General

  • Target

    e0b5b550a2889c93ebc2f92ca39ae360_NeikiAnalytics

  • Size

    706KB

  • Sample

    240509-ylm8aaef44

  • MD5

    e0b5b550a2889c93ebc2f92ca39ae360

  • SHA1

    a07b9886ae127354f3300c87b6b3a14baf3d681e

  • SHA256

    6925976f4fd5ee91f2fa151e287de8d82ee5839b14b3c0704c4888152bd91f5d

  • SHA512

    4270ccb5b175a698103e0c23756acb27462ed08243997d0964089bb11c6cfafe60200bf4da21eebf96a4c74f70f3a15c91cf9296c20b1e63babab37d97e9f6ec

  • SSDEEP

    12288:/MwVShoxD8J+pIeoDfiTBLypIkEWxAXvJlse8nBtczhaNY2R7qVuUA3Ns5r:/MwVStJ+yBDIOA/Jee6Bis7OuUA9s

Malware Config

Extracted

Family

smokeloader

Botnet

pub3

Targets

    • Target

      e0b5b550a2889c93ebc2f92ca39ae360_NeikiAnalytics

    • Size

      706KB

    • MD5

      e0b5b550a2889c93ebc2f92ca39ae360

    • SHA1

      a07b9886ae127354f3300c87b6b3a14baf3d681e

    • SHA256

      6925976f4fd5ee91f2fa151e287de8d82ee5839b14b3c0704c4888152bd91f5d

    • SHA512

      4270ccb5b175a698103e0c23756acb27462ed08243997d0964089bb11c6cfafe60200bf4da21eebf96a4c74f70f3a15c91cf9296c20b1e63babab37d97e9f6ec

    • SSDEEP

      12288:/MwVShoxD8J+pIeoDfiTBLypIkEWxAXvJlse8nBtczhaNY2R7qVuUA3Ns5r:/MwVStJ+yBDIOA/Jee6Bis7OuUA9s

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Tasks