General
-
Target
6db27327a2233d8ee11abbed6229604b.bin
-
Size
177KB
-
Sample
240112-dpjn2sdefq
-
MD5
38ca1387b830848f21f4f865d33fec37
-
SHA1
c1587e1dc5f4c584065976d02ad04386ff910486
-
SHA256
757768465a970aa74cdd702df6f5bf71615a036f1e01fc11d62c101f36647892
-
SHA512
77851fcdcd5d51f10051815b09fb5feb88c48c6d6e577852ae32a2a7134ea7bd6f573e4708bfe06eea30e300173b82d67a250c7562417ff3933187889bde3bac
-
SSDEEP
3072:jE4Q7JG5gxOIwNCP8uCk7sRl7/+gumhQBsDk5OFnmFaD0luSImcDaAwxe1hMqbCT:jE4Q7I589wQ8uCk7G+dmhQBsDCOFnmcc
Static task
static1
Behavioral task
behavioral1
Sample
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe
-
Size
290KB
-
MD5
6db27327a2233d8ee11abbed6229604b
-
SHA1
feb1887bd6f9c0f84ed539be18d2812042d87e74
-
SHA256
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4
-
SHA512
a0fac0a468fbc7d4f4b9a03a2a5fb94ec90172f04805066250a6c2fbf322a149acba3ecfd4cfa6889218e0c51bcece9d26c355cf36d5f939cb828a7735d5c5bf
-
SSDEEP
6144:BecoZjpjdRLk/7Y8XOFPN8v9ntG/689RjObRXMA:B+ZjpRRA/7XOFPSvJq68fjObph
-
Modifies firewall policy service
-
Modifies security service
-
Disables taskbar notifications via registry modification
-
Disables use of System Restore points
-
Sets file execution options in registry
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1