General

  • Target

    4daa25326ccb9300ab571c6ccd64fc50_NeikiAnalytics.exe

  • Size

    225KB

  • Sample

    240516-2p4wzscd2w

  • MD5

    4daa25326ccb9300ab571c6ccd64fc50

  • SHA1

    411b341bbf7116896d9cf95ca2c9dc24546f150f

  • SHA256

    dcf2b2270505e9fa0caa26a2eff9e2de8a3cf95f0fe479e07332a0f22777525e

  • SHA512

    26a4dfefcf098e7b0f2139bc0d950c28d7be1513f336249dfc849696c888ce0fe69b66c608646f2953500c069a85db69634100a1d6d576da4e66ae4855763216

  • SSDEEP

    3072:LsPOrBmaE42Zm/+Oruk+QBvb5SH7bSUynK/FeRLFgKhWspsm1+4Q:54z8GXkJ587bSJKteTrXsmN

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      4daa25326ccb9300ab571c6ccd64fc50_NeikiAnalytics.exe

    • Size

      225KB

    • MD5

      4daa25326ccb9300ab571c6ccd64fc50

    • SHA1

      411b341bbf7116896d9cf95ca2c9dc24546f150f

    • SHA256

      dcf2b2270505e9fa0caa26a2eff9e2de8a3cf95f0fe479e07332a0f22777525e

    • SHA512

      26a4dfefcf098e7b0f2139bc0d950c28d7be1513f336249dfc849696c888ce0fe69b66c608646f2953500c069a85db69634100a1d6d576da4e66ae4855763216

    • SSDEEP

      3072:LsPOrBmaE42Zm/+Oruk+QBvb5SH7bSUynK/FeRLFgKhWspsm1+4Q:54z8GXkJ587bSJKteTrXsmN

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Modifies Installed Components in the registry

    • Deletes itself

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks