General
-
Target
5980b56cb771a56bf3e5120bea3ad3fc15841a4e9e229ef268becc83dff0eb5c
-
Size
210KB
-
Sample
221031-qvtgnabaf5
-
MD5
220489680dbf4de2c1da3a064a36fc09
-
SHA1
08273aa012e2df518d35dc1a93e40536cd5fc963
-
SHA256
5980b56cb771a56bf3e5120bea3ad3fc15841a4e9e229ef268becc83dff0eb5c
-
SHA512
9dbf1e4e5d2b80e951d26231ce738eb927f5b688456e3b073ce3e9deb8b82cf657d42298373cc10dde9b903616c53070cb80cf364f4ddae1bbdbca0b86edc44f
-
SSDEEP
3072:NY5iDLFOcRwFYLVnaWzf57zEuoH2sw0cc6N120+cpBRQxax:NYYDhfRwmLVnaYE9xw0cLK0+cpBRQE
Static task
static1
Behavioral task
behavioral1
Sample
5980b56cb771a56bf3e5120bea3ad3fc15841a4e9e229ef268becc83dff0eb5c.exe
Resource
win10-20220901-en
Malware Config
Extracted
nymaim
45.139.105.171
85.31.46.167
Targets
-
-
Target
5980b56cb771a56bf3e5120bea3ad3fc15841a4e9e229ef268becc83dff0eb5c
-
Size
210KB
-
MD5
220489680dbf4de2c1da3a064a36fc09
-
SHA1
08273aa012e2df518d35dc1a93e40536cd5fc963
-
SHA256
5980b56cb771a56bf3e5120bea3ad3fc15841a4e9e229ef268becc83dff0eb5c
-
SHA512
9dbf1e4e5d2b80e951d26231ce738eb927f5b688456e3b073ce3e9deb8b82cf657d42298373cc10dde9b903616c53070cb80cf364f4ddae1bbdbca0b86edc44f
-
SSDEEP
3072:NY5iDLFOcRwFYLVnaWzf57zEuoH2sw0cc6N120+cpBRQxax:NYYDhfRwmLVnaYE9xw0cLK0+cpBRQE
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-