General
-
Target
2e42b0bed4d0228cde60b27436b54eef.exe
-
Size
275KB
-
Sample
221010-wkqkxachel
-
MD5
2e42b0bed4d0228cde60b27436b54eef
-
SHA1
0ad015065304467a659575eca8e322485982eda2
-
SHA256
7e24caf0355d2816bec83ce942643a52213d676f5ebf03f2ff40d46c2af8ce21
-
SHA512
1519f668f81b7fc412e29c0726b7c46a216dc8adb64117eb7533d8e0cc2e676a2510965d022e255384cf54d5b6c0f33c33ca0e38fef255bf5d21228f64300e27
-
SSDEEP
3072:uXrN9JMhlH3THrjUggq5fbn8+F2XNrEuZ29rBFrDv2i2bC0QhOM/h3qpZa9uD6Vq:2Z9JMTHbEYbnOXWNzr7HHhOrwVfquS
Static task
static1
Behavioral task
behavioral1
Sample
2e42b0bed4d0228cde60b27436b54eef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2e42b0bed4d0228cde60b27436b54eef.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
2e42b0bed4d0228cde60b27436b54eef.exe
-
Size
275KB
-
MD5
2e42b0bed4d0228cde60b27436b54eef
-
SHA1
0ad015065304467a659575eca8e322485982eda2
-
SHA256
7e24caf0355d2816bec83ce942643a52213d676f5ebf03f2ff40d46c2af8ce21
-
SHA512
1519f668f81b7fc412e29c0726b7c46a216dc8adb64117eb7533d8e0cc2e676a2510965d022e255384cf54d5b6c0f33c33ca0e38fef255bf5d21228f64300e27
-
SSDEEP
3072:uXrN9JMhlH3THrjUggq5fbn8+F2XNrEuZ29rBFrDv2i2bC0QhOM/h3qpZa9uD6Vq:2Z9JMTHbEYbnOXWNzr7HHhOrwVfquS
-
Detects Smokeloader packer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-