General

  • Target

    27587755ccfed117ac06952e6a9a33752b327a344fac395bb4c3141a069734b2

  • Size

    211KB

  • Sample

    240509-3thpzseb4x

  • MD5

    57494a7b70db072a8539e7fb3171e873

  • SHA1

    9c521ea54a1c099c32bea8d9912008fd998a7e73

  • SHA256

    27587755ccfed117ac06952e6a9a33752b327a344fac395bb4c3141a069734b2

  • SHA512

    8609f7f692f9ae9cec51e172ae3f3780a5c2731191c1b8f71cf4b3fb41d649cb892e66aeb610014cbfcc8c4e3b38f58d49f8a76c539c163479a4cd1306de1fef

  • SSDEEP

    3072:G//IweqtWGLkaYCRwG5UfnDjoylmNLhO5Pe7nDY7Yi:dGLk5tvPUL9

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      27587755ccfed117ac06952e6a9a33752b327a344fac395bb4c3141a069734b2

    • Size

      211KB

    • MD5

      57494a7b70db072a8539e7fb3171e873

    • SHA1

      9c521ea54a1c099c32bea8d9912008fd998a7e73

    • SHA256

      27587755ccfed117ac06952e6a9a33752b327a344fac395bb4c3141a069734b2

    • SHA512

      8609f7f692f9ae9cec51e172ae3f3780a5c2731191c1b8f71cf4b3fb41d649cb892e66aeb610014cbfcc8c4e3b38f58d49f8a76c539c163479a4cd1306de1fef

    • SSDEEP

      3072:G//IweqtWGLkaYCRwG5UfnDjoylmNLhO5Pe7nDY7Yi:dGLk5tvPUL9

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks