General
-
Target
0b8c0422dfc65a0d559a0002b26fc3e8585391aae590b10ce59d8bbbf033329f
-
Size
334KB
-
Sample
220126-mtncgacch4
-
MD5
57ee423591aca6825afbdf0a273a342f
-
SHA1
a4d8552d6c3d21bcfc7c11ba77302260c4c9e2e9
-
SHA256
0b8c0422dfc65a0d559a0002b26fc3e8585391aae590b10ce59d8bbbf033329f
-
SHA512
3c349a5a37aa13c0916901b6938a88e73023eef344cf997210d383f90d09ac0890f853f340fdf8b62479032fb73092ffd700f75eb5650726729d1524f3b854f0
Static task
static1
Behavioral task
behavioral1
Sample
0b8c0422dfc65a0d559a0002b26fc3e8585391aae590b10ce59d8bbbf033329f.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
smokeloader
2020
http://abpa.at/upload/
http://emaratghajari.com/upload/
http://d7qw.cn/upload/
http://alumik-group.ru/upload/
http://zamkikurgan.ru/upload/
https://oakland-studio.video/search.php
https://seattle-university.video/search.php
Targets
-
-
Target
0b8c0422dfc65a0d559a0002b26fc3e8585391aae590b10ce59d8bbbf033329f
-
Size
334KB
-
MD5
57ee423591aca6825afbdf0a273a342f
-
SHA1
a4d8552d6c3d21bcfc7c11ba77302260c4c9e2e9
-
SHA256
0b8c0422dfc65a0d559a0002b26fc3e8585391aae590b10ce59d8bbbf033329f
-
SHA512
3c349a5a37aa13c0916901b6938a88e73023eef344cf997210d383f90d09ac0890f853f340fdf8b62479032fb73092ffd700f75eb5650726729d1524f3b854f0
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-