General
-
Target
file.exe
-
Size
327KB
-
Sample
220927-1bbgvafgcj
-
MD5
f7d6ed5098ddee5b5dcc13e14c897cb5
-
SHA1
c26568b832642693500dc11fb83b9ecb28ae61c9
-
SHA256
769843da42daf9319291b34e5910726d19ed2b339ba339218a92116fe6714456
-
SHA512
3a971918b18ba84f227661e4bb6cc2da83430a267b78711e36274eddc31da2b3def23d7ef91353d25bffdbd52b9457868bc303c08d51938142be372e7da7d3e6
-
SSDEEP
6144:tubXjKXVyAkQS2f6axLWn08AnigabwVfs:tubzmY+S2frtNiB
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
327KB
-
MD5
f7d6ed5098ddee5b5dcc13e14c897cb5
-
SHA1
c26568b832642693500dc11fb83b9ecb28ae61c9
-
SHA256
769843da42daf9319291b34e5910726d19ed2b339ba339218a92116fe6714456
-
SHA512
3a971918b18ba84f227661e4bb6cc2da83430a267b78711e36274eddc31da2b3def23d7ef91353d25bffdbd52b9457868bc303c08d51938142be372e7da7d3e6
-
SSDEEP
6144:tubXjKXVyAkQS2f6axLWn08AnigabwVfs:tubzmY+S2frtNiB
-
Detects Smokeloader packer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-