General
-
Target
file.exe
-
Size
320KB
-
Sample
230111-xhgqnadh52
-
MD5
7ce83753b21cef9fc55650943f1e3590
-
SHA1
f564df522f8ecb32993b13539d0fd585e4f2362c
-
SHA256
15a13461d5592118d7b4306de2b72b2b949d0c2e5eb35aa92b37a6b501bb870b
-
SHA512
1ee01b553eb8d5aecd75da2dca7e99b0463539fabf5f331deda3ea7f789335a2b2aefc80751a4a1741e3dd3aabc7a49e5743086133ef6a29503c8aaf10d6a072
-
SSDEEP
3072:h4XOGc8DPNIvTZr/Mv+VU50SYTpZdFKGMhUEyF1wgrvRt8HcMPjlP30bW3x7c5nD:hMPPiLMGVVjK5Oro8EjlP3Zi5hUxFzC
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
320KB
-
MD5
7ce83753b21cef9fc55650943f1e3590
-
SHA1
f564df522f8ecb32993b13539d0fd585e4f2362c
-
SHA256
15a13461d5592118d7b4306de2b72b2b949d0c2e5eb35aa92b37a6b501bb870b
-
SHA512
1ee01b553eb8d5aecd75da2dca7e99b0463539fabf5f331deda3ea7f789335a2b2aefc80751a4a1741e3dd3aabc7a49e5743086133ef6a29503c8aaf10d6a072
-
SSDEEP
3072:h4XOGc8DPNIvTZr/Mv+VU50SYTpZdFKGMhUEyF1wgrvRt8HcMPjlP30bW3x7c5nD:hMPPiLMGVVjK5Oro8EjlP3Zi5hUxFzC
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-