General
-
Target
2WikyfhIg3qcjejHn3mPOq9j.exe
-
Size
4.6MB
-
Sample
240219-13r9nsfa48
-
MD5
61d5c104ea3648f4020c15dfac7e41de
-
SHA1
7197efa6c099fd47ea379578e5bdf9877d33b087
-
SHA256
d699d09ddc2994787b49a164b33353a8e723a62c7a2709201c4a3398169f8edf
-
SHA512
33386ae9326a298617c54bdc3084559f3b1a2e0ad72d33d773582befe7f5c4b875710dc2e93f9d10614add27bebd3b1ea6f9311b06b05f82eadb81c35df13a0a
-
SSDEEP
98304:oV8ndGDi9ymvydJLC19UYeh62JPtG4n65Kj5OJPL2Pso:o+ndGapsLCaW4n65K1CPa
Static task
static1
Behavioral task
behavioral1
Sample
2WikyfhIg3qcjejHn3mPOq9j.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2WikyfhIg3qcjejHn3mPOq9j.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
smokeloader
pub3
Extracted
risepro
193.233.132.55:50500
Extracted
smokeloader
2022
http://sjyey.com/tmp/index.php
http://babonwo.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Extracted
lumma
https://turkeyunlikelyofw.shop/api
https://associationokeo.shop/api
Targets
-
-
Target
2WikyfhIg3qcjejHn3mPOq9j.exe
-
Size
4.6MB
-
MD5
61d5c104ea3648f4020c15dfac7e41de
-
SHA1
7197efa6c099fd47ea379578e5bdf9877d33b087
-
SHA256
d699d09ddc2994787b49a164b33353a8e723a62c7a2709201c4a3398169f8edf
-
SHA512
33386ae9326a298617c54bdc3084559f3b1a2e0ad72d33d773582befe7f5c4b875710dc2e93f9d10614add27bebd3b1ea6f9311b06b05f82eadb81c35df13a0a
-
SSDEEP
98304:oV8ndGDi9ymvydJLC19UYeh62JPtG4n65Kj5OJPL2Pso:o+ndGapsLCaW4n65K1CPa
-
Detects LgoogLoader payload
-
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1