General
-
Target
file
-
Size
202KB
-
Sample
231009-gvffcsda55
-
MD5
03a72710efcdf882a5d49be4f866665e
-
SHA1
63a22bc5fbe6eb95d0c85ca6905dc3a151d56caa
-
SHA256
cc81fd50c7c8174f158219f8d0d01e07b320af642961687a0b9e8aaffbb97964
-
SHA512
d40b0bc953340a164322eb061bf6f0fcacd7ef48c16ce980b4ea373f71d2a900c83ddfdbe13d701ea5778906a2bd465ca225b1b6a51e6f83721ac46d9ec340a7
-
SSDEEP
3072:auHX7P5VoBro+RFkzULhQBZkVMcFX0NhzjZ5OcgqkKNS5DZDBM:aUroBrolzUF6ZkVxFX0NPgqLNQM
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://gudintas.at/tmp/
http://pik96.ru/tmp/
http://rosatiauto.com/tmp/
http://kingpirate.ru/tmp/
Targets
-
-
Target
file
-
Size
202KB
-
MD5
03a72710efcdf882a5d49be4f866665e
-
SHA1
63a22bc5fbe6eb95d0c85ca6905dc3a151d56caa
-
SHA256
cc81fd50c7c8174f158219f8d0d01e07b320af642961687a0b9e8aaffbb97964
-
SHA512
d40b0bc953340a164322eb061bf6f0fcacd7ef48c16ce980b4ea373f71d2a900c83ddfdbe13d701ea5778906a2bd465ca225b1b6a51e6f83721ac46d9ec340a7
-
SSDEEP
3072:auHX7P5VoBro+RFkzULhQBZkVMcFX0NhzjZ5OcgqkKNS5DZDBM:aUroBrolzUF6ZkVxFX0NPgqLNQM
Score10/10-
Downloads MZ/PE file
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-