General
-
Target
8817cbb6de1446a920401a072df1453459aa95684ffc7da9c05ca759b1836c0c.zip
-
Size
11.4MB
-
Sample
231119-2dknzacc97
-
MD5
cf3e205aa03f27ec2293ebc7504cc8c2
-
SHA1
7e917bfa68282a207d44ee37192501aac6847c8c
-
SHA256
26ef78f3cc55ecfd66cf35eba103381bd42a92d570f283f5f22d0c8ce28527d2
-
SHA512
6496f36752b8d7701b0aa7d8ff03260fe7c0810fb99c453288df175d6304434359482ac751c242248ef78abc80a70019851fe44c676d611ed70ab258f20f9400
-
SSDEEP
196608:OtpR33e/kKVMiySHg/ZXcW5ZO14hTrlgOpz/2rVoHq6DvCuJ1gkbhEGk1PuMXUEq:ONuMoHglD5Z2WTrlt/2xohDauHgH11Pc
Static task
static1
Behavioral task
behavioral1
Sample
8817cbb6de1446a920401a072df1453459aa95684ffc7da9c05ca759b1836c0c.exe
Resource
win7-20231020-en
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
8817cbb6de1446a920401a072df1453459aa95684ffc7da9c05ca759b1836c0c.exe
-
Size
12.2MB
-
MD5
deb1df6e8090653848506c1e9a1e32f8
-
SHA1
f2472fb321a388b7310be0260e1f1e66e04188b6
-
SHA256
8817cbb6de1446a920401a072df1453459aa95684ffc7da9c05ca759b1836c0c
-
SHA512
cb9fbdabba1ea1efe44f7f712f0bbbafff0da482c7209d2e1befff1238b83a5beb6d3ccfd5bfa83aab20d40308e4412f2a54dbf03132e42c990447e3fed6e5aa
-
SSDEEP
196608:WgDX5c0qzDZFcwUe0IssfcRpQbXkLWjRppNaA/vc2dMMM+fBRhu:WgDpc0eZ+Le0Yqab0ajzpNlvJO+N
-
Glupteba payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
XMRig Miner payload
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
4Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1