Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp
-
Size
30KB
-
MD5
e93696908950607833c336f7783f97a8
-
SHA1
7508f5587eb1fa5b61085899c873182709e45e33
-
SHA256
b309e86dc3ed1154d52c261bab87bd2525da8ed04333c98d67b9a26b5f09b895
-
SHA512
d4fb4ca8ccae5b570d715e0caf6daf4acb12dd2b668bdae379c77a708931cb9b2d9760553e1a9805b43156375e04a80ccd63f7a6df8c1080a8649695abd4e5ff
-
SSDEEP
768:8t6+ztmVfbHmHS8/ckpKd75wiqjUKPO6AAb3vM8pYwA:2ztmJbHmHT/zKdVwigUAAK3qw
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule sample family_smokeloader -
Smokeloader family
Files
-
tmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE