a2cf5c4830cf598fa5210c

    • SSDEEP

      12288:5MwNrpcQxPNrtU1C5BnoTgMo7p2eCU7Vu4tJ2NMbUqwd3a8wzST38:5MwN+gA1qBnoMMol2fU7VdtJSM5wd3Tm

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Tasks