General

  • Target

    307e7351ca03b087f7e6a5cf203d427aae767a63861bf7b3d306464f56e3b187

  • Size

    170KB

  • Sample

    240523-23da7acg65

  • MD5

    55a96029f346de0031b2f46d175800ca

  • SHA1

    98f4eaf475dd48fe0ff5b6a4974a091072b77659

  • SHA256

    307e7351ca03b087f7e6a5cf203d427aae767a63861bf7b3d306464f56e3b187

  • SHA512

    86b00c73eca55137dce2a467da30ddcf4ed604e55f55b712a1e7c5b72013361b763be6464dcbde4c973b479dbaa779c6a867d13b11e34d59a35bd71052aee80b

  • SSDEEP

    1536:ErvrsOzcXfqjzVPyTL6yMZvD4taQLRO2VJXq99eJ5ldr9Aigg:LdTL6rvD4q8JXquJ5G

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      307e7351ca03b087f7e6a5cf203d427aae767a63861bf7b3d306464f56e3b187

    • Size

      170KB

    • MD5

      55a96029f346de0031b2f46d175800ca

    • SHA1

      98f4eaf475dd48fe0ff5b6a4974a091072b77659

    • SHA256

      307e7351ca03b087f7e6a5cf203d427aae767a63861bf7b3d306464f56e3b187

    • SHA512

      86b00c73eca55137dce2a467da30ddcf4ed604e55f55b712a1e7c5b72013361b763be6464dcbde4c973b479dbaa779c6a867d13b11e34d59a35bd71052aee80b

    • SSDEEP

      1536:ErvrsOzcXfqjzVPyTL6yMZvD4taQLRO2VJXq99eJ5ldr9Aigg:LdTL6rvD4q8JXquJ5G

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks