General
-
Target
file
-
Size
265KB
-
Sample
231205-h2m98ahf7z
-
MD5
d7752d31728c6341a41b3aa476fa3529
-
SHA1
d243602f189bf7c5978d929ffd4a9aa321712138
-
SHA256
08a646fa562d3e3f447b7001356424cc5d7c7296873a8d1d94be35bd52a3b58d
-
SHA512
6040276c9c6206132e2dced287bd4452222c494e4f1d4191d51dbd43861e8d02d2abaf704ebe12462a8fb2eb59431eca684a0d20ee25f7f0fe76d5a2d38973c0
-
SSDEEP
3072:Q7FaQEw9YltfXFZ/yxSeLjRtrgssGbuHhmPcuddu2M93fzC7G/56YEZ4:oFHP0vFZ6xSehtzFjzAvzC
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://humydrole.com/tmp/index.php
http://trunk-co.ru/tmp/index.php
http://weareelight.com/tmp/index.php
http://pirateking.online/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Targets
-
-
Target
file
-
Size
265KB
-
MD5
d7752d31728c6341a41b3aa476fa3529
-
SHA1
d243602f189bf7c5978d929ffd4a9aa321712138
-
SHA256
08a646fa562d3e3f447b7001356424cc5d7c7296873a8d1d94be35bd52a3b58d
-
SHA512
6040276c9c6206132e2dced287bd4452222c494e4f1d4191d51dbd43861e8d02d2abaf704ebe12462a8fb2eb59431eca684a0d20ee25f7f0fe76d5a2d38973c0
-
SSDEEP
3072:Q7FaQEw9YltfXFZ/yxSeLjRtrgssGbuHhmPcuddu2M93fzC7G/56YEZ4:oFHP0vFZ6xSehtzFjzAvzC
-
Detect PureLogs payload
-
Downloads MZ/PE file
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-