General
-
Target
56de2ee01318b998f9623f18f83847b7
-
Size
269KB
-
Sample
240112-s8xgksbfa9
-
MD5
56de2ee01318b998f9623f18f83847b7
-
SHA1
0848aad50d1a4c5633ab1d233ee8068570ec4810
-
SHA256
2ab633d90e2184cbc3b6d68d772524dd658d7b8f1ca6264371e9cd1384797c81
-
SHA512
1f0bcb3a493ebdec6e38a2f65a57a4695c4b298a8928fc02e882822c66315138b71fcf9922512b9ecdd806a0c38a8eff1152cefc1f403789c80eabd5686a7c13
-
SSDEEP
6144:A914VN+1D/aI4HYhzmaoJZzyPhH3c8iFvZez:8aaDiIlhzmTJxy5MTez
Static task
static1
Behavioral task
behavioral1
Sample
56de2ee01318b998f9623f18f83847b7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56de2ee01318b998f9623f18f83847b7.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
gozi
Targets
-
-
Target
56de2ee01318b998f9623f18f83847b7
-
Size
269KB
-
MD5
56de2ee01318b998f9623f18f83847b7
-
SHA1
0848aad50d1a4c5633ab1d233ee8068570ec4810
-
SHA256
2ab633d90e2184cbc3b6d68d772524dd658d7b8f1ca6264371e9cd1384797c81
-
SHA512
1f0bcb3a493ebdec6e38a2f65a57a4695c4b298a8928fc02e882822c66315138b71fcf9922512b9ecdd806a0c38a8eff1152cefc1f403789c80eabd5686a7c13
-
SSDEEP
6144:A914VN+1D/aI4HYhzmaoJZzyPhH3c8iFvZez:8aaDiIlhzmTJxy5MTez
-
Modifies firewall policy service
-
Modifies security service
-
Disables taskbar notifications via registry modification
-
Disables use of System Restore points
-
Sets file execution options in registry
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1