General
-
Target
4aac91073923ae6e169e5aa6ff9eaf3d69bb0d303f885fe1add127179f4b2bb1.exe
-
Size
311KB
-
Sample
240111-y3z86sgef5
-
MD5
c8da7f06da12f671f1cdc889b5bdba19
-
SHA1
20b286c649799fa16dea4224cd08ea6b9dd70635
-
SHA256
4aac91073923ae6e169e5aa6ff9eaf3d69bb0d303f885fe1add127179f4b2bb1
-
SHA512
e2ff104e9badc512ed50db13a8644ac2c39c417b105cf29909266e2d99904a30824b0a39eb61501d1d78cf52a5948a0efdc6b7d20077b34c4cabdf38e5075023
-
SSDEEP
3072:kE8T6nLiwg/QecS9SSIFw3/qX6HKYHSOvl1+IUiXz+z405kyI3yAFwj0:BuSLiF/7cLFwv/lZSoT3yh
Static task
static1
Behavioral task
behavioral1
Sample
4aac91073923ae6e169e5aa6ff9eaf3d69bb0d303f885fe1add127179f4b2bb1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4aac91073923ae6e169e5aa6ff9eaf3d69bb0d303f885fe1add127179f4b2bb1.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
4aac91073923ae6e169e5aa6ff9eaf3d69bb0d303f885fe1add127179f4b2bb1.exe
-
Size
311KB
-
MD5
c8da7f06da12f671f1cdc889b5bdba19
-
SHA1
20b286c649799fa16dea4224cd08ea6b9dd70635
-
SHA256
4aac91073923ae6e169e5aa6ff9eaf3d69bb0d303f885fe1add127179f4b2bb1
-
SHA512
e2ff104e9badc512ed50db13a8644ac2c39c417b105cf29909266e2d99904a30824b0a39eb61501d1d78cf52a5948a0efdc6b7d20077b34c4cabdf38e5075023
-
SSDEEP
3072:kE8T6nLiwg/QecS9SSIFw3/qX6HKYHSOvl1+IUiXz+z405kyI3yAFwj0:BuSLiF/7cLFwv/lZSoT3yh
-
Modifies firewall policy service
-
Modifies security service
-
Disables taskbar notifications via registry modification
-
Disables use of System Restore points
-
Sets file execution options in registry
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1