General

  • Target

    19ca88faee3769b393e39b0b53f7ffd1_JaffaCakes118

  • Size

    592KB

  • Sample

    240628-mjhn8sxcqr

  • MD5

    19ca88faee3769b393e39b0b53f7ffd1

  • SHA1

    3e62d03b64aed59dfc73896a9889c0217a7fad33

  • SHA256

    e05c7fcc42723f4fac59df160aea217fbad7aeab5c0caeb9915bd3c54e38fc6a

  • SHA512

    7d43a8d728d8b948fbf81a4cc6c06b3b12142e853f467bf1c6426e24d0752b97759de26450eb031c8d40157aef5be8bb69264e36937a1b661c0b87c71395e040

  • SSDEEP

    6144:txlfxurXPrbF8v3RYQWZI+FxOXoH+pPD2onA9+CEJPxJH1c/J9BquozilfJXnIZ6:xxuznF8vBxyxOBtlAM9JPbVmHoKivBq

Malware Config

Extracted

Family

smokeloader

Botnet

ku11

Extracted

Family

smokeloader

Version

2020

C2

https://olobus.casa/feedback.php

https://trusho.online/feedback.php

rc4.i32
rc4.i32

Targets

    • Target

      19ca88faee3769b393e39b0b53f7ffd1_JaffaCakes118

    • Size

      592KB

    • MD5

      19ca88faee3769b393e39b0b53f7ffd1

    • SHA1

      3e62d03b64aed59dfc73896a9889c0217a7fad33

    • SHA256

      e05c7fcc42723f4fac59df160aea217fbad7aeab5c0caeb9915bd3c54e38fc6a

    • SHA512

      7d43a8d728d8b948fbf81a4cc6c06b3b12142e853f467bf1c6426e24d0752b97759de26450eb031c8d40157aef5be8bb69264e36937a1b661c0b87c71395e040

    • SSDEEP

      6144:txlfxurXPrbF8v3RYQWZI+FxOXoH+pPD2onA9+CEJPxJH1c/J9BquozilfJXnIZ6:xxuznF8vBxyxOBtlAM9JPbVmHoKivBq

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks