General
-
Target
19f33f2561da52924b518b9f2c5638daaf4d6d338c6cfd2626035a7aae0dbef3
-
Size
213KB
-
Sample
240117-t78nwsahgl
-
MD5
ab4ee8f128f6ea854145d49070bbd093
-
SHA1
a2faa78ac3424ff5f92a9687ddc30dba6f8942b4
-
SHA256
19f33f2561da52924b518b9f2c5638daaf4d6d338c6cfd2626035a7aae0dbef3
-
SHA512
bb61f8ffebbff733f35d78c0cb24b0451e910e3bab544647587d72862f036d4ae4abec9e97fc63f81027a2cf210afe9c52e60d703c2d5c07943b4e2b6a2f1178
-
SSDEEP
3072:e/zaebXLMJiuWI3CRNObqB5Mn+hpRKs6:xebXLYK0qP8
Static task
static1
Behavioral task
behavioral1
Sample
19f33f2561da52924b518b9f2c5638daaf4d6d338c6cfd2626035a7aae0dbef3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
19f33f2561da52924b518b9f2c5638daaf4d6d338c6cfd2626035a7aae0dbef3.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
19f33f2561da52924b518b9f2c5638daaf4d6d338c6cfd2626035a7aae0dbef3
-
Size
213KB
-
MD5
ab4ee8f128f6ea854145d49070bbd093
-
SHA1
a2faa78ac3424ff5f92a9687ddc30dba6f8942b4
-
SHA256
19f33f2561da52924b518b9f2c5638daaf4d6d338c6cfd2626035a7aae0dbef3
-
SHA512
bb61f8ffebbff733f35d78c0cb24b0451e910e3bab544647587d72862f036d4ae4abec9e97fc63f81027a2cf210afe9c52e60d703c2d5c07943b4e2b6a2f1178
-
SSDEEP
3072:e/zaebXLMJiuWI3CRNObqB5Mn+hpRKs6:xebXLYK0qP8
-
Modifies firewall policy service
-
Modifies security service
-
Disables taskbar notifications via registry modification
-
Disables use of System Restore points
-
Sets file execution options in registry
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1