General
-
Target
010cf803e4769a7cea57443a1728e15a2e9041783c04905a3822a11d57dfca4c
-
Size
317KB
-
Sample
220927-jxpg6aeadj
-
MD5
85451987dd88c1337b6c0cab4777525a
-
SHA1
b2fd78bc76f8a2060bbde5c616418101014ebfe5
-
SHA256
010cf803e4769a7cea57443a1728e15a2e9041783c04905a3822a11d57dfca4c
-
SHA512
7ca4fe244739ae144481c3b287672a7c45f498c741c81bbc5b8e1e34f690ff6d8513eace345d3a4f1d07efb11757798cf8d97ca5fb20459be028a90dac3ee537
-
SSDEEP
3072:+AXQFNeXrbJ9ZG2QjVq57yR85fctEGTEQdHHaFxvqg0KcCfteV7pM/h3BsxkgaB8:+0ps2tJfcnDEFxig0nZBpnigabwVf
Static task
static1
Behavioral task
behavioral1
Sample
010cf803e4769a7cea57443a1728e15a2e9041783c04905a3822a11d57dfca4c.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
010cf803e4769a7cea57443a1728e15a2e9041783c04905a3822a11d57dfca4c
-
Size
317KB
-
MD5
85451987dd88c1337b6c0cab4777525a
-
SHA1
b2fd78bc76f8a2060bbde5c616418101014ebfe5
-
SHA256
010cf803e4769a7cea57443a1728e15a2e9041783c04905a3822a11d57dfca4c
-
SHA512
7ca4fe244739ae144481c3b287672a7c45f498c741c81bbc5b8e1e34f690ff6d8513eace345d3a4f1d07efb11757798cf8d97ca5fb20459be028a90dac3ee537
-
SSDEEP
3072:+AXQFNeXrbJ9ZG2QjVq57yR85fctEGTEQdHHaFxvqg0KcCfteV7pM/h3BsxkgaB8:+0ps2tJfcnDEFxig0nZBpnigabwVf
-
Detects Smokeloader packer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-