General
-
Target
455a6a7f15ba86a0fe02ae1d8beff7a3dc8e858380244a45141054b0d330135c.exe
-
Size
12.1MB
-
Sample
240107-yr68cadcdj
-
MD5
366565a6601ce6af75b985ba18cc2af1
-
SHA1
7c8b67c090f6bcd6d0f28c771ec97acbda040e49
-
SHA256
455a6a7f15ba86a0fe02ae1d8beff7a3dc8e858380244a45141054b0d330135c
-
SHA512
f6e075ff87ee4071701ac828f17f6cbad1a76b505d2246a50d52601df9b53895685f70319ae7105d9150e26c95ad8c285369ba594a37dd3e6288ecba7297617d
-
SSDEEP
98304:ZFSjiO+G9g6Ziq8xNDwtfGuXTZgaTRH5KmxdpLSkh1PWTgI3j8U6mOK/mKEvOoIS:ZONX9lixwtfG+TRH5Kmx/a47IBN+
Static task
static1
Behavioral task
behavioral1
Sample
455a6a7f15ba86a0fe02ae1d8beff7a3dc8e858380244a45141054b0d330135c.exe
Resource
win7-20231215-en
Malware Config
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
455a6a7f15ba86a0fe02ae1d8beff7a3dc8e858380244a45141054b0d330135c.exe
-
Size
12.1MB
-
MD5
366565a6601ce6af75b985ba18cc2af1
-
SHA1
7c8b67c090f6bcd6d0f28c771ec97acbda040e49
-
SHA256
455a6a7f15ba86a0fe02ae1d8beff7a3dc8e858380244a45141054b0d330135c
-
SHA512
f6e075ff87ee4071701ac828f17f6cbad1a76b505d2246a50d52601df9b53895685f70319ae7105d9150e26c95ad8c285369ba594a37dd3e6288ecba7297617d
-
SSDEEP
98304:ZFSjiO+G9g6Ziq8xNDwtfGuXTZgaTRH5KmxdpLSkh1PWTgI3j8U6mOK/mKEvOoIS:ZONX9lixwtfG+TRH5Kmx/a47IBN+
-
Detect Socks5Systemz Payload
-
Detect ZGRat V1
-
Glupteba payload
-
Modifies firewall policy service
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Looks for VMWare services registry key.
-
Modifies Windows Firewall
-
Sets file execution options in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
11Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1