General
-
Target
3c3cf21cd49a4fe0b462395a1c63a1c9b491fd268e2befc22f77b0c7849d55d9
-
Size
210KB
-
Sample
230105-j3qmeaeg8y
-
MD5
075999582d10632046a8fc0434d6899d
-
SHA1
fc85d919e44bfbe5f246daaa74bd1eb14c343089
-
SHA256
3c3cf21cd49a4fe0b462395a1c63a1c9b491fd268e2befc22f77b0c7849d55d9
-
SHA512
4d8f86c98499f5819938a8d1ad3dfc06f927b14b053e63f41b0baf9c1e3b02062214b344f7e9c0ef92bf4fc966b4747f1c8eb2f55f9dd41fcc1f0ed8daf397e9
-
SSDEEP
3072:fXuA7duwLNktK+GBHi5+A0CVNZKkTDOZcqZHgH4ASKKyImcTdVfhKNl:PDLN3BHqtV8ZcqZHgH4A+yA30
Static task
static1
Malware Config
Targets
-
-
Target
3c3cf21cd49a4fe0b462395a1c63a1c9b491fd268e2befc22f77b0c7849d55d9
-
Size
210KB
-
MD5
075999582d10632046a8fc0434d6899d
-
SHA1
fc85d919e44bfbe5f246daaa74bd1eb14c343089
-
SHA256
3c3cf21cd49a4fe0b462395a1c63a1c9b491fd268e2befc22f77b0c7849d55d9
-
SHA512
4d8f86c98499f5819938a8d1ad3dfc06f927b14b053e63f41b0baf9c1e3b02062214b344f7e9c0ef92bf4fc966b4747f1c8eb2f55f9dd41fcc1f0ed8daf397e9
-
SSDEEP
3072:fXuA7duwLNktK+GBHi5+A0CVNZKkTDOZcqZHgH4ASKKyImcTdVfhKNl:PDLN3BHqtV8ZcqZHgH4A+yA30
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-