General
-
Target
file.exe
-
Size
385KB
-
Sample
221206-3g5nzsgg4z
-
MD5
ae25963365dc2c93c15700810dfa9e44
-
SHA1
c32f51e56f4346d6059e7389cf60c64d772c9e75
-
SHA256
7325d1987f354ada2c46acea0b6f15c7e9554ea60b684014b9d9faf07be99277
-
SHA512
a6b095873188b47721e2587f31f38c56374837189d43d2f3076146ba00e70dd0226e978c3b1eff5cacdae891a6e28de12acd8641b8d8ec1d5dd727d4e3412d29
-
SSDEEP
6144:q+tFEZpK/L1wgCtRMC+qf5PuDcC8frnq7mZvfzGjmDpWcoBlC0FMAsaVe:qgyZaBwgMhEp8fTq7mYjFcWC65s3
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
385KB
-
MD5
ae25963365dc2c93c15700810dfa9e44
-
SHA1
c32f51e56f4346d6059e7389cf60c64d772c9e75
-
SHA256
7325d1987f354ada2c46acea0b6f15c7e9554ea60b684014b9d9faf07be99277
-
SHA512
a6b095873188b47721e2587f31f38c56374837189d43d2f3076146ba00e70dd0226e978c3b1eff5cacdae891a6e28de12acd8641b8d8ec1d5dd727d4e3412d29
-
SSDEEP
6144:q+tFEZpK/L1wgCtRMC+qf5PuDcC8frnq7mZvfzGjmDpWcoBlC0FMAsaVe:qgyZaBwgMhEp8fTq7mYjFcWC65s3
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-