General
-
Target
efa2c530aa4d4f5223ba640f49f9dd46ba43645197cc5cd7e35b920186d7e1e7
-
Size
12.2MB
-
Sample
231123-ejryxagf4z
-
MD5
90c82b1a54b86b6551dc761298a92728
-
SHA1
e6c59e928564d75e8ea908f1154b9d496fb2feb2
-
SHA256
efa2c530aa4d4f5223ba640f49f9dd46ba43645197cc5cd7e35b920186d7e1e7
-
SHA512
532b0b90b10e552355270fa7d139995887a5df49cd23e2dabacece905b709e04787b5ce60842e4756fea99bb15ba38b5e52e93aa7366ca3b78fd90489b7a54de
-
SSDEEP
196608:McRpQbXkmgDX5c0qzDZFcwUe0IsslWjRppNaA/vc2dMMM+fBRhu:Mqab0mgDpc0eZ+Le0bjzpNlvJO+N
Static task
static1
Behavioral task
behavioral1
Sample
efa2c530aa4d4f5223ba640f49f9dd46ba43645197cc5cd7e35b920186d7e1e7.exe
Resource
win7-20231025-en
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
efa2c530aa4d4f5223ba640f49f9dd46ba43645197cc5cd7e35b920186d7e1e7
-
Size
12.2MB
-
MD5
90c82b1a54b86b6551dc761298a92728
-
SHA1
e6c59e928564d75e8ea908f1154b9d496fb2feb2
-
SHA256
efa2c530aa4d4f5223ba640f49f9dd46ba43645197cc5cd7e35b920186d7e1e7
-
SHA512
532b0b90b10e552355270fa7d139995887a5df49cd23e2dabacece905b709e04787b5ce60842e4756fea99bb15ba38b5e52e93aa7366ca3b78fd90489b7a54de
-
SSDEEP
196608:McRpQbXkmgDX5c0qzDZFcwUe0IsslWjRppNaA/vc2dMMM+fBRhu:Mqab0mgDpc0eZ+Le0bjzpNlvJO+N
-
Glupteba payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
XMRig Miner payload
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
4Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1