A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #30894  by c0d3inj3cT
 Tue Oct 10, 2017 1:04 pm
SmokeLoader campaign is active in the wild since past few weeks. It is sent through Word Documents attached to emails.

MD5 hash: e6671e44ed357802439d0b9fbce344bf

Macro -> bitsadmin -> download Binary from URL: hxxp://89.248.169.136/bigmac.jpg

Callback servers:

hxxps://securityupdateserver1.com/blog/wp.php
hxxps://securityupdateserver2.com/blog/wp.php
hxxps://securityupdateserver3.com/blog/wp.php

All details of evasion techniques used by SmokeLoader mentioned here: http://www.pwncode.club/2017/10/evasion ... -wild.html