General
-
Target
9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd
-
Size
174KB
-
Sample
210826-epqpjsdkt2
-
MD5
badcc5eeb093cfa468ac2433ca3ec639
-
SHA1
1e9b7c068262b69803f40088d7c296ec1cad777c
-
SHA256
9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd
-
SHA512
9710efb850d7109bbb51a769ecf610e1c79732d331c140392b68448f3fca49249b1458cbf7e4e931056bc4987a605616052197f1003c68d0490f66ab6e25c611
Static task
static1
Behavioral task
behavioral1
Sample
9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd.exe
Resource
win10v20210410
Malware Config
Extracted
C:\How To Restore Your Files.txt
bc1qd53hpk76zutapw8tsgnnkeuuuhuk4ecr2wrd93
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Targets
-
-
Target
9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd
-
Size
174KB
-
MD5
badcc5eeb093cfa468ac2433ca3ec639
-
SHA1
1e9b7c068262b69803f40088d7c296ec1cad777c
-
SHA256
9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd
-
SHA512
9710efb850d7109bbb51a769ecf610e1c79732d331c140392b68448f3fca49249b1458cbf7e4e931056bc4987a605616052197f1003c68d0490f66ab6e25c611
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-