General
-
Target
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a
-
Size
1.5MB
-
Sample
220625-wbzgfseabk
-
MD5
e7418166327850a7fa1b63e83e608115
-
SHA1
ef5697e60c83b41953bb6f9f04cb3a0d3a71fc2e
-
SHA256
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a
-
SHA512
c8b07a467ae66635b57b915b65b0a97d930183c0c3857f2e3b020079221b5ede1dd51f4f9b8ede661fc4dad8d4c5146870bc1480f64a1971c28cf70d4ffff3eb
Static task
static1
Behavioral task
behavioral1
Sample
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
smokeloader
2017
http://dogewareservice.ru/
Targets
-
-
Target
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a
-
Size
1.5MB
-
MD5
e7418166327850a7fa1b63e83e608115
-
SHA1
ef5697e60c83b41953bb6f9f04cb3a0d3a71fc2e
-
SHA256
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a
-
SHA512
c8b07a467ae66635b57b915b65b0a97d930183c0c3857f2e3b020079221b5ede1dd51f4f9b8ede661fc4dad8d4c5146870bc1480f64a1971c28cf70d4ffff3eb
Score10/10-
Drops desktop.ini file(s)
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-