General
-
Target
d230a44e2e8bac493f6a71ef0a80dd7f8d8ec169d3c7252e870700665968d688
-
Size
245KB
-
Sample
231117-vv8zkacf9t
-
MD5
75c6082de062c49a833fb3e81e60c877
-
SHA1
81f7e722cfa8b99280cb0118c2b0d0cd5e827707
-
SHA256
d230a44e2e8bac493f6a71ef0a80dd7f8d8ec169d3c7252e870700665968d688
-
SHA512
857474e36c785fda7fd1b66ebdab59ec40d23000089d66d8b156f41426ce7fc0834f77c5129e3431aee88e14580e8bbf6faf8f106c8cf18f05516de62951bf93
-
SSDEEP
3072:CgEc6LWbxGyXhDBFJY3Kr/GTUAF+rtvTXRtFfwGG39in4:cc6L0xRDBFrGg33FfwGGM
Static task
static1
Behavioral task
behavioral1
Sample
d230a44e2e8bac493f6a71ef0a80dd7f8d8ec169d3c7252e870700665968d688.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
d230a44e2e8bac493f6a71ef0a80dd7f8d8ec169d3c7252e870700665968d688.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
smokeloader
up4
Extracted
smokeloader
2020
http://host-file-file0.com/
http://file-file-file1.com/
Targets
-
-
Target
d230a44e2e8bac493f6a71ef0a80dd7f8d8ec169d3c7252e870700665968d688
-
Size
245KB
-
MD5
75c6082de062c49a833fb3e81e60c877
-
SHA1
81f7e722cfa8b99280cb0118c2b0d0cd5e827707
-
SHA256
d230a44e2e8bac493f6a71ef0a80dd7f8d8ec169d3c7252e870700665968d688
-
SHA512
857474e36c785fda7fd1b66ebdab59ec40d23000089d66d8b156f41426ce7fc0834f77c5129e3431aee88e14580e8bbf6faf8f106c8cf18f05516de62951bf93
-
SSDEEP
3072:CgEc6LWbxGyXhDBFJY3Kr/GTUAF+rtvTXRtFfwGG39in4:cc6L0xRDBFrGg33FfwGGM
Score10/10-
Modifies Installed Components in the registry
-
Deletes itself
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-