General
-
Target
9d0ed01a625165d3d974f018400f6ffb354b1151ab6dfde032f49c0bdd5707d1
-
Size
1.2MB
-
Sample
231006-hb3xzsbf45
-
MD5
ea7e83d83566d5aeceef44caf31cc59d
-
SHA1
9b34772419446851c5336c50331790a99139d885
-
SHA256
9d0ed01a625165d3d974f018400f6ffb354b1151ab6dfde032f49c0bdd5707d1
-
SHA512
1286a30d55e7a81f205703b07929a480009d468c4798a4b59a5ed09b86bd1a273781c05215c92cdc381a065fb643e1be1ba4e1e9ffccdeead146e5bb7b081f20
-
SSDEEP
24576:jIfBznnRHmCciIqCoN7FLpn7oVIX6NS2zZ5hAhd9B4wN/a+aHZyp5:UfBznnAiIqCWZNqzZghdfNi7Z45
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Targets
-
-
Target
9d0ed01a625165d3d974f018400f6ffb354b1151ab6dfde032f49c0bdd5707d1
-
Size
1.2MB
-
MD5
ea7e83d83566d5aeceef44caf31cc59d
-
SHA1
9b34772419446851c5336c50331790a99139d885
-
SHA256
9d0ed01a625165d3d974f018400f6ffb354b1151ab6dfde032f49c0bdd5707d1
-
SHA512
1286a30d55e7a81f205703b07929a480009d468c4798a4b59a5ed09b86bd1a273781c05215c92cdc381a065fb643e1be1ba4e1e9ffccdeead146e5bb7b081f20
-
SSDEEP
24576:jIfBznnRHmCciIqCoN7FLpn7oVIX6NS2zZ5hAhd9B4wN/a+aHZyp5:UfBznnAiIqCWZNqzZghdfNi7Z45
-
Detect Fabookie payload
-
Glupteba payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Modify Registry
2