General
-
Target
f4af92120cba0d2e138483300e286361b55a3ef49f73c3f01178d5961ecba808
-
Size
12.5MB
-
Sample
231117-fe4mksgb9x
-
MD5
00829a13780824866f9c2e081434a9fa
-
SHA1
51a0ba12ad4c7677b40b2a3cbbe78abdc656344e
-
SHA256
f4af92120cba0d2e138483300e286361b55a3ef49f73c3f01178d5961ecba808
-
SHA512
11ac3c3a67735e11a5edf616f8868b6bf0d9bb06218c79e7f2acd5e6deacfc9ac276896c9b3db4169a5868a55e26cabaf78b517c8e483ae081a61adb57af3a6b
-
SSDEEP
196608:XN2ZGay7QMB2+fwHBze5uglOtQYrWEZfK5IgAOdyWio4xiE+7i6vxV8jv0c44:AZQ8+fwteUEBuyF4Y3VrY0cx
Static task
static1
Behavioral task
behavioral1
Sample
f4af92120cba0d2e138483300e286361b55a3ef49f73c3f01178d5961ecba808.exe
Resource
win7-20231023-en
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
f4af92120cba0d2e138483300e286361b55a3ef49f73c3f01178d5961ecba808
-
Size
12.5MB
-
MD5
00829a13780824866f9c2e081434a9fa
-
SHA1
51a0ba12ad4c7677b40b2a3cbbe78abdc656344e
-
SHA256
f4af92120cba0d2e138483300e286361b55a3ef49f73c3f01178d5961ecba808
-
SHA512
11ac3c3a67735e11a5edf616f8868b6bf0d9bb06218c79e7f2acd5e6deacfc9ac276896c9b3db4169a5868a55e26cabaf78b517c8e483ae081a61adb57af3a6b
-
SSDEEP
196608:XN2ZGay7QMB2+fwHBze5uglOtQYrWEZfK5IgAOdyWio4xiE+7i6vxV8jv0c44:AZQ8+fwteUEBuyF4Y3VrY0cx
-
Glupteba payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
XMRig Miner payload
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
4Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1