General
-
Target
d75b501a09398280bf6e9250ac56763182136b4980d86e43c93d0ad8fa9981ac
-
Size
311KB
-
Sample
221219-rpayssac5z
-
MD5
ff8b0ef6c574e5f6f1fa4c4eb75c637d
-
SHA1
3263f6595d1329cea9348b34a9857a98998a33c6
-
SHA256
d75b501a09398280bf6e9250ac56763182136b4980d86e43c93d0ad8fa9981ac
-
SHA512
9c2d049aaf278d86db69256dd312cf34d1d1b6dcabe964b93ab2a29b21f9045bceaaf809b46c92e6c4f5d5f27befda9692712fc23c4d45de2bef147c98708ff4
-
SSDEEP
6144:zjB1L2OqdTTq9rZ0NCKg4bBYqH4rWlRjO1n:zPHqdTuduLlarW9u
Static task
static1
Malware Config
Targets
-
-
Target
d75b501a09398280bf6e9250ac56763182136b4980d86e43c93d0ad8fa9981ac
-
Size
311KB
-
MD5
ff8b0ef6c574e5f6f1fa4c4eb75c637d
-
SHA1
3263f6595d1329cea9348b34a9857a98998a33c6
-
SHA256
d75b501a09398280bf6e9250ac56763182136b4980d86e43c93d0ad8fa9981ac
-
SHA512
9c2d049aaf278d86db69256dd312cf34d1d1b6dcabe964b93ab2a29b21f9045bceaaf809b46c92e6c4f5d5f27befda9692712fc23c4d45de2bef147c98708ff4
-
SSDEEP
6144:zjB1L2OqdTTq9rZ0NCKg4bBYqH4rWlRjO1n:zPHqdTuduLlarW9u
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-