General
-
Target
ab9a43ff120eb2b35632da18df7e18371b40f919820d65d75dc677779b694e8a
-
Size
216KB
-
Sample
231121-jn22wsda75
-
MD5
b9345fb76e134027c97e70ac91bf461e
-
SHA1
b66904fa8110d1fa3152d7fabf66f4ece8ce3f54
-
SHA256
ab9a43ff120eb2b35632da18df7e18371b40f919820d65d75dc677779b694e8a
-
SHA512
500c16fe93ada1625e77b702d1b06debae62946372eb7d566a4c1491d223e18f2b859dfbc8ab919064b8f8d0047a11eba1ab67d3ac03c611fa1b03a0ff1ccd8a
-
SSDEEP
3072:ry044dvbjumOLwBVDeYi5rf+EfzbR0OVrp3CemGH9Dzl7:OivuvLwXD1i5jzfHR0Crb/dl
Static task
static1
Behavioral task
behavioral1
Sample
ab9a43ff120eb2b35632da18df7e18371b40f919820d65d75dc677779b694e8a.exe
Resource
win10-20231020-en
Malware Config
Extracted
smokeloader
up4
Extracted
smokeloader
2020
http://host-file-file0.com/
http://file-file-file1.com/
Targets
-
-
Target
ab9a43ff120eb2b35632da18df7e18371b40f919820d65d75dc677779b694e8a
-
Size
216KB
-
MD5
b9345fb76e134027c97e70ac91bf461e
-
SHA1
b66904fa8110d1fa3152d7fabf66f4ece8ce3f54
-
SHA256
ab9a43ff120eb2b35632da18df7e18371b40f919820d65d75dc677779b694e8a
-
SHA512
500c16fe93ada1625e77b702d1b06debae62946372eb7d566a4c1491d223e18f2b859dfbc8ab919064b8f8d0047a11eba1ab67d3ac03c611fa1b03a0ff1ccd8a
-
SSDEEP
3072:ry044dvbjumOLwBVDeYi5rf+EfzbR0OVrp3CemGH9Dzl7:OivuvLwXD1i5jzfHR0Crb/dl
Score10/10-
Modifies Installed Components in the registry
-
Deletes itself
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-