General
-
Target
78c4d267a2b4d59ad56c102f05e666bbc8a5eeefb9b3c577705b8d944c593a0b
-
Size
176KB
-
Sample
221206-cecx3sbb2z
-
MD5
3136e1f54e171ad861a24a1c28ecdf1a
-
SHA1
74c4be39acba5ecc145912fcb6f1473eaaf8b744
-
SHA256
288ffc1cf4ec86e2f7c781b9344d6a3f514bf1d820df50fd348442fd19eba527
-
SHA512
1ddcb03cdb2a0a1bc0560fb19e9aa62be12243cce3f9f3a0c353aaeea98c60555c2d8e1d39b58540b27ecee0f8c2343ec9c21802243e94beb7d72c3b30bcd8e5
-
SSDEEP
3072:+sQiNHejJS/VcBEEhYs+yZplTJgrcz4pDNvIjzvcAWThmyKsguhBT9FTf0BcTKX7:ZvejtCkYDyZHwbVKjzvcAWTbJTl9J0kK
Static task
static1
Behavioral task
behavioral1
Sample
78c4d267a2b4d59ad56c102f05e666bbc8a5eeefb9b3c577705b8d944c593a0b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
78c4d267a2b4d59ad56c102f05e666bbc8a5eeefb9b3c577705b8d944c593a0b.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
78c4d267a2b4d59ad56c102f05e666bbc8a5eeefb9b3c577705b8d944c593a0b
-
Size
274KB
-
MD5
5119b6abdd57f8d1af1d4a401de017d4
-
SHA1
730320fe2202f15b2007032ab1ef24373f1c91ef
-
SHA256
78c4d267a2b4d59ad56c102f05e666bbc8a5eeefb9b3c577705b8d944c593a0b
-
SHA512
b7b9421940068262d3bf72c78efb80d23ad4310c3644518a22f4eb2394fed8ee0142d67fe929aa1300431bcc86c30d7e7297930d779dae6854f31a24700331c0
-
SSDEEP
3072:HUXVUDYJk77MdLbAWR5yID5qrcz4pDNvIjzvcALdviVRvJTcpovU69UYgV2qs64j:HQ9dLb0acbVKjzvcALdvIDcP69IVS
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-