General
-
Target
file
-
Size
322KB
-
Sample
231012-chal5abg37
-
MD5
ce3638ec9647762f1fa7e6b4fc64a889
-
SHA1
c359b33b8d58b4f9962005a395a6efd218056d83
-
SHA256
cecc008c8d7603d9cda6bb9d127da6313a88f5fec9d21f894b167be0b9a9aebe
-
SHA512
5b2e90706a708ac6128248b956da6118ea2bca36dfc8ece8f946858703b3f0836ae1b66c9776ae74b30abc32bfea0b0a7c39ebe4ac7bb7ef21cabbb1fc4ef30e
-
SSDEEP
3072:ybGxh4qhSEdk38WkgbDLCDbyB5EOSZOvrfX9CcrpaQiu7531pw4XvLcrtxdB:yixh1hRdk3scLCKsBy9CUYPG531pb2
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
Protocol: ftp- Host:
195.85.115.195 - Port:
21 - Username:
TEST3 - Password:
159753
Extracted
Protocol: ftp- Host:
195.85.115.195 - Port:
21 - Username:
test - Password:
test
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://gudintas.at/tmp/
http://pik96.ru/tmp/
http://rosatiauto.com/tmp/
http://kingpirate.ru/tmp/
Targets
-
-
Target
file
-
Size
322KB
-
MD5
ce3638ec9647762f1fa7e6b4fc64a889
-
SHA1
c359b33b8d58b4f9962005a395a6efd218056d83
-
SHA256
cecc008c8d7603d9cda6bb9d127da6313a88f5fec9d21f894b167be0b9a9aebe
-
SHA512
5b2e90706a708ac6128248b956da6118ea2bca36dfc8ece8f946858703b3f0836ae1b66c9776ae74b30abc32bfea0b0a7c39ebe4ac7bb7ef21cabbb1fc4ef30e
-
SSDEEP
3072:ybGxh4qhSEdk38WkgbDLCDbyB5EOSZOvrfX9CcrpaQiu7531pw4XvLcrtxdB:yixh1hRdk3scLCKsBy9CUYPG531pb2
-
Downloads MZ/PE file
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-