Behavioral task
behavioral1
Sample
4400-28-0x0000000000400000-0x000000000040B000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4400-28-0x0000000000400000-0x000000000040B000-memory.exe
Resource
win10v2004-20240419-en
General
-
Target
4400-28-0x0000000000400000-0x000000000040B000-memory.dmp
-
Size
44KB
-
MD5
34c785e024c6427d56eb2555a686fa0a
-
SHA1
8881c8f985f9443f7cd76a5c8744c979ab7975ca
-
SHA256
220760deced8681d82f8ca7c0b919c268ceaae8162094862250d17a038b2d883
-
SHA512
5ae668811dc6b3a22f3283f2a027338b13cf8790cdc1e0feda7f9e5be9321e763c8d2e50227b20e7df9a2b732b6f6c35f19abe4f98784905e623c9aeb574e99d
-
SSDEEP
768:dA7kbPCKW0V+ayregqjEsDT9UCbaEAviIaBhrhROW962OIv:d1lQayrzqjN9UspAK5hrh8W9ew
Malware Config
Extracted
smokeloader
pub3
Signatures
-
Smokeloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4400-28-0x0000000000400000-0x000000000040B000-memory.dmp
Files
-
4400-28-0x0000000000400000-0x000000000040B000-memory.dmp.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE