General
-
Target
4a7a228e0870e9daed8a1ccf728d8b0e09680a222b7fe2f3328b58a51376dd4f
-
Size
32KB
-
Sample
220128-x2a28abdbq
-
MD5
4eb03f36e3a340f08442c380f853153a
-
SHA1
9efd42856bd596eb3246e7dc85288098e5289874
-
SHA256
4a7a228e0870e9daed8a1ccf728d8b0e09680a222b7fe2f3328b58a51376dd4f
-
SHA512
2eaa6e131d3680159ac79715db16f647543882b0f44a62606edbd3136292c99424936de7edf6a9ec20fd7ee80faacdee64eff080ae1b04c1c23946996fbfbf52
Static task
static1
Behavioral task
behavioral1
Sample
4a7a228e0870e9daed8a1ccf728d8b0e09680a222b7fe2f3328b58a51376dd4f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4a7a228e0870e9daed8a1ccf728d8b0e09680a222b7fe2f3328b58a51376dd4f.exe
Resource
win10-en-20211208
Malware Config
Extracted
smokeloader
2018
http://bulgar.bit/
Targets
-
-
Target
4a7a228e0870e9daed8a1ccf728d8b0e09680a222b7fe2f3328b58a51376dd4f
-
Size
32KB
-
MD5
4eb03f36e3a340f08442c380f853153a
-
SHA1
9efd42856bd596eb3246e7dc85288098e5289874
-
SHA256
4a7a228e0870e9daed8a1ccf728d8b0e09680a222b7fe2f3328b58a51376dd4f
-
SHA512
2eaa6e131d3680159ac79715db16f647543882b0f44a62606edbd3136292c99424936de7edf6a9ec20fd7ee80faacdee64eff080ae1b04c1c23946996fbfbf52
Score10/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-