Behavioral task
behavioral1
Sample
4852-208-0x0000000000400000-0x0000000000409000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4852-208-0x0000000000400000-0x0000000000409000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
4852-208-0x0000000000400000-0x0000000000409000-memory.dmp
-
Size
36KB
-
MD5
167513bb31f3b1222d1d9cff635d0aa3
-
SHA1
caa9c1b7ffe0e785082b5c17905118c2a19bfced
-
SHA256
6e10fc38a97f5f8f315788499f7576e2f988fbc2d8f5889b6330694291e76560
-
SHA512
d7830f2d50c9f45d42894cdb5921619f470dab9c7514890315ccd48171d7a8760393f8c0b43c04528087a108796e5228a34fd595301a0b6713988700d32ea82d
-
SSDEEP
768:OAUqYDNKIoKpDd1KM02kQhx4hOtFceWzYqvz0bOS:HLiALKtd1PBkQD4UtFceWnz
Malware Config
Extracted
smokeloader
up3
Signatures
-
Smokeloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4852-208-0x0000000000400000-0x0000000000409000-memory.dmp
Files
-
4852-208-0x0000000000400000-0x0000000000409000-memory.dmp.exe windows:1 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE