Behavioral task
behavioral1
Sample
1992-173-0x0000000000400000-0x0000000000409000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1992-173-0x0000000000400000-0x0000000000409000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
1992-173-0x0000000000400000-0x0000000000409000-memory.dmp
-
Size
36KB
-
MD5
e7a710f510211aef720c33e8e9b389b8
-
SHA1
ea1eb729b071f1fbb74b021e9ac455e47d7311d3
-
SHA256
48ea71092b0608bed25600e5a9262465b707d5ec58aeca5c8c18d6015f0cc38d
-
SHA512
ade9f0cb22019df49c2be717124bacfe5568beed7d0f62f7c59c187f322f6fa4cec83b4018a58c0cacb1325aed6326c8d054bc45aa9b88ba95bf7af842c15e6f
-
SSDEEP
768:OkUqYDNdsIoKpDd1KM02kQhx4hOtFceWzYqvz0bOS:zLiHsLKtd1PBkQD4UtFceWnz
Malware Config
Extracted
smokeloader
up3
Signatures
-
Smokeloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1992-173-0x0000000000400000-0x0000000000409000-memory.dmp
Files
-
1992-173-0x0000000000400000-0x0000000000409000-memory.dmp.exe windows:1 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE