General
-
Target
ec8a4e3b7eb63b8a8761f2d492b111c10411f0926112e8042d87228a1188cf3f
-
Size
334KB
-
Sample
220126-k5j33sbef2
-
MD5
cc32dfc122e50ec2f6526e573ff91876
-
SHA1
361f0aed607c8f6c6a650429f5a30780ce6a1629
-
SHA256
ec8a4e3b7eb63b8a8761f2d492b111c10411f0926112e8042d87228a1188cf3f
-
SHA512
f02328b9e27a5c050ffbb2e22ccecce53ed124951db7d68040c1447751e794f1cef11c3cb2c071a54297a1d37aaef3df2575045fca770123e2dfa911e89ee655
Static task
static1
Behavioral task
behavioral1
Sample
ec8a4e3b7eb63b8a8761f2d492b111c10411f0926112e8042d87228a1188cf3f.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
smokeloader
2020
http://abpa.at/upload/
http://emaratghajari.com/upload/
http://d7qw.cn/upload/
http://alumik-group.ru/upload/
http://zamkikurgan.ru/upload/
Targets
-
-
Target
ec8a4e3b7eb63b8a8761f2d492b111c10411f0926112e8042d87228a1188cf3f
-
Size
334KB
-
MD5
cc32dfc122e50ec2f6526e573ff91876
-
SHA1
361f0aed607c8f6c6a650429f5a30780ce6a1629
-
SHA256
ec8a4e3b7eb63b8a8761f2d492b111c10411f0926112e8042d87228a1188cf3f
-
SHA512
f02328b9e27a5c050ffbb2e22ccecce53ed124951db7d68040c1447751e794f1cef11c3cb2c071a54297a1d37aaef3df2575045fca770123e2dfa911e89ee655
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-