General

  • Target

    1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exe

  • Size

    227KB

  • Sample

    240625-2xgresyfja

  • MD5

    31a0566dc46129543335b523e7336900

  • SHA1

    dddeac01bd8afa707173d1a73e74707c766f16c6

  • SHA256

    1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727

  • SHA512

    06111add34f7fa9e1fc566442abcb8069b8525ff1eebb6dc58f8c166e9189f5e18d3e22522908e91456a0dafe7db960b590f833368511cad657e2b4baa4fe162

  • SSDEEP

    3072:IuU8KLcZklCWZh+ramRHtLgmYT3sgehMjbr/4G2XKQGb3VqnF23MXX:wDc6CWKrBHtLNCJehMDc8zVWF23M

Malware Config

Extracted

Family

smokeloader

Botnet

pub2

Extracted

Family

smokeloader

Version

2022

C2

http://movlat.com/tmp/

http://llcbc.org/tmp/

http://lindex24.ru/tmp/

http://qeqei.xyz/tmp/

rc4.i32
rc4.i32

Targets

    • Target

      1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exe

    • Size

      227KB

    • MD5

      31a0566dc46129543335b523e7336900

    • SHA1

      dddeac01bd8afa707173d1a73e74707c766f16c6

    • SHA256

      1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727

    • SHA512

      06111add34f7fa9e1fc566442abcb8069b8525ff1eebb6dc58f8c166e9189f5e18d3e22522908e91456a0dafe7db960b590f833368511cad657e2b4baa4fe162

    • SSDEEP

      3072:IuU8KLcZklCWZh+ramRHtLgmYT3sgehMjbr/4G2XKQGb3VqnF23MXX:wDc6CWKrBHtLNCJehMDc8zVWF23M

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks