Behavioral task
behavioral1
Sample
5092-390-0x0000000000400000-0x0000000000409000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5092-390-0x0000000000400000-0x0000000000409000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
5092-390-0x0000000000400000-0x0000000000409000-memory.dmp
-
Size
36KB
-
MD5
59b2492f6e657eb765e74de9e3efad8f
-
SHA1
4ee2dfcac158958e1eb997703a5810fa8c6bf1a9
-
SHA256
8f775f7c4d4fe21516f535dcfac624441cf3cf19988e135ae526cf3efe54533f
-
SHA512
b18d85b7b7fdf3c0f0dda5c347bc7ca44811c04a9416fea737733535e16fe33f238e6753bf511a9970810ae9a779b40c04afe0774bb8a2da10ab5fa494d31ad3
-
SSDEEP
768:OkUqYDNHIoKpDd1KM02kQhx4hOtFceWzYqvz0bOS:zLihLKtd1PBkQD4UtFceWnz
Malware Config
Extracted
smokeloader
up3
Signatures
-
Smokeloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5092-390-0x0000000000400000-0x0000000000409000-memory.dmp
Files
-
5092-390-0x0000000000400000-0x0000000000409000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE