General
-
Target
d1757b0dc3f7df935251c19cd541eed8c3667f5b4ef0b6c52b6fbb1831f675c1
-
Size
320KB
-
Sample
240409-3zyy6aeb3z
-
MD5
4740da546fc591e33f0b6dea2e57c619
-
SHA1
51400b36de1caa1dcac1ab3607a53aa9cfa391e3
-
SHA256
d1757b0dc3f7df935251c19cd541eed8c3667f5b4ef0b6c52b6fbb1831f675c1
-
SHA512
353fd747ff31f5ab281ec01b03ca91ce0cbea6cd47e0b7364bd6f14308b9b344e1be0d03a3eded59d4fa8145aa1d7a37746060792d3fc7d1cc1271d5c6b0f7df
-
SSDEEP
6144:9Z/9u0AZFTv4+6TcMAUhGXAXydg/x1wWx1w:9ZDAZ52TcMAgsdA1wS1w
Static task
static1
Behavioral task
behavioral1
Sample
d1757b0dc3f7df935251c19cd541eed8c3667f5b4ef0b6c52b6fbb1831f675c1.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
d1757b0dc3f7df935251c19cd541eed8c3667f5b4ef0b6c52b6fbb1831f675c1.exe
Resource
win11-20240221-en
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
lumma
https://appliedgrandyjuiw.shop/api
https://birdpenallitysydw.shop/api
https://cinemaclinicttanwk.shop/api
https://disagreemenywyws.shop/api
https://speedparticipatewo.shop/api
https://fixturewordbakewos.shop/api
https://colorprioritytubbew.shop/api
https://abuselinenaidwjuew.shop/api
https://methodgreenglassdatw.shop/api
Targets
-
-
Target
d1757b0dc3f7df935251c19cd541eed8c3667f5b4ef0b6c52b6fbb1831f675c1
-
Size
320KB
-
MD5
4740da546fc591e33f0b6dea2e57c619
-
SHA1
51400b36de1caa1dcac1ab3607a53aa9cfa391e3
-
SHA256
d1757b0dc3f7df935251c19cd541eed8c3667f5b4ef0b6c52b6fbb1831f675c1
-
SHA512
353fd747ff31f5ab281ec01b03ca91ce0cbea6cd47e0b7364bd6f14308b9b344e1be0d03a3eded59d4fa8145aa1d7a37746060792d3fc7d1cc1271d5c6b0f7df
-
SSDEEP
6144:9Z/9u0AZFTv4+6TcMAUhGXAXydg/x1wWx1w:9ZDAZ52TcMAgsdA1wS1w
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry
-
Deletes itself
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-