General
-
Target
be04038c48952454db9742caf48fd077db32aed2650e90786a39a9b1a26ba87f
-
Size
4.9MB
-
Sample
230808-pvvjaace75
-
MD5
0ff5945ced283caa0621bd9e7b087763
-
SHA1
5cbf68e04eb294c1edcf272fd98d68a2ef139c14
-
SHA256
be04038c48952454db9742caf48fd077db32aed2650e90786a39a9b1a26ba87f
-
SHA512
25802856d4cc73dee14a9b96b35f8ff3c0128638a8a1deb7bbbfb3209e9f0161d13c9c17bb7632cf5428dca1a1939be84036fdf473c6c853c783fb22ae66f9f8
-
SSDEEP
98304:7TedAcQ2Ro3GJtYhkf6zMBiJtpOYs0FA088A1kMfsuG:veCl2RKatUtz91VFAD3kulG
Static task
static1
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
be04038c48952454db9742caf48fd077db32aed2650e90786a39a9b1a26ba87f
-
Size
4.9MB
-
MD5
0ff5945ced283caa0621bd9e7b087763
-
SHA1
5cbf68e04eb294c1edcf272fd98d68a2ef139c14
-
SHA256
be04038c48952454db9742caf48fd077db32aed2650e90786a39a9b1a26ba87f
-
SHA512
25802856d4cc73dee14a9b96b35f8ff3c0128638a8a1deb7bbbfb3209e9f0161d13c9c17bb7632cf5428dca1a1939be84036fdf473c6c853c783fb22ae66f9f8
-
SSDEEP
98304:7TedAcQ2Ro3GJtYhkf6zMBiJtpOYs0FA088A1kMfsuG:veCl2RKatUtz91VFAD3kulG
-
Detect Fabookie payload
-
Glupteba payload
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1