General
-
Target
ac3cbbc36a7a5c9f551aca322dc0e19578d12a9bca3346cc5ff298e811f1b0f3
-
Size
141KB
-
Sample
221219-ebj84aeb78
-
MD5
fb041a4a05216192c60bd10baf5f54f3
-
SHA1
d2f2429b0c6c1563db98d636a47b588dd4406ccb
-
SHA256
a9e1246a0306ccbe496261369e2a2ce8f556c95435d11b6bc034b9fe65b4ae58
-
SHA512
6e05a84b5816e374f180f939ca91ed5b1661b512adf59290abaf434f17b0fce29ebe4608c9b3f1c40d40e7855b8bc179e3f4bb75dae6c5435d72a3a35b2b68b3
-
SSDEEP
3072:tOVVZSRsia0eRpEOihARfTazAQMCzdwjiqcC4hsTLvoWaT4G+:tOiRuExhkWOCxwuqcOHwK
Static task
static1
Behavioral task
behavioral1
Sample
ac3cbbc36a7a5c9f551aca322dc0e19578d12a9bca3346cc5ff298e811f1b0f3.exe
Resource
win7-20221111-en
Malware Config
Targets
-
-
Target
ac3cbbc36a7a5c9f551aca322dc0e19578d12a9bca3346cc5ff298e811f1b0f3
-
Size
214KB
-
MD5
dbac1e546c31e01df2df4b2ebee2f2b5
-
SHA1
f7837f0e02f5c0e7f3dd5ad86ee9946e1a6c81d1
-
SHA256
ac3cbbc36a7a5c9f551aca322dc0e19578d12a9bca3346cc5ff298e811f1b0f3
-
SHA512
59772e87a7b596dda7afb9895fa00c5eaaacc423c8260f6c9bbca1b5218cc48424e12fb6c2d810252fbad8a8217b9d642c99dcb1d43c15d3a5228cd3cf9054e7
-
SSDEEP
3072:WwUBO36L+Zj21WClRB4cRO0BZyGiyctNRAtOba+3QnBtjcbImdzmuX:nUBNL+x21j9xRO0BZ/ct03BtjcbXF
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-