General
-
Target
76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c
-
Size
5.2MB
-
Sample
230824-d25r2shg27
-
MD5
9c855d5d046d35dfc97390d152d232df
-
SHA1
b49d95ca1a0effb8712b9da18fd2d1b899c4a8e1
-
SHA256
76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c
-
SHA512
37a3ed53216acb5db135ab58ff70bfe7b77250eb7b2d9600de85a41ffdb5a97739f2f0ea4beb48829969a46842846a1fa1afc8ff8f2aff5e10fdd98897f1a705
-
SSDEEP
98304:KzKfNdcaXAmMCF5Cj7BspbyTBZWI2Oe85ppe9lYIM//cmCGd:ik/lMCFa9spm2crpeQI/m
Static task
static1
Malware Config
Extracted
amadey
3.83
5.42.65.80/8bmeVwqx/index.php
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c
-
Size
5.2MB
-
MD5
9c855d5d046d35dfc97390d152d232df
-
SHA1
b49d95ca1a0effb8712b9da18fd2d1b899c4a8e1
-
SHA256
76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c
-
SHA512
37a3ed53216acb5db135ab58ff70bfe7b77250eb7b2d9600de85a41ffdb5a97739f2f0ea4beb48829969a46842846a1fa1afc8ff8f2aff5e10fdd98897f1a705
-
SSDEEP
98304:KzKfNdcaXAmMCF5Cj7BspbyTBZWI2Oe85ppe9lYIM//cmCGd:ik/lMCFa9spm2crpeQI/m
-
Detect Fabookie payload
-
Glupteba payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Stops running service(s)
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1