General
-
Target
2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe
-
Size
7.8MB
-
Sample
240107-yqrfhadbfq
-
MD5
981fb98bb6fa845c67ed22349e91867d
-
SHA1
59ed889246126ea1b255b7bf391ef5198a4b6c7c
-
SHA256
2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374
-
SHA512
878d81e43347a1037c09295ca3d24b37826412442d81abc93db6d8b639939e45916480af8b471644dfdc00066604ef394a183612d823ea4fc5e09b13994ea120
-
SSDEEP
98304:zI1V5yYHMXoJ141kYqgK0GLKhemxQbTmRJ5QhIylxox9XNrqp5VBu:EyQy2IkNOemxyePn
Static task
static1
Behavioral task
behavioral1
Sample
2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe
Resource
win7-20231215-en
Malware Config
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe
-
Size
7.8MB
-
MD5
981fb98bb6fa845c67ed22349e91867d
-
SHA1
59ed889246126ea1b255b7bf391ef5198a4b6c7c
-
SHA256
2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374
-
SHA512
878d81e43347a1037c09295ca3d24b37826412442d81abc93db6d8b639939e45916480af8b471644dfdc00066604ef394a183612d823ea4fc5e09b13994ea120
-
SSDEEP
98304:zI1V5yYHMXoJ141kYqgK0GLKhemxQbTmRJ5QhIylxox9XNrqp5VBu:EyQy2IkNOemxyePn
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Glupteba payload
-
Modifies firewall policy service
-
Modifies security service
-
Enumerates VirtualBox registry keys
-
Disables taskbar notifications via registry modification
-
Disables use of System Restore points
-
Downloads MZ/PE file
-
Looks for VMWare services registry key.
-
Modifies Windows Firewall
-
Sets file execution options in registry
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
13Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2