General

  • Target

    2ec3c68f35c9c0b6da3ef09f1c3f506e9ad89183314327a569c6c94ddb6c0636_NeikiAnalytics.exe

  • Size

    312KB

  • Sample

    240627-a1gr2swckk

  • MD5

    fc745757eb8c700d53bcc3c731c5f340

  • SHA1

    200cf0f776a1ef25324b7adf1ce4407d00e4d954

  • SHA256

    2ec3c68f35c9c0b6da3ef09f1c3f506e9ad89183314327a569c6c94ddb6c0636

  • SHA512

    d252df4662dbbaae1c92b93f8a665ee97cd03c2da98f629b3a77ec0243db8018d8c7af26b6e75151edebceddb555dc3096f4b4ac99d9a681c6b5bf08d1430af6

  • SSDEEP

    3072:1S6ElAL3Rk+gdbhTQRJmxvU/hXJwzgpAfQ5bUes0L:1JEGLBk+cNk8U5R+aUe

Malware Config

Extracted

Family

smokeloader

Botnet

pub3

Extracted

Family

smokeloader

Version

2022

C2

http://movlat.com/tmp/

http://llcbc.org/tmp/

http://lindex24.ru/tmp/

http://qeqei.xyz/tmp/

rc4.i32
rc4.i32

Targets

    • Target

      2ec3c68f35c9c0b6da3ef09f1c3f506e9ad89183314327a569c6c94ddb6c0636_NeikiAnalytics.exe

    • Size

      312KB

    • MD5

      fc745757eb8c700d53bcc3c731c5f340

    • SHA1

      200cf0f776a1ef25324b7adf1ce4407d00e4d954

    • SHA256

      2ec3c68f35c9c0b6da3ef09f1c3f506e9ad89183314327a569c6c94ddb6c0636

    • SHA512

      d252df4662dbbaae1c92b93f8a665ee97cd03c2da98f629b3a77ec0243db8018d8c7af26b6e75151edebceddb555dc3096f4b4ac99d9a681c6b5bf08d1430af6

    • SSDEEP

      3072:1S6ElAL3Rk+gdbhTQRJmxvU/hXJwzgpAfQ5bUes0L:1JEGLBk+cNk8U5R+aUe

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks