General
-
Target
file.exe
-
Size
214KB
-
Sample
230105-n46ggafd2v
-
MD5
0b3ee0bf994dbb2ad736a509873451ae
-
SHA1
19b1adad451ae83b574e7f615e2d70936842e4ca
-
SHA256
d5913a5f36f9a1c46349b8d0ba2bcc9e793336c11e33838e5359ebefaccee92b
-
SHA512
761f29d56dbe0bcda043c08c3d3b79bb4cc6e2d3c478f95258ea2c2fc437b6d427b02ef927d6f72850f15f73c98ec56e7da7c0c827bdae7d6756ad5e58cd19fe
-
SSDEEP
3072:bXpWxA7BXnkeLWSYmMG+s2F5kkvOmLL9PrZIlVFrG+uSpCP8IJaYZKmcTd8deVl:zbUeLWBG+s2vOqhNIbRG+DCP8p6mude
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
214KB
-
MD5
0b3ee0bf994dbb2ad736a509873451ae
-
SHA1
19b1adad451ae83b574e7f615e2d70936842e4ca
-
SHA256
d5913a5f36f9a1c46349b8d0ba2bcc9e793336c11e33838e5359ebefaccee92b
-
SHA512
761f29d56dbe0bcda043c08c3d3b79bb4cc6e2d3c478f95258ea2c2fc437b6d427b02ef927d6f72850f15f73c98ec56e7da7c0c827bdae7d6756ad5e58cd19fe
-
SSDEEP
3072:bXpWxA7BXnkeLWSYmMG+s2F5kkvOmLL9PrZIlVFrG+uSpCP8IJaYZKmcTd8deVl:zbUeLWBG+s2vOqhNIbRG+DCP8p6mude
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-