General

  • Target

    29e6736afd321358d41710277a27421bebcdbd1abbd12bf942007169982fd4e3

  • Size

    748KB

  • Sample

    240523-21e21acf7y

  • MD5

    ea794f68554409890249b0a3d3af52f7

  • SHA1

    386d920bea81fada037e6ae190cc436ca5e6e6ff

  • SHA256

    29e6736afd321358d41710277a27421bebcdbd1abbd12bf942007169982fd4e3

  • SHA512

    372df46640a62b98e741d400b46e78bbb388840d6f2a9180ccf9dfe1dee67c17fea663a86415457ea0661f203d01872b937db93cf0ee8100a5996e3a59cb9a5b

  • SSDEEP

    12288:TXAzF0sl/n/LAzyncbHr7bkHFRB7JPDA2A0b3bsh3E4a4uw2iDlgNG1VUph765:TXAzF0kAzgIrCRDx3b6ru4msepE5

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://bipto.org/tmp/index.php

http://jobresurs.ru/tmp/index.php

http://tonybabb.com/tmp/index.php

rc4.i32
rc4.i32

Targets

    • Target

      29e6736afd321358d41710277a27421bebcdbd1abbd12bf942007169982fd4e3

    • Size

      748KB

    • MD5

      ea794f68554409890249b0a3d3af52f7

    • SHA1

      386d920bea81fada037e6ae190cc436ca5e6e6ff

    • SHA256

      29e6736afd321358d41710277a27421bebcdbd1abbd12bf942007169982fd4e3

    • SHA512

      372df46640a62b98e741d400b46e78bbb388840d6f2a9180ccf9dfe1dee67c17fea663a86415457ea0661f203d01872b937db93cf0ee8100a5996e3a59cb9a5b

    • SSDEEP

      12288:TXAzF0sl/n/LAzyncbHr7bkHFRB7JPDA2A0b3bsh3E4a4uw2iDlgNG1VUph765:TXAzF0kAzgIrCRDx3b6ru4msepE5

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Information Discovery

2
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Tasks