Behavioral task
behavioral1
Sample
1668-0-0x0000000000400000-0x000000000040B000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1668-0-0x0000000000400000-0x000000000040B000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
1668-0-0x0000000000400000-0x000000000040B000-memory.dmp
-
Size
44KB
-
MD5
a3d897fefef6de8b3a9feaca61ae67df
-
SHA1
637a51c8cafbfde87ca4eac81049f86f500458dd
-
SHA256
ecdf7e32b59b2d994e78ef36afe003c49e2ce0be8ab61b4c212f41361e9ef2b8
-
SHA512
17882f9066b073b38df2da00962deb9eab823bfb45b221ff0368d9a021efda476f1cb6131075dafefaf1a84532780ef2833a7d749114529b1ddd364f1db2919b
-
SSDEEP
768:4raagVYrfX7UrRhSZOh/q+wjDp8v3uWqeqLhy5:4raDmLL+94jDS/XqeqVy5
Malware Config
Extracted
smokeloader
pub1
Signatures
-
Smokeloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1668-0-0x0000000000400000-0x000000000040B000-memory.dmp
Files
-
1668-0-0x0000000000400000-0x000000000040B000-memory.dmp.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE