General
-
Target
SecuriteInfo.com.Win32.DropperX-gen.29996.2240.exe
-
Size
534KB
-
Sample
230921-x8yf4aab2y
-
MD5
8be40cda1c421ce5900f722c514a144b
-
SHA1
e4d0451ff48e03cec66c8be3f4138a175e0f2855
-
SHA256
df1d73dc9efcf2a095fdb2fc29e6991847811d3d5d1ab94cf075b4ea4a60726c
-
SHA512
5b0e3a1def8c2b71a7ce44c65942441671cf17fa779f67718df818ec427369c4a741e7b12cff83abd548cf8c9894d22eb71e28ab38bcfd41ac0edc0bdb148ec8
-
SSDEEP
6144:N+4UxvdjNgBoHFIZ0YesFZITJuUQn+rbYof9fV:9QNg2FTJuUQnROV
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.DropperX-gen.29996.2240.exe
Resource
win7-20230831-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Targets
-
-
Target
SecuriteInfo.com.Win32.DropperX-gen.29996.2240.exe
-
Size
534KB
-
MD5
8be40cda1c421ce5900f722c514a144b
-
SHA1
e4d0451ff48e03cec66c8be3f4138a175e0f2855
-
SHA256
df1d73dc9efcf2a095fdb2fc29e6991847811d3d5d1ab94cf075b4ea4a60726c
-
SHA512
5b0e3a1def8c2b71a7ce44c65942441671cf17fa779f67718df818ec427369c4a741e7b12cff83abd548cf8c9894d22eb71e28ab38bcfd41ac0edc0bdb148ec8
-
SSDEEP
6144:N+4UxvdjNgBoHFIZ0YesFZITJuUQn+rbYof9fV:9QNg2FTJuUQnROV
-
Detect Fabookie payload
-
Glupteba payload
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-