Analysis
-
max time kernel
150s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
29-06-2023 22:35
Static task
static1
Behavioral task
behavioral1
Sample
8498a90e5079ab50533e2471231b044e.exe
Resource
win7-20230621-en
General
-
Target
8498a90e5079ab50533e2471231b044e.exe
-
Size
271KB
-
MD5
8498a90e5079ab50533e2471231b044e
-
SHA1
2beae16d2f563c4d48502b72cb11f4247995790f
-
SHA256
97ab7127415539a6b8bdc06b8eb7089a1add34b62d1026f94b8f5c4efe393f19
-
SHA512
639b03749871bcdb1f29560920f6dac1c89bd549084b9c60d958908d13c01acd672cc6574942e301f6f4ac6cb6c0db91b458546116dc38f2ac9785863ac3e45c
-
SSDEEP
3072:o82arJnmvhgShgPeWJdyOraKE8k6q3CP2VgiLKqu1:tRpShgPeWqOeKhk6qk2Vgi
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8498a90e5079ab50533e2471231b044e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8498a90e5079ab50533e2471231b044e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8498a90e5079ab50533e2471231b044e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1164 8498a90e5079ab50533e2471231b044e.exe 1164 8498a90e5079ab50533e2471231b044e.exe 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1240 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1164 8498a90e5079ab50533e2471231b044e.exe