General
-
Target
1bde783efbb5f9dcc60adf9ffa5852906d5211a4d8e644bd31e5fe27e0844131
-
Size
700KB
-
Sample
240504-19zx4agd64
-
MD5
b738131a6a14ac7019a8704718cdbaed
-
SHA1
86f3a2f6115bbadfef82238fe425426bc634d0e1
-
SHA256
1bde783efbb5f9dcc60adf9ffa5852906d5211a4d8e644bd31e5fe27e0844131
-
SHA512
87cedf06c6ecae24cc74924efd489eaa9e94413af54e605cda9f7601e03fa65fcfbd93f9a6ae77684903db2e5056884f145f960d6590f0b6ea15923cacab43d5
-
SSDEEP
12288:1Mwh9coeIVMKnKUwR2s8pw8OOHdTfuAhCBstRLQ+b3qNppZK6dZCetm8i:1Mwh9FNKPn8pw4LuA++QeIjZMX
Static task
static1
Behavioral task
behavioral1
Sample
1bde783efbb5f9dcc60adf9ffa5852906d5211a4d8e644bd31e5fe27e0844131.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1bde783efbb5f9dcc60adf9ffa5852906d5211a4d8e644bd31e5fe27e0844131.exe
Resource
win10-20240404-en
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://cellc.org/tmp/index.php
http://h-c-v.ru/tmp/index.php
http://icebrasilpr.com/tmp/index.php
http://piratia-life.ru/tmp/index.php
http://piratia.su/tmp/index.php
Targets
-
-
Target
1bde783efbb5f9dcc60adf9ffa5852906d5211a4d8e644bd31e5fe27e0844131
-
Size
700KB
-
MD5
b738131a6a14ac7019a8704718cdbaed
-
SHA1
86f3a2f6115bbadfef82238fe425426bc634d0e1
-
SHA256
1bde783efbb5f9dcc60adf9ffa5852906d5211a4d8e644bd31e5fe27e0844131
-
SHA512
87cedf06c6ecae24cc74924efd489eaa9e94413af54e605cda9f7601e03fa65fcfbd93f9a6ae77684903db2e5056884f145f960d6590f0b6ea15923cacab43d5
-
SSDEEP
12288:1Mwh9coeIVMKnKUwR2s8pw8OOHdTfuAhCBstRLQ+b3qNppZK6dZCetm8i:1Mwh9FNKPn8pw4LuA++QeIjZMX
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-