General

  • Target

    cbbfb057fe94f76adc1b196883cb8d28_JaffaCakes118

  • Size

    196KB

  • Sample

    240830-1v63vsyeqn

  • MD5

    cbbfb057fe94f76adc1b196883cb8d28

  • SHA1

    348484e3509a2d9380bae4e3f3a466e27c0da1c2

  • SHA256

    9c5602cf6ba6d8408e2ab48869b04e7fb12bbdee87cd28e532f64fb3e524fc53

  • SHA512

    c538a54d74bc4a61b03ff151260d0e5da22591d5c5be73f276cd04776c856cfb9361ecb7dffa655ff175ab4d38c865b3620a5c49bd2b911978466eec25ff03d2

  • SSDEEP

    3072:L17tiahkBK1KoPMlXd/HrElouMNqpQnXqtB8T6ybj1:L6aiBK1jP4NzElRMNqpiXqQL

Malware Config

Extracted

Family

smokeloader

Botnet

VgU

Extracted

Family

smokeloader

Version

2018

C2

http://klub11n.se/kp/

rc4.i32
rc4.i32

Targets

    • Target

      cbbfb057fe94f76adc1b196883cb8d28_JaffaCakes118

    • Size

      196KB

    • MD5

      cbbfb057fe94f76adc1b196883cb8d28

    • SHA1

      348484e3509a2d9380bae4e3f3a466e27c0da1c2

    • SHA256

      9c5602cf6ba6d8408e2ab48869b04e7fb12bbdee87cd28e532f64fb3e524fc53

    • SHA512

      c538a54d74bc4a61b03ff151260d0e5da22591d5c5be73f276cd04776c856cfb9361ecb7dffa655ff175ab4d38c865b3620a5c49bd2b911978466eec25ff03d2

    • SSDEEP

      3072:L17tiahkBK1KoPMlXd/HrElouMNqpQnXqtB8T6ybj1:L6aiBK1jP4NzElRMNqpiXqQL

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks