General
-
Target
NEAS.5cfd37f9531d619fab105eb49fb1cd3c9b38adbaab1cd6f7c546b5189f5a4b08exe_JC.exe
-
Size
378KB
-
Sample
231006-reg95aee62
-
MD5
5124c07a0005a2ccaff0c64785c38e19
-
SHA1
5db66b13d17a5807ecb1b64557642e0c038803e6
-
SHA256
5cfd37f9531d619fab105eb49fb1cd3c9b38adbaab1cd6f7c546b5189f5a4b08
-
SHA512
0fe2570a6426ff1626c1808f1f57ce54ec23e36de41f49def8160b0a486d31b9028d7dc64034fb13200187a97d17e38d06d582c547be83d416a8f6714fb340e2
-
SSDEEP
6144:4UNjlV2Iz/n26fV0CHy79V/R1VCgeD3m6LILUyj9MNrlmMJy64H4fqu:4UYIThfV0k09V/jeyGmjeNrlmM8lu
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5cfd37f9531d619fab105eb49fb1cd3c9b38adbaab1cd6f7c546b5189f5a4b08exe_JC.exe
Resource
win7-20230831-en
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Targets
-
-
Target
NEAS.5cfd37f9531d619fab105eb49fb1cd3c9b38adbaab1cd6f7c546b5189f5a4b08exe_JC.exe
-
Size
378KB
-
MD5
5124c07a0005a2ccaff0c64785c38e19
-
SHA1
5db66b13d17a5807ecb1b64557642e0c038803e6
-
SHA256
5cfd37f9531d619fab105eb49fb1cd3c9b38adbaab1cd6f7c546b5189f5a4b08
-
SHA512
0fe2570a6426ff1626c1808f1f57ce54ec23e36de41f49def8160b0a486d31b9028d7dc64034fb13200187a97d17e38d06d582c547be83d416a8f6714fb340e2
-
SSDEEP
6144:4UNjlV2Iz/n26fV0CHy79V/R1VCgeD3m6LILUyj9MNrlmMJy64H4fqu:4UYIThfV0k09V/jeyGmjeNrlmM8lu
-
Detect Fabookie payload
-
Glupteba payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Modifies boot configuration data using bcdedit
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1