General

  • Target

    9719eb8b2eca4197d63e09c1939144931ca6485338baee6b281ee2745c1793c8

  • Size

    726KB

  • Sample

    240519-gflzlada5z

  • MD5

    8e0d41311b2270061c6bcd1e69600f0a

  • SHA1

    f7089dc2c43021c3619737b50d59681569a4b220

  • SHA256

    9719eb8b2eca4197d63e09c1939144931ca6485338baee6b281ee2745c1793c8

  • SHA512

    668e7c567584192a780a6ca798335e4d17717aac777e324f3ca3a17f9d368afd509c1a28400cdf56d8a2d15fd6b5d528f32c714d8aa5b740641d6a66dfc7ce48

  • SSDEEP

    12288:jjp2zZNUptE4Nqfzqk8Bx9SMb5EPL86xImlKk4jue3p+JJD4b/YiFfDBKNcXDaTh:4zZNUptE4MfGk8B35286+k4p+JaYiZVS

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Targets

    • Target

      9719eb8b2eca4197d63e09c1939144931ca6485338baee6b281ee2745c1793c8

    • Size

      726KB

    • MD5

      8e0d41311b2270061c6bcd1e69600f0a

    • SHA1

      f7089dc2c43021c3619737b50d59681569a4b220

    • SHA256

      9719eb8b2eca4197d63e09c1939144931ca6485338baee6b281ee2745c1793c8

    • SHA512

      668e7c567584192a780a6ca798335e4d17717aac777e324f3ca3a17f9d368afd509c1a28400cdf56d8a2d15fd6b5d528f32c714d8aa5b740641d6a66dfc7ce48

    • SSDEEP

      12288:jjp2zZNUptE4Nqfzqk8Bx9SMb5EPL86xImlKk4jue3p+JJD4b/YiFfDBKNcXDaTh:4zZNUptE4MfGk8B35286+k4p+JaYiZVS

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Tasks