General

  • Target

    332c2ccfec361b0f6d6d7cb3e81cb9ddd680210b03ae20b22c70183a8b12bef9

  • Size

    213KB

  • Sample

    240516-2waayscg41

  • MD5

    e34ae240cb35292f39afc8879701b1b4

  • SHA1

    cb13a9a883c9e04228cf8b90314c7e3902e64a38

  • SHA256

    332c2ccfec361b0f6d6d7cb3e81cb9ddd680210b03ae20b22c70183a8b12bef9

  • SHA512

    747768e1b5a47b57f93ada9815d196764ba0d91704cb976c0e223b392d2f41b311a1ac203fca56b2cc8dc95e24292869420029d83505e68eb156166cb051e000

  • SSDEEP

    3072:UmYlNbQaChaan/ggaiNsJ3Rbq45hCDAGU:UnltCXn/gYNsJ3tlpGU

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      332c2ccfec361b0f6d6d7cb3e81cb9ddd680210b03ae20b22c70183a8b12bef9

    • Size

      213KB

    • MD5

      e34ae240cb35292f39afc8879701b1b4

    • SHA1

      cb13a9a883c9e04228cf8b90314c7e3902e64a38

    • SHA256

      332c2ccfec361b0f6d6d7cb3e81cb9ddd680210b03ae20b22c70183a8b12bef9

    • SHA512

      747768e1b5a47b57f93ada9815d196764ba0d91704cb976c0e223b392d2f41b311a1ac203fca56b2cc8dc95e24292869420029d83505e68eb156166cb051e000

    • SSDEEP

      3072:UmYlNbQaChaan/ggaiNsJ3Rbq45hCDAGU:UnltCXn/gYNsJ3tlpGU

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Deletes itself

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks