General
-
Target
0e4bff3364a966619946cab25db13f9cb74ef9f3c83e5cdab09925606cba4e9e
-
Size
288KB
-
Sample
220912-bwmm6scde8
-
MD5
a8e3378821eb744f2734cfdfbde16439
-
SHA1
3ab27ca191ace417328b8b7b0a8f8e76ddab4bcc
-
SHA256
0e4bff3364a966619946cab25db13f9cb74ef9f3c83e5cdab09925606cba4e9e
-
SHA512
d18d76f1a944d39734a326e39f8541468414196cd998755c7a11d043ee0eb9899ef535d67e24dff816ef4cc2f0560d8f2de021c7db60d8cfe8411e07854f5df0
-
SSDEEP
6144:qrNq1E5ucGrO9arccaifBCu88ILHPkjwgGzWDpcK:qcLcGyQrccaifBCu88Izk7DpN
Static task
static1
Behavioral task
behavioral1
Sample
0e4bff3364a966619946cab25db13f9cb74ef9f3c83e5cdab09925606cba4e9e.exe
Resource
win10-20220812-en
Malware Config
Extracted
http://microsoftdownload.ddns.net:8808/downloader/WinSecurityUpdate
Extracted
raccoon
567d5bff28c2a18132d2f88511f07435
http://116.203.167.5/
http://195.201.248.58/
Targets
-
-
Target
0e4bff3364a966619946cab25db13f9cb74ef9f3c83e5cdab09925606cba4e9e
-
Size
288KB
-
MD5
a8e3378821eb744f2734cfdfbde16439
-
SHA1
3ab27ca191ace417328b8b7b0a8f8e76ddab4bcc
-
SHA256
0e4bff3364a966619946cab25db13f9cb74ef9f3c83e5cdab09925606cba4e9e
-
SHA512
d18d76f1a944d39734a326e39f8541468414196cd998755c7a11d043ee0eb9899ef535d67e24dff816ef4cc2f0560d8f2de021c7db60d8cfe8411e07854f5df0
-
SSDEEP
6144:qrNq1E5ucGrO9arccaifBCu88ILHPkjwgGzWDpcK:qcLcGyQrccaifBCu88Izk7DpN
-
Detects Smokeloader packer
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-