General
-
Target
bca6f4f911b5f962b6e577b52b498a20801748b854cad5bb51999e58670edd16
-
Size
534KB
-
Sample
230922-dmjw2aed25
-
MD5
1a63be79d6f2e8a3a040eba097eb7836
-
SHA1
7f3ad03f557c80648c7ae1a5b5e4a4d68f61e5b3
-
SHA256
bca6f4f911b5f962b6e577b52b498a20801748b854cad5bb51999e58670edd16
-
SHA512
70ef71bdaa314bb33fc2a3635a2a171b57734a7eff7f02121f944e1ad9f77dfc991305f0eb12d4180a45e59a2bdb993b9cdd0be9b7e4300dac3a2c2c6f2194ae
-
SSDEEP
6144:L+AUxvdjNgBoHFIZ0YesFZITJuUQnjRC3xep9fV:XQNg2FTJuUQnjRC30/V
Static task
static1
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Targets
-
-
Target
bca6f4f911b5f962b6e577b52b498a20801748b854cad5bb51999e58670edd16
-
Size
534KB
-
MD5
1a63be79d6f2e8a3a040eba097eb7836
-
SHA1
7f3ad03f557c80648c7ae1a5b5e4a4d68f61e5b3
-
SHA256
bca6f4f911b5f962b6e577b52b498a20801748b854cad5bb51999e58670edd16
-
SHA512
70ef71bdaa314bb33fc2a3635a2a171b57734a7eff7f02121f944e1ad9f77dfc991305f0eb12d4180a45e59a2bdb993b9cdd0be9b7e4300dac3a2c2c6f2194ae
-
SSDEEP
6144:L+AUxvdjNgBoHFIZ0YesFZITJuUQnjRC3xep9fV:XQNg2FTJuUQnjRC30/V
-
Detect Fabookie payload
-
Glupteba payload
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-