Behavioral task
behavioral1
Sample
c7c03c2d6a78eb79409a53304bfaf8a69334d2f6a5928db641092bcc39dc8e8d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7c03c2d6a78eb79409a53304bfaf8a69334d2f6a5928db641092bcc39dc8e8d.exe
Resource
win10v2004-20220812-en
General
-
Target
c7c03c2d6a78eb79409a53304bfaf8a69334d2f6a5928db641092bcc39dc8e8d
-
Size
26KB
-
MD5
7c2a15bf34cf3bdea133966c8904fdfc
-
SHA1
ecd293af1ef5116a6ffcb19dda0db4c63c13e8ab
-
SHA256
bcb480ff6da33dbd3702dbb800fb86154f7143d7fd82a7c75da577152878a219
-
SHA512
8a0a9a443f51609512786ed0ff9b97dce12e2e95fd25c77d77af022e6d4c30130f42b4a09bb1ef8b20598108d08859dbfacb780da5f2096f5ee06bd85ea81731
-
SSDEEP
768:wrus7x3pLaXUTN88Dwq1/R7tigXQdNJzIrUGB:wrdx3p+W68b/Bt/XiY9
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule static1/unpack001/c7c03c2d6a78eb79409a53304bfaf8a69334d2f6a5928db641092bcc39dc8e8d family_smokeloader -
Smokeloader family
Files
-
c7c03c2d6a78eb79409a53304bfaf8a69334d2f6a5928db641092bcc39dc8e8d.zip
-
c7c03c2d6a78eb79409a53304bfaf8a69334d2f6a5928db641092bcc39dc8e8d.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE