General

  • Target

    ffff.exe

  • Size

    13KB

  • Sample

    241230-j8cbzatnck

  • MD5

    a441e40fb514d694749fc5b61af5ca91

  • SHA1

    63a70ac55fcfa210fbc30ee104be29a037f691d2

  • SHA256

    b7e03030f50714f574f595bf9d92ab5b3179bb6b617e658db88f0e8c7d05989b

  • SHA512

    c5f5d3eae4ac85955c13e91fdf19f3438c56aaaf77470413428180f4fff2c865128c24d0281acbcbb0ef281db299189c99b9d39ff68105c444452a766e654188

  • SSDEEP

    192:vBAlEMZWAY5nCtCY61l40CMvPSohzWLz5xWfgOQ/muu/d5THm4Ot4O:JAnLAXNy/m3/bTK4O

Malware Config

Extracted

Family

smokeloader

Version

2017

C2

http://dogewareservice.ru/

Targets

    • Target

      ffff.exe

    • Size

      13KB

    • MD5

      a441e40fb514d694749fc5b61af5ca91

    • SHA1

      63a70ac55fcfa210fbc30ee104be29a037f691d2

    • SHA256

      b7e03030f50714f574f595bf9d92ab5b3179bb6b617e658db88f0e8c7d05989b

    • SHA512

      c5f5d3eae4ac85955c13e91fdf19f3438c56aaaf77470413428180f4fff2c865128c24d0281acbcbb0ef281db299189c99b9d39ff68105c444452a766e654188

    • SSDEEP

      192:vBAlEMZWAY5nCtCY61l40CMvPSohzWLz5xWfgOQ/muu/d5THm4Ot4O:JAnLAXNy/m3/bTK4O

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Smokeloader family

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks