General

  • Target

    4608-2-0x0000000000400000-0x000000000040B000-memory.dmp

  • Size

    44KB

  • Sample

    240816-pjl3rstgrd

  • MD5

    81f85568de50493df84e646a54b408d9

  • SHA1

    1ea9df6df3f96f03b2ba6ca501580d8730c7237b

  • SHA256

    798dd32d59d33fd5a70bc51638d7c422ee39dd258aa9542d55a47283e4999f78

  • SHA512

    8b7e00537221d1074a5c2861b60aba4362468f589a2f31f73bc5050fda430d1e34d0cfa9a316e26bc7342e19dfd029e31c114850ab2503b0a07cc4ca89bfa2da

  • SSDEEP

    768:CNRAyLonz5y+bgsDF5I0haNLj1PokgJ4T:CNRATnzVF20MBj1PgJ4T

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Targets

    • Target

      4608-2-0x0000000000400000-0x000000000040B000-memory.dmp

    • Size

      44KB

    • MD5

      81f85568de50493df84e646a54b408d9

    • SHA1

      1ea9df6df3f96f03b2ba6ca501580d8730c7237b

    • SHA256

      798dd32d59d33fd5a70bc51638d7c422ee39dd258aa9542d55a47283e4999f78

    • SHA512

      8b7e00537221d1074a5c2861b60aba4362468f589a2f31f73bc5050fda430d1e34d0cfa9a316e26bc7342e19dfd029e31c114850ab2503b0a07cc4ca89bfa2da

    • SSDEEP

      768:CNRAyLonz5y+bgsDF5I0haNLj1PokgJ4T:CNRATnzVF20MBj1PgJ4T

MITRE ATT&CK Enterprise v15

Tasks