General
-
Target
2fa1797aa2a9ec78fb9952fe164a445736d807c76e03109e09fe5742d3e5c6db
-
Size
32KB
-
Sample
220625-j7zqwafad2
-
MD5
00d3223047c02991f7ef1ce3a6b4f92e
-
SHA1
4f0fc6f1b7f8daefe68b68720271690e7b3c59db
-
SHA256
2fa1797aa2a9ec78fb9952fe164a445736d807c76e03109e09fe5742d3e5c6db
-
SHA512
6811f4faf35823596ef6f82743cf477e8db0293fb8243e50a6b4dfac010c90476970dd5408f49b00de442b43a1a222ff213d3053fcbaec6fe3552e710083457c
Static task
static1
Behavioral task
behavioral1
Sample
2fa1797aa2a9ec78fb9952fe164a445736d807c76e03109e09fe5742d3e5c6db.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2fa1797aa2a9ec78fb9952fe164a445736d807c76e03109e09fe5742d3e5c6db.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
smokeloader
2018
http://britbox.us/2/
Targets
-
-
Target
2fa1797aa2a9ec78fb9952fe164a445736d807c76e03109e09fe5742d3e5c6db
-
Size
32KB
-
MD5
00d3223047c02991f7ef1ce3a6b4f92e
-
SHA1
4f0fc6f1b7f8daefe68b68720271690e7b3c59db
-
SHA256
2fa1797aa2a9ec78fb9952fe164a445736d807c76e03109e09fe5742d3e5c6db
-
SHA512
6811f4faf35823596ef6f82743cf477e8db0293fb8243e50a6b4dfac010c90476970dd5408f49b00de442b43a1a222ff213d3053fcbaec6fe3552e710083457c
Score10/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-