General
-
Target
file.exe
-
Size
151KB
-
Sample
221127-pxbh7ace8y
-
MD5
bf14f798fef9d4c0e57a419e49c969bb
-
SHA1
f846d1529c88f0dcd5dd7207164b8670e9cf7e74
-
SHA256
36c2e7fbf3282969bfceb2306a6943eafbaaa375cfc1304e718e7bb98ba4ad92
-
SHA512
3ba059936fb74b0557b2035cf9a4f0686741efded03593382b766677ac7fb2ada5f84751e03a867fc6cdd9bf439c340a9eb8b80a7c607c386ea4d09b5a5b8084
-
SSDEEP
3072:gjmlwqY3/sq0JlO8W5zoGZAcSzaIOG41+5B9DoqvrbLF:B7JqelOMggVj4UL9UqvLF
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
151KB
-
MD5
bf14f798fef9d4c0e57a419e49c969bb
-
SHA1
f846d1529c88f0dcd5dd7207164b8670e9cf7e74
-
SHA256
36c2e7fbf3282969bfceb2306a6943eafbaaa375cfc1304e718e7bb98ba4ad92
-
SHA512
3ba059936fb74b0557b2035cf9a4f0686741efded03593382b766677ac7fb2ada5f84751e03a867fc6cdd9bf439c340a9eb8b80a7c607c386ea4d09b5a5b8084
-
SSDEEP
3072:gjmlwqY3/sq0JlO8W5zoGZAcSzaIOG41+5B9DoqvrbLF:B7JqelOMggVj4UL9UqvLF
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-