General
-
Target
5184c87f70fd14293e599b26fc4361ec3e5708095678c8a84143a059be319cf5
-
Size
12.6MB
-
Sample
231113-j2zhxsbg96
-
MD5
5ec85f88e0f5dbc92c19d9026ef8251c
-
SHA1
2fa2c7b0c1043e7bce3d2a076726fcfe47e40c31
-
SHA256
5184c87f70fd14293e599b26fc4361ec3e5708095678c8a84143a059be319cf5
-
SHA512
37c7c82e247cf962134e3f918c110ae9deb98c29fb075d7026aa2d96295f0679ec49c4520e57699b4f1b3d88061ed17f8b23cd498d43abe9c1387ca941609345
-
SSDEEP
196608:ePFkC5B+ooBgPb48oms+6Wc0/vONTsU8y9VYO1hHhQHoOpAHVrSQrHWYMV:ikNFmL6fxd8iVlhHuHoO6HQQrBY
Static task
static1
Behavioral task
behavioral1
Sample
5184c87f70fd14293e599b26fc4361ec3e5708095678c8a84143a059be319cf5.exe
Resource
win7-20231023-en
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
5184c87f70fd14293e599b26fc4361ec3e5708095678c8a84143a059be319cf5
-
Size
12.6MB
-
MD5
5ec85f88e0f5dbc92c19d9026ef8251c
-
SHA1
2fa2c7b0c1043e7bce3d2a076726fcfe47e40c31
-
SHA256
5184c87f70fd14293e599b26fc4361ec3e5708095678c8a84143a059be319cf5
-
SHA512
37c7c82e247cf962134e3f918c110ae9deb98c29fb075d7026aa2d96295f0679ec49c4520e57699b4f1b3d88061ed17f8b23cd498d43abe9c1387ca941609345
-
SSDEEP
196608:ePFkC5B+ooBgPb48oms+6Wc0/vONTsU8y9VYO1hHhQHoOpAHVrSQrHWYMV:ikNFmL6fxd8iVlhHuHoO6HQQrBY
-
Glupteba payload
-
PrivateLoader
PrivateLoader.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Stops running service(s)
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify Tools
3Modify Registry
4