General
-
Target
04b1711beba9284f46e355b5d22eed54.exe
-
Size
189KB
-
Sample
230215-vjjkjacf71
-
MD5
04b1711beba9284f46e355b5d22eed54
-
SHA1
a81642aec480505036852d22d5b8ee2bd76e604f
-
SHA256
928b339a13c0dcfbaae8b9fc1d0489de4795a0f6c21b6d94832b30c31bf10907
-
SHA512
d9c09a5761fa8637853c705e3bb5489f43bea5a36092712e7021e701bd2ca10edb9531653c8c58e5014afef243231d17ded7dac820e3225886ea57c1be8a90f9
-
SSDEEP
3072:d/ipHQ6o8/MXs3pTtKSKg4XTZLNJjgn1ZiYqRr7xW:JoHU8/MXs3pBqT9zjmWRr
Static task
static1
Behavioral task
behavioral1
Sample
04b1711beba9284f46e355b5d22eed54.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
04b1711beba9284f46e355b5d22eed54.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
04b1711beba9284f46e355b5d22eed54.exe
-
Size
189KB
-
MD5
04b1711beba9284f46e355b5d22eed54
-
SHA1
a81642aec480505036852d22d5b8ee2bd76e604f
-
SHA256
928b339a13c0dcfbaae8b9fc1d0489de4795a0f6c21b6d94832b30c31bf10907
-
SHA512
d9c09a5761fa8637853c705e3bb5489f43bea5a36092712e7021e701bd2ca10edb9531653c8c58e5014afef243231d17ded7dac820e3225886ea57c1be8a90f9
-
SSDEEP
3072:d/ipHQ6o8/MXs3pTtKSKg4XTZLNJjgn1ZiYqRr7xW:JoHU8/MXs3pBqT9zjmWRr
-
Detects Smokeloader packer
-
Panda Stealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-