General
-
Target
e18589908103c7d5e5c8d587da5a00eee01c8ff803bd3b5f6a696498273bcafb
-
Size
534KB
-
Sample
230922-aagpcsdc49
-
MD5
303e1e831d83c7db70611e049f3cfb8d
-
SHA1
a9fc462be581986b9553669216990dac31a7cf03
-
SHA256
e18589908103c7d5e5c8d587da5a00eee01c8ff803bd3b5f6a696498273bcafb
-
SHA512
f19657cb197258e5ed3dcea0c258d8f7a04b45a0e339d4606542b7782233fa10e92ab56282c542cdf11b8de446b7737eb04ff8e00919c9eec4be924ec87bb9ca
-
SSDEEP
6144:P+AUxvdjNgBoHFIZ0YesFZITJuUQny9zXW9fV:DQNg2FTJuUQny9zgV
Static task
static1
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
smokeloader
up3
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
e18589908103c7d5e5c8d587da5a00eee01c8ff803bd3b5f6a696498273bcafb
-
Size
534KB
-
MD5
303e1e831d83c7db70611e049f3cfb8d
-
SHA1
a9fc462be581986b9553669216990dac31a7cf03
-
SHA256
e18589908103c7d5e5c8d587da5a00eee01c8ff803bd3b5f6a696498273bcafb
-
SHA512
f19657cb197258e5ed3dcea0c258d8f7a04b45a0e339d4606542b7782233fa10e92ab56282c542cdf11b8de446b7737eb04ff8e00919c9eec4be924ec87bb9ca
-
SSDEEP
6144:P+AUxvdjNgBoHFIZ0YesFZITJuUQny9zXW9fV:DQNg2FTJuUQny9zgV
-
Detect Fabookie payload
-
Glupteba payload
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-