General
-
Target
bemaji.exe
-
Size
135KB
-
Sample
201015-k8r5q4zt2a
-
MD5
6cc41d1ccd61ccdb3857703f83959aca
-
SHA1
caf89ae09f7435dcef4e886b056d020ee34925cf
-
SHA256
91647ac947d5d5d3a0dc69e98070bfc2f9841d7839b579d69c524b02869a497f
-
SHA512
4adde26f8e13509a6ead86ebe23b7b45742e4dea5faf364b0559f0b5142b8faa2e8331e79528e60af1e290804e9ebbc29cba94833cede3e723b83b55fd7bcc8e
Static task
static1
Behavioral task
behavioral1
Sample
bemaji.exe
Resource
win7v200722
Malware Config
Extracted
smokeloader
2020
http://sm15sdsd.xyz/
Targets
-
-
Target
bemaji.exe
-
Size
135KB
-
MD5
6cc41d1ccd61ccdb3857703f83959aca
-
SHA1
caf89ae09f7435dcef4e886b056d020ee34925cf
-
SHA256
91647ac947d5d5d3a0dc69e98070bfc2f9841d7839b579d69c524b02869a497f
-
SHA512
4adde26f8e13509a6ead86ebe23b7b45742e4dea5faf364b0559f0b5142b8faa2e8331e79528e60af1e290804e9ebbc29cba94833cede3e723b83b55fd7bcc8e
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-