General
-
Target
6051d57a165c6a547e46aeb754353677b40c582992b9fc314719a5bc3127473e
-
Size
319KB
-
Sample
230206-tmp12saa41
-
MD5
f9bfad174419acefcd457f9f78cd1af7
-
SHA1
ec0e54614f01ea5358aa79bbc4a6a72011f59321
-
SHA256
6051d57a165c6a547e46aeb754353677b40c582992b9fc314719a5bc3127473e
-
SHA512
b32a9c2dca3f2815a4612adc87256e4da7f8c2bf56418571b3d41f29ba65ba5f17e0064c842640592e6a3def88e137ea078c0fccfac0501b61a233a89394b402
-
SSDEEP
6144:91L8TURE422B/RaZur8PxxSBxHClRkd45Cj:91yUDRRaZOBEm
Static task
static1
Behavioral task
behavioral1
Sample
6051d57a165c6a547e46aeb754353677b40c582992b9fc314719a5bc3127473e.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
6051d57a165c6a547e46aeb754353677b40c582992b9fc314719a5bc3127473e
-
Size
319KB
-
MD5
f9bfad174419acefcd457f9f78cd1af7
-
SHA1
ec0e54614f01ea5358aa79bbc4a6a72011f59321
-
SHA256
6051d57a165c6a547e46aeb754353677b40c582992b9fc314719a5bc3127473e
-
SHA512
b32a9c2dca3f2815a4612adc87256e4da7f8c2bf56418571b3d41f29ba65ba5f17e0064c842640592e6a3def88e137ea078c0fccfac0501b61a233a89394b402
-
SSDEEP
6144:91L8TURE422B/RaZur8PxxSBxHClRkd45Cj:91yUDRRaZOBEm
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-