General
-
Target
6ffc0d155c1236f56eeafac87f1101e6092395e85d85221bbeacae82467a3429
-
Size
228KB
-
Sample
221221-mbhdhafb9v
-
MD5
8793e5a0f0fd506608988d3e7ea47df1
-
SHA1
cc6e70093cecd58e60a25833b85c47319b577180
-
SHA256
6ffc0d155c1236f56eeafac87f1101e6092395e85d85221bbeacae82467a3429
-
SHA512
d4690f0c3397ea07aba49f28d37b0ddafffa980752b1b0ec8ed7953ebe2ed217a42076bfed78198d3faa00f8799a64c08565f22346eaf02593217837af8d1fee
-
SSDEEP
3072:WiNwULMSc315amJRx8PRh82vPwnL1TGAMuWzgKr/sJ:fxLMSJ2R0iBT17Wzz/
Static task
static1
Malware Config
Targets
-
-
Target
6ffc0d155c1236f56eeafac87f1101e6092395e85d85221bbeacae82467a3429
-
Size
228KB
-
MD5
8793e5a0f0fd506608988d3e7ea47df1
-
SHA1
cc6e70093cecd58e60a25833b85c47319b577180
-
SHA256
6ffc0d155c1236f56eeafac87f1101e6092395e85d85221bbeacae82467a3429
-
SHA512
d4690f0c3397ea07aba49f28d37b0ddafffa980752b1b0ec8ed7953ebe2ed217a42076bfed78198d3faa00f8799a64c08565f22346eaf02593217837af8d1fee
-
SSDEEP
3072:WiNwULMSc315amJRx8PRh82vPwnL1TGAMuWzgKr/sJ:fxLMSJ2R0iBT17Wzz/
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-