General
-
Target
0daebde971a5f21690f26c1ed8bf8813.bin
-
Size
178KB
-
Sample
240207-bda7eschfl
-
MD5
6ec9ef048a1575cce22f1079758fb30b
-
SHA1
cd37b68808f0321a7f7e272dd185bdcc5b7a69ca
-
SHA256
36a393fe2f9dc53f5b094ca2da3e76621e7b5c2f9ef524f76a1b7d2609041cea
-
SHA512
9a7bd2d76b45eceffaffff4251a1366f788ccc6c602b6a1757bcdf67a1dd460ab260920f48f23c0459279d7cb713624e3b8be6a69a34c8597acd1917017bd480
-
SSDEEP
3072:LQ2wKnqUxdrRJ/ZxB62X/Su7J9+cKlh7FMqOGCYDPrLhROEboey9:sG/fxB626oY3xM5CXOEE9
Static task
static1
Behavioral task
behavioral1
Sample
7abf5ad882fd72332b0b7fb530c8c6505852d4f7ea39edfe444218bdcd9c7f0e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7abf5ad882fd72332b0b7fb530c8c6505852d4f7ea39edfe444218bdcd9c7f0e.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
Targets
-
-
Target
7abf5ad882fd72332b0b7fb530c8c6505852d4f7ea39edfe444218bdcd9c7f0e.exe
-
Size
311KB
-
MD5
0daebde971a5f21690f26c1ed8bf8813
-
SHA1
361417ed0552958448b0fde6aeb980fcbec9572a
-
SHA256
7abf5ad882fd72332b0b7fb530c8c6505852d4f7ea39edfe444218bdcd9c7f0e
-
SHA512
1ac209e287a79aa14a8448418b78383b3fab3712f8f3d59946f39aabab9b035628735ef9362eec5146966562cc15b0bfa0dbc00d6e104789e1e799d3f9259a7a
-
SSDEEP
6144:QKILYpVy5qgOWp99sfQ+a/HTXbvOREnsE0aV:zIspVy5qgP2fQv/HbbZns
-
Detect Poverty Stealer Payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1