General
-
Target
file.exe
-
Size
267KB
-
Sample
230110-ze9y5sdc9w
-
MD5
a056926912b314b80b32412e2822eac0
-
SHA1
fa8c809c329c983b6e030c74def61e9216f4aa60
-
SHA256
7b8aacd51b19dbf6e0d66d7773fac1cc7fe6241eb4e46111af49285379c9d78d
-
SHA512
8198ba3046d4d01841fc390b2a1accaf2c415795892038e65f9d818e9b7f780833900ad373cab84cd0e1e0e5863c2e1df3b04e0b2cd6caebe7663444f3dc2291
-
SSDEEP
3072:6XEeUfdKynH1LUF14q75/Iff7CMsYGMXj3qfpuxUJvNBNCanng0Pb:a8dxVLpqczCMsYGwj39UJTNng6
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
267KB
-
MD5
a056926912b314b80b32412e2822eac0
-
SHA1
fa8c809c329c983b6e030c74def61e9216f4aa60
-
SHA256
7b8aacd51b19dbf6e0d66d7773fac1cc7fe6241eb4e46111af49285379c9d78d
-
SHA512
8198ba3046d4d01841fc390b2a1accaf2c415795892038e65f9d818e9b7f780833900ad373cab84cd0e1e0e5863c2e1df3b04e0b2cd6caebe7663444f3dc2291
-
SSDEEP
3072:6XEeUfdKynH1LUF14q75/Iff7CMsYGMXj3qfpuxUJvNBNCanng0Pb:a8dxVLpqczCMsYGwj39UJTNng6
Score10/10-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-