General
-
Target
8622a7d5e693faa115c6b42be19824d1bb962497579b90b469ccd95e81f891d4
-
Size
232KB
-
Sample
240212-fmp46aea56
-
MD5
844acaccc4b5339b8b2e0857e7ed5d1d
-
SHA1
ee4661f02dbeeb2e560ad097b2f73b155eaa7161
-
SHA256
8622a7d5e693faa115c6b42be19824d1bb962497579b90b469ccd95e81f891d4
-
SHA512
d3113ff8065373b820e78f93bc9bbdd4f9b3c737d6b30c105d282347e5acf2f6b6d7f38edd840f5e0993cc745293087491e892cc4e6850e12ac743f9089a872e
-
SSDEEP
3072:XdBLhn02iisAzV1bQ+LKpS4wT9woxA0ql5PzgXMR75VAYZJB:XziiJc+uM4sxxbLKAo
Static task
static1
Behavioral task
behavioral1
Sample
8622a7d5e693faa115c6b42be19824d1bb962497579b90b469ccd95e81f891d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8622a7d5e693faa115c6b42be19824d1bb962497579b90b469ccd95e81f891d4.exe
Resource
win10-20231220-en
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://sjyey.com/tmp/index.php
http://babonwo.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Extracted
amadey
http://arrunda.ru
http://soetegem.com
http://tceducn.com
-
strings_key
eb714cabd2548b4a03c45f723f838bdc
-
url_paths
/forum/index.php
Extracted
amadey
4.14
http://anfesq.com
http://cbinr.com
http://rimakc.ru
-
install_dir
68fd3d7ade
-
install_file
Utsysc.exe
-
strings_key
27ec7fd6f50f63b8af0c1d3deefcc8fe
-
url_paths
/forum/index.php
Targets
-
-
Target
8622a7d5e693faa115c6b42be19824d1bb962497579b90b469ccd95e81f891d4
-
Size
232KB
-
MD5
844acaccc4b5339b8b2e0857e7ed5d1d
-
SHA1
ee4661f02dbeeb2e560ad097b2f73b155eaa7161
-
SHA256
8622a7d5e693faa115c6b42be19824d1bb962497579b90b469ccd95e81f891d4
-
SHA512
d3113ff8065373b820e78f93bc9bbdd4f9b3c737d6b30c105d282347e5acf2f6b6d7f38edd840f5e0993cc745293087491e892cc4e6850e12ac743f9089a872e
-
SSDEEP
3072:XdBLhn02iisAzV1bQ+LKpS4wT9woxA0ql5PzgXMR75VAYZJB:XziiJc+uM4sxxbLKAo
-
Downloads MZ/PE file
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-