General
-
Target
1c01bfb3c6c8e8d8e41f58d91f39e9bc3f2565e608c44530deab1c21311d1f1d
-
Size
218KB
-
Sample
221220-mcjb7ahc49
-
MD5
4e5d5bb87c7124a8499561f7cf9aaae1
-
SHA1
0f3bbe5b06c4d18e35a4c8d0da928e4d4c2e3675
-
SHA256
1c01bfb3c6c8e8d8e41f58d91f39e9bc3f2565e608c44530deab1c21311d1f1d
-
SHA512
11bb1546f3c379329a89c8ef88d7ea5a88bbefd46579b2d144f99d74f7ac994fe1613e9ff30ec8695185f87034c25e6ef8e40d1f090bfdf7bcdb7ff9e1e2d30b
-
SSDEEP
3072:KgPdJqLfSt9R370ZL8IElanwOB8abX7bm7b/eUKKw7NHCDml:K03qL69omIE+TB8ab+a5Ca
Static task
static1
Behavioral task
behavioral1
Sample
1c01bfb3c6c8e8d8e41f58d91f39e9bc3f2565e608c44530deab1c21311d1f1d.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
systembc
109.205.214.18:443
Targets
-
-
Target
1c01bfb3c6c8e8d8e41f58d91f39e9bc3f2565e608c44530deab1c21311d1f1d
-
Size
218KB
-
MD5
4e5d5bb87c7124a8499561f7cf9aaae1
-
SHA1
0f3bbe5b06c4d18e35a4c8d0da928e4d4c2e3675
-
SHA256
1c01bfb3c6c8e8d8e41f58d91f39e9bc3f2565e608c44530deab1c21311d1f1d
-
SHA512
11bb1546f3c379329a89c8ef88d7ea5a88bbefd46579b2d144f99d74f7ac994fe1613e9ff30ec8695185f87034c25e6ef8e40d1f090bfdf7bcdb7ff9e1e2d30b
-
SSDEEP
3072:KgPdJqLfSt9R370ZL8IElanwOB8abX7bm7b/eUKKw7NHCDml:K03qL69omIE+TB8ab+a5Ca
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-