General
-
Target
560413121810458b463f81c6dd92268c.bin
-
Size
107KB
-
Sample
240114-b2s25shgck
-
MD5
95099fde7382de0487678c9134a7a29f
-
SHA1
f7eb432172c15e1749c3c292b2b9365f648d6b01
-
SHA256
61e709b7ccca1a8c5b5c072725528d056ff960dd6f4c574c07d9804332a726aa
-
SHA512
44acb4dc466ead6739ee2307b17bdf579a808c0204fa060112a0b4b9471a182882367ed8130c7c4abff3d92d2fee502e8d64c1e84707c975a02d8bd1e32f38f6
-
SSDEEP
3072:Wg4tfri9Ei1mSA5J/ILD+EYagIzttHotPXTegN:f45MEJ/IP9jgIzvHoPj5N
Static task
static1
Behavioral task
behavioral1
Sample
8518533444f9d26fabdd17053c4e69df268c6f3d3ef8be30fd2ab649641b6343.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8518533444f9d26fabdd17053c4e69df268c6f3d3ef8be30fd2ab649641b6343.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
8518533444f9d26fabdd17053c4e69df268c6f3d3ef8be30fd2ab649641b6343.exe
-
Size
201KB
-
MD5
560413121810458b463f81c6dd92268c
-
SHA1
380fa45a2b2146eecc8465d7f74837ca7b5cf6c8
-
SHA256
8518533444f9d26fabdd17053c4e69df268c6f3d3ef8be30fd2ab649641b6343
-
SHA512
d3d0e00df027aca159535c26fe2408d9ff2848be237fca5f51ba08117aca899a20b287c9b349ce4892cf37e32038876a5f999604f0bb713cafe1c26bb8b8dc18
-
SSDEEP
3072:mxrEQcahJioaqVAdZODEXaMs9HhMRhIe26KmUQQqRAGGovBL2A:mEQcaZYAEXD0hdHXn
-
Modifies firewall policy service
-
Modifies security service
-
Disables taskbar notifications via registry modification
-
Disables use of System Restore points
-
Sets file execution options in registry
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1