General

  • Target

    acffd8900443ac894f081b3fb05c5c5ee7c5290554812410597c0b2c5d0f343a

  • Size

    227KB

  • Sample

    240509-3cmydagb55

  • MD5

    07a6ab2bd94fce3167f318aecc447dcf

  • SHA1

    20a1b851ca96e1567d57e02b4699610dd7fe92a6

  • SHA256

    acffd8900443ac894f081b3fb05c5c5ee7c5290554812410597c0b2c5d0f343a

  • SHA512

    84dc9376437ecc01f115a076ea1badf6f2001cff4566d17e193331b36c12bbe29c402cb78cb837e07295cfe8b6237a17a22ac24624902c472dd8a23ef2b7b0d5

  • SSDEEP

    3072:8swncITh3kyh++Mzh/PutSL02V6HUpVaz3Sl0kIO6+/2EdTsiet:AV8FPut32V5Dazu0Vt+/2EdTm

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      acffd8900443ac894f081b3fb05c5c5ee7c5290554812410597c0b2c5d0f343a

    • Size

      227KB

    • MD5

      07a6ab2bd94fce3167f318aecc447dcf

    • SHA1

      20a1b851ca96e1567d57e02b4699610dd7fe92a6

    • SHA256

      acffd8900443ac894f081b3fb05c5c5ee7c5290554812410597c0b2c5d0f343a

    • SHA512

      84dc9376437ecc01f115a076ea1badf6f2001cff4566d17e193331b36c12bbe29c402cb78cb837e07295cfe8b6237a17a22ac24624902c472dd8a23ef2b7b0d5

    • SSDEEP

      3072:8swncITh3kyh++Mzh/PutSL02V6HUpVaz3Sl0kIO6+/2EdTsiet:AV8FPut32V5Dazu0Vt+/2EdTm

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Modifies Installed Components in the registry

    • Deletes itself

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks