General
-
Target
file.exe
-
Size
326KB
-
Sample
221229-pwrtsada73
-
MD5
b47df17c4e2d61c1e8395ae105300614
-
SHA1
eaeaa514368e02afc6be3bdbf41c950a3c316679
-
SHA256
d7b9c47da642f6f5a5c2e89598427ef7d5f46df43950302e7a3b68ce619a6ca4
-
SHA512
c5a8df76ae988bff75b054240e42db1c8aad1eedf485f945277fa5ea3a87feb4069cfd074b5038b92b49c64e4eb40643459c47910c55b96ac79e319dc73499ff
-
SSDEEP
6144:KUjFLlEgQpu8agVpmQ5mJYf67k13bwZ4Vxq:RpJEgQk8agyzYy7
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
326KB
-
MD5
b47df17c4e2d61c1e8395ae105300614
-
SHA1
eaeaa514368e02afc6be3bdbf41c950a3c316679
-
SHA256
d7b9c47da642f6f5a5c2e89598427ef7d5f46df43950302e7a3b68ce619a6ca4
-
SHA512
c5a8df76ae988bff75b054240e42db1c8aad1eedf485f945277fa5ea3a87feb4069cfd074b5038b92b49c64e4eb40643459c47910c55b96ac79e319dc73499ff
-
SSDEEP
6144:KUjFLlEgQpu8agVpmQ5mJYf67k13bwZ4Vxq:RpJEgQk8agyzYy7
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-