General

  • Target

    bf5a4198df4893e6c4f7c59876a06d7feaaf897b2060dc22357aa1d59468ccfc

  • Size

    224KB

  • Sample

    240517-aa4twsff6y

  • MD5

    300ec4cb5fb7349183bf02c31bc67df3

  • SHA1

    6e42195f6cc83e15f2bc23e3c10acf43b2cca695

  • SHA256

    bf5a4198df4893e6c4f7c59876a06d7feaaf897b2060dc22357aa1d59468ccfc

  • SHA512

    e14bd68a87577763ebe4bd9b45cc1df5e90f4c134e5c031f0236b34cff35c72ae33c83ecc0865a340ec08ca9c5f767f0dc27c270829edd82b40f9e5c94d7488d

  • SSDEEP

    3072:yCoM+wvHbJKfpnxdRV+qBvExEN/G8S8vjM1J3aKV7ZKx:KwPkddVQxMe8S8vj6an

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

pub1

Targets

    • Target

      bf5a4198df4893e6c4f7c59876a06d7feaaf897b2060dc22357aa1d59468ccfc

    • Size

      224KB

    • MD5

      300ec4cb5fb7349183bf02c31bc67df3

    • SHA1

      6e42195f6cc83e15f2bc23e3c10acf43b2cca695

    • SHA256

      bf5a4198df4893e6c4f7c59876a06d7feaaf897b2060dc22357aa1d59468ccfc

    • SHA512

      e14bd68a87577763ebe4bd9b45cc1df5e90f4c134e5c031f0236b34cff35c72ae33c83ecc0865a340ec08ca9c5f767f0dc27c270829edd82b40f9e5c94d7488d

    • SSDEEP

      3072:yCoM+wvHbJKfpnxdRV+qBvExEN/G8S8vjM1J3aKV7ZKx:KwPkddVQxMe8S8vj6an

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Modifies Installed Components in the registry

    • Deletes itself

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks