General

  • Target

    5f1fa1d46b0a90a855db5a2b0100ae83164fc1168587373a2b62ee22f75cbe54

  • Size

    140KB

  • Sample

    241105-xsm1eswfna

  • MD5

    df5af7d049c41c12cc017feb5c46d1fc

  • SHA1

    6dfde96c74e1249ea39f2af1dfb17b28ed75a2a8

  • SHA256

    5f1fa1d46b0a90a855db5a2b0100ae83164fc1168587373a2b62ee22f75cbe54

  • SHA512

    b89d099825c6020dc4840d211ca419e4c55aead80a835f602fdad8f63d24bb5ef7d45c4f8bf1ff784acb28fd8f383c096e5c23e7bb2301e40aac13bf63387be4

  • SSDEEP

    3072:NV0ijW8SZgrAXJXr62rHwOa+6D3L5UQQ8DIzxuvaDQZgCwZLM7gF8b8:NV0ij4JXpQzqQQ8DItuvaDUHgk8

Malware Config

Extracted

Family

smokeloader

Botnet

2023

Targets

    • Target

      10cb7d010c57f2cb568f4451e7c0b201ffb86dd17bdeda36c0d1e9bc68bcf55f.exe

    • Size

      215KB

    • MD5

      64e1d7ec7103d1a04029c4db2941a8d3

    • SHA1

      706a486a113041efd175ed05bf86fd5aad67083f

    • SHA256

      10cb7d010c57f2cb568f4451e7c0b201ffb86dd17bdeda36c0d1e9bc68bcf55f

    • SHA512

      b38c7104b5406ef1ef212637c7bf201e182359f5bed078ca9718ebfbf0ed5f59927a612ce422e7eab692c591c9089c8c3231f49966e75e28af7c2ff0f675277d

    • SSDEEP

      3072:paUIvLUh91b504gy5kJM0yD1h52aNfC6YQGJ58ZdIqxQYzEVb:sUwLk91sZyphoaNfLYrJ58FFzyb

MITRE ATT&CK Enterprise v15

Tasks