General
-
Target
ca389b38fb88de27d8e6782f9642d98989af618e7d1af4cd6b8e5fc8eed31186
-
Size
263KB
-
Sample
220124-vz54gagbgq
-
MD5
5f8d526cc16823160c06593405a3b393
-
SHA1
64b97251781b811078236469b999e61bde4563d0
-
SHA256
ca389b38fb88de27d8e6782f9642d98989af618e7d1af4cd6b8e5fc8eed31186
-
SHA512
ba5690e0b0288e9ca2d647a68f6927717ae77298e3037474386e2bbf3d0ea64c5f6be26bca4e9d995751291964ef8f5b6cea058b7c432dd7782890e91494f295
Static task
static1
Behavioral task
behavioral1
Sample
ca389b38fb88de27d8e6782f9642d98989af618e7d1af4cd6b8e5fc8eed31186.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
smokeloader
2020
http://abpa.at/upload/
http://emaratghajari.com/upload/
http://d7qw.cn/upload/
http://alumik-group.ru/upload/
http://zamkikurgan.ru/upload/
https://oakland-studio.video/search.php
https://seattle-university.video/search.php
Extracted
systembc
5.39.221.47:4001
Targets
-
-
Target
ca389b38fb88de27d8e6782f9642d98989af618e7d1af4cd6b8e5fc8eed31186
-
Size
263KB
-
MD5
5f8d526cc16823160c06593405a3b393
-
SHA1
64b97251781b811078236469b999e61bde4563d0
-
SHA256
ca389b38fb88de27d8e6782f9642d98989af618e7d1af4cd6b8e5fc8eed31186
-
SHA512
ba5690e0b0288e9ca2d647a68f6927717ae77298e3037474386e2bbf3d0ea64c5f6be26bca4e9d995751291964ef8f5b6cea058b7c432dd7782890e91494f295
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND
suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets service image path in registry
-