General

  • Target

    05dcffe1d8e8e209a90b522192ad8000.bin

  • Size

    3KB

  • Sample

    241120-bcvvfa1qcr

  • MD5

    ce74bdd7f7dbeb754a7c320b59f29074

  • SHA1

    b9442308abb0a4454d44d35635a74f902843ba0b

  • SHA256

    7abe05251323a89ff4f0939f7f4a09662ff4b4450ffb00bd457c8cdef52903a5

  • SHA512

    816931078c7954a87c59c4b167dbf27e6e014ed32034f3cfa6bb12dfa5049f7002fa002fca5c65e553d9197bd03b27aa73459d64e2ceebf6dd855f697aac4dbc

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

exe.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

Targets

    • Target

      35717c891450767af251ec90a7c05ffd407d7b2d2897d96c176c51b5b8a156b5.hta

    • Size

      178KB

    • MD5

      05dcffe1d8e8e209a90b522192ad8000

    • SHA1

      77c19b392d39bce4906b5c4e5f1ab0a0c9182dc7

    • SHA256

      35717c891450767af251ec90a7c05ffd407d7b2d2897d96c176c51b5b8a156b5

    • SHA512

      11eafd5f126bb4873ec7be1dc6fe7246f3de8324c413073bc914827695ed1db1bb9b6e870414c0d4aba990a6a817d6c029f7aa02e5061434dcdb965a378b5734

    • SSDEEP

      48:4vahW5oZz7eWLB2ZfywyQhhY1ywyQbD6ngS5RJCS0d399Dd5nCYmIYZAjo3ueufc:4vCl17ZtQjtQhVFlfnnCO4AjovtQX5Q

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Smokeloader family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Evasion via Device Credential Deployment

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks