General
-
Target
4fd9309f1c39c28d69415f834c167a3fc943f1abf428e7c131f1b2f16bbb536c
-
Size
319KB
-
Sample
220115-exv8gscggn
-
MD5
8f18b3951ebf449691a64b31cdb19f3e
-
SHA1
299884e381f8d243430b00732de3d6374a8cb245
-
SHA256
4fd9309f1c39c28d69415f834c167a3fc943f1abf428e7c131f1b2f16bbb536c
-
SHA512
26e979d335d72954550915efe62fad1d07a0981ec4f9502ed81115cefaf329fb5bfd161cf4f5e634dc389fb77f1a186c7827f3bd2c8ac167821f6fd266570b89
Static task
static1
Behavioral task
behavioral1
Sample
4fd9309f1c39c28d69415f834c167a3fc943f1abf428e7c131f1b2f16bbb536c.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Extracted
tofsee
patmushta.info
parubey.info
Targets
-
-
Target
4fd9309f1c39c28d69415f834c167a3fc943f1abf428e7c131f1b2f16bbb536c
-
Size
319KB
-
MD5
8f18b3951ebf449691a64b31cdb19f3e
-
SHA1
299884e381f8d243430b00732de3d6374a8cb245
-
SHA256
4fd9309f1c39c28d69415f834c167a3fc943f1abf428e7c131f1b2f16bbb536c
-
SHA512
26e979d335d72954550915efe62fad1d07a0981ec4f9502ed81115cefaf329fb5bfd161cf4f5e634dc389fb77f1a186c7827f3bd2c8ac167821f6fd266570b89
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
Arkei Stealer Payload
-
Creates new service(s)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-