General

  • Target

    e0c5b2f78ed68289375f3386e564c41fb1cba2a945aeaa4ba6c84f4e147ada82

  • Size

    151KB

  • Sample

    241105-n36qvazhpb

  • MD5

    9215e4ab207c3f27d33e975c72562b73

  • SHA1

    61e6c6355a233fa725897b322824d191b2cd6bef

  • SHA256

    e0c5b2f78ed68289375f3386e564c41fb1cba2a945aeaa4ba6c84f4e147ada82

  • SHA512

    8b763af0e98f42c05f31d28b0eeab58a224966ecc75afc6e5ca4d91e2296bee480459f6cd0adfc4c29fca6a6964c8fa421b15ced0081839fdd1732d9fc937a53

  • SSDEEP

    3072:THx9lREnEMD4NpB6mGM44yTU9p7ptaZKnWYzt/ADpSJBCERx2vXyK63Qm:rEEMD4NxGz4yI1UZKnfiDERx2It

Malware Config

Extracted

Family

smokeloader

Botnet

2023

Targets

    • Target

      2654475cea33d0b2cdec44ffff6290b987d5de1d0be3fa7a53bbd93b6bce28c9

    • Size

      240KB

    • MD5

      e1426d62574e30212176d71ec7a80ff8

    • SHA1

      b44885c7f10ade5e514caedd02a65dcde29b152b

    • SHA256

      2654475cea33d0b2cdec44ffff6290b987d5de1d0be3fa7a53bbd93b6bce28c9

    • SHA512

      68af365426210512f2a718ad5fca037e88178de6b0280f57678b670efcd9eb2100e1b35746be22946f013b6f1724e7cf87d788b1b6cf9ffeaaa7ff9387e68fed

    • SSDEEP

      3072:y8XR/skqRLBy5sFIE5xhFV5dfVniTU9p7ptaZKnWYzt/ADjWkdSAKTv7M2nvQGWy:/1qRLPaiTlfVniI1UZKnficNb7V4b7i

MITRE ATT&CK Enterprise v15

Tasks