General

  • Target

    file.exe

  • Size

    213KB

  • Sample

    240517-vj4kpshf5t

  • MD5

    29c2d7eec8802f3967aafcd0d16628b1

  • SHA1

    efe099762635d1d6284afb88225029bf89adec5d

  • SHA256

    843ad82984513d049fcbf1258c0a2cf71fd519ad98a272e54ea95d42422a24bb

  • SHA512

    755316646a0fcf8fef69832e33e8c611eb02e9e88e6416f7a19c499acab82f9a0e15d49fa92de70aaa5085f05a591e33456f8df61af5534cdb43c3f652e1502a

  • SSDEEP

    3072:XG6IE/WIaxT8XyWiTmZTb05a+f4IOCX9:N/0oXyWiTQh+fN

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      file.exe

    • Size

      213KB

    • MD5

      29c2d7eec8802f3967aafcd0d16628b1

    • SHA1

      efe099762635d1d6284afb88225029bf89adec5d

    • SHA256

      843ad82984513d049fcbf1258c0a2cf71fd519ad98a272e54ea95d42422a24bb

    • SHA512

      755316646a0fcf8fef69832e33e8c611eb02e9e88e6416f7a19c499acab82f9a0e15d49fa92de70aaa5085f05a591e33456f8df61af5534cdb43c3f652e1502a

    • SSDEEP

      3072:XG6IE/WIaxT8XyWiTmZTb05a+f4IOCX9:N/0oXyWiTQh+fN

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Modifies Installed Components in the registry

    • Deletes itself

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks