General

  • Target

    7b99c632ab84f20275e3e843fea6c977e4b067bbb9793a8ec1fd70dfcd7c0655

  • Size

    179KB

  • Sample

    240523-darfcabb6w

  • MD5

    9fd9c907502c996750546de517da033f

  • SHA1

    ed4a00b0a408d69434c6b4a06571d43a8bb48fe6

  • SHA256

    7b99c632ab84f20275e3e843fea6c977e4b067bbb9793a8ec1fd70dfcd7c0655

  • SHA512

    285456a65835536e842ab9f79ca0008ac35eb79dfc47abaab78d847403f9a2edfb6bdd1ad322be529979f2140b4c8100b2f585ebfbbf79fc561a170aac81d360

  • SSDEEP

    3072:DZYKT/Hp36WRurj0XDftvjlq50kCzI0+4M:qwvp36frj0Xb7kCzIdX

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Targets

    • Target

      7b99c632ab84f20275e3e843fea6c977e4b067bbb9793a8ec1fd70dfcd7c0655

    • Size

      179KB

    • MD5

      9fd9c907502c996750546de517da033f

    • SHA1

      ed4a00b0a408d69434c6b4a06571d43a8bb48fe6

    • SHA256

      7b99c632ab84f20275e3e843fea6c977e4b067bbb9793a8ec1fd70dfcd7c0655

    • SHA512

      285456a65835536e842ab9f79ca0008ac35eb79dfc47abaab78d847403f9a2edfb6bdd1ad322be529979f2140b4c8100b2f585ebfbbf79fc561a170aac81d360

    • SSDEEP

      3072:DZYKT/Hp36WRurj0XDftvjlq50kCzI0+4M:qwvp36frj0Xb7kCzIdX

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks