General
-
Target
Shipping Docs INV & Packing list I3839.xls
-
Size
1.2MB
-
Sample
230718-g267nagf28
-
MD5
ecb215c449f5f2da3f17322b9e02fec6
-
SHA1
5baee7de1f257ded084326bef798c2740e919f5a
-
SHA256
8468f6e913606e807195d7b49c4bed104e2dadb94a663000f7b173d37f447615
-
SHA512
0e08b528209e4358bc85afd9e725fbe0d33dfab3094ced95627c337e64d5e2822f772006ba5f1e48ad7ee1ced955f4c9176bc7fa063d120f73b726ef634c74b4
-
SSDEEP
24576:vgu9V1ZyFw6VkAZyFw6VNQpbFcwTA5S8cNfnwLx:vgu396Vkyd6VoFjTBNfng
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Docs INV & Packing list I3839.xls
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Shipping Docs INV & Packing list I3839.xls
Resource
win10v2004-20230703-en
Malware Config
Extracted
smokeloader
2022
http://cletonmy.com/
http://alpatrik.com/
Targets
-
-
Target
Shipping Docs INV & Packing list I3839.xls
-
Size
1.2MB
-
MD5
ecb215c449f5f2da3f17322b9e02fec6
-
SHA1
5baee7de1f257ded084326bef798c2740e919f5a
-
SHA256
8468f6e913606e807195d7b49c4bed104e2dadb94a663000f7b173d37f447615
-
SHA512
0e08b528209e4358bc85afd9e725fbe0d33dfab3094ced95627c337e64d5e2822f772006ba5f1e48ad7ee1ced955f4c9176bc7fa063d120f73b726ef634c74b4
-
SSDEEP
24576:vgu9V1ZyFw6VkAZyFw6VNQpbFcwTA5S8cNfnwLx:vgu396Vkyd6VoFjTBNfng
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-