General
-
Target
file.exe
-
Size
380KB
-
Sample
230405-sdbavshe3t
-
MD5
d4310c99d42ad36aed4679860c1c368b
-
SHA1
547b0af6d1f0abcea19160d361c4f2e605c3b864
-
SHA256
5531490b3951e8793cb6ee449f75d6fb0b5c1347d1197ccda7ff1b9b15cf9661
-
SHA512
41b789467abb3758c50ba8c4410684cb204ccebdc7a972a9ed94b57d63c89352f1333e44ea0f4ca27aa1a29ed6d0ef32f4e4f336ac29ec9ec43256bbc270040c
-
SSDEEP
6144:x/QiQXCvJm+ksmpk3U9jW1U4P9b4OGBfj/WUplm6zIOYQNd28pTXdAmpCLVRZogE:pQi3vs6m6URA3Ph4lL//plmW9bTXeVh8
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Malware Config
Extracted
socelars
https://hdbywe.s3.us-west-2.amazonaws.com/dfgg320/
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Extracted
smokeloader
pub2
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
file.exe
-
Size
380KB
-
MD5
d4310c99d42ad36aed4679860c1c368b
-
SHA1
547b0af6d1f0abcea19160d361c4f2e605c3b864
-
SHA256
5531490b3951e8793cb6ee449f75d6fb0b5c1347d1197ccda7ff1b9b15cf9661
-
SHA512
41b789467abb3758c50ba8c4410684cb204ccebdc7a972a9ed94b57d63c89352f1333e44ea0f4ca27aa1a29ed6d0ef32f4e4f336ac29ec9ec43256bbc270040c
-
SSDEEP
6144:x/QiQXCvJm+ksmpk3U9jW1U4P9b4OGBfj/WUplm6zIOYQNd28pTXdAmpCLVRZogE:pQi3vs6m6URA3Ph4lL//plmW9bTXeVh8
-
Socelars payload
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-