General

  • Target

    35fbafc1a201f702a50d5d85560b9bfc32dd4721429a0a44d050827a14644b94

  • Size

    232KB

  • Sample

    240514-sw6jqach88

  • MD5

    156b871ec3ee5ee0cc0185dd2e031f2e

  • SHA1

    c7b56c8566a0b6ffce42d7ededb1dbc77fe6d454

  • SHA256

    35fbafc1a201f702a50d5d85560b9bfc32dd4721429a0a44d050827a14644b94

  • SHA512

    8ba01c1a1954475f52f9ec191dc9f97e08315f38d5199f21e62364485d98a30343db65189f5a2f5d86bf39164ee3324e1fc6344bc4ab8061e44400a6c99ee399

  • SSDEEP

    3072:MuCMXya6ISUGqoonwNCW+qmmOtEEEEEEE2sz/qQ/4+g4NWn+P7bm1O/69pTehdqf:wPU37wNCWr1qQ9g4k+PHv696r+

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      35fbafc1a201f702a50d5d85560b9bfc32dd4721429a0a44d050827a14644b94

    • Size

      232KB

    • MD5

      156b871ec3ee5ee0cc0185dd2e031f2e

    • SHA1

      c7b56c8566a0b6ffce42d7ededb1dbc77fe6d454

    • SHA256

      35fbafc1a201f702a50d5d85560b9bfc32dd4721429a0a44d050827a14644b94

    • SHA512

      8ba01c1a1954475f52f9ec191dc9f97e08315f38d5199f21e62364485d98a30343db65189f5a2f5d86bf39164ee3324e1fc6344bc4ab8061e44400a6c99ee399

    • SSDEEP

      3072:MuCMXya6ISUGqoonwNCW+qmmOtEEEEEEE2sz/qQ/4+g4NWn+P7bm1O/69pTehdqf:wPU37wNCWr1qQ9g4k+PHv696r+

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks