General
-
Target
file.exe
-
Size
186KB
-
Sample
221123-qykc6aac2z
-
MD5
620ae5771848bc425d5d686054019ef8
-
SHA1
c16fa58a41f6deeb94369bd9371aa7dbd91a014f
-
SHA256
c0ace3785dd2cf1b9e8696e2e26735ba89800f8e4e1efaa8d23c058b145b04bd
-
SHA512
65945888bf87d6e2db50b839ae49b245ce4ff5e5ddc74fbac5481b5cf59082fb46f1fc7e0b2985ea0247b9b422c3d75c482480c2bd3b306e8b63f5b860cdbbb0
-
SSDEEP
3072:DehojATICdjLWBJa07Wyos5EO2cbybKXzOUiVRhAssmDxU:ahcSLWBJa07lwcbybMzlGhA46
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
186KB
-
MD5
620ae5771848bc425d5d686054019ef8
-
SHA1
c16fa58a41f6deeb94369bd9371aa7dbd91a014f
-
SHA256
c0ace3785dd2cf1b9e8696e2e26735ba89800f8e4e1efaa8d23c058b145b04bd
-
SHA512
65945888bf87d6e2db50b839ae49b245ce4ff5e5ddc74fbac5481b5cf59082fb46f1fc7e0b2985ea0247b9b422c3d75c482480c2bd3b306e8b63f5b860cdbbb0
-
SSDEEP
3072:DehojATICdjLWBJa07Wyos5EO2cbybKXzOUiVRhAssmDxU:ahcSLWBJa07lwcbybMzlGhA46
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-