General
-
Target
file
-
Size
749KB
-
Sample
240513-rxmmkaad3s
-
MD5
cc76fdff627601783cd30fa4b3bc9b01
-
SHA1
955e4ae2f716628423b5c3388597a4ca4bebcf61
-
SHA256
7cb10c0efe7d47b7a44a5424e197d5a24a67f53fc7e1ed0c1f9923f797e10cfd
-
SHA512
79f2942c8b17fe8ad1d79895a8f6ae7e7837bd955855ebf51d70adc1fd0111a1e225f582b5ec6f3f84129792a3b2808ed22d14d0246c7f616649e2c70597396a
-
SSDEEP
12288:MMwQNweRcciNpQdxqnJmuTkhvJoRfzWzCj/XKAbDVFEn1mOU+tvlS2jbKRwMuhyQ:MMwQNwhDOqDTkhvSzxPzbXQmStSkWRwx
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
smokeloader
2022
http://bipto.org/tmp/index.php
http://jobresurs.ru/tmp/index.php
http://tonybabb.com/tmp/index.php
Extracted
smokeloader
pub3
Targets
-
-
Target
file
-
Size
749KB
-
MD5
cc76fdff627601783cd30fa4b3bc9b01
-
SHA1
955e4ae2f716628423b5c3388597a4ca4bebcf61
-
SHA256
7cb10c0efe7d47b7a44a5424e197d5a24a67f53fc7e1ed0c1f9923f797e10cfd
-
SHA512
79f2942c8b17fe8ad1d79895a8f6ae7e7837bd955855ebf51d70adc1fd0111a1e225f582b5ec6f3f84129792a3b2808ed22d14d0246c7f616649e2c70597396a
-
SSDEEP
12288:MMwQNweRcciNpQdxqnJmuTkhvJoRfzWzCj/XKAbDVFEn1mOU+tvlS2jbKRwMuhyQ:MMwQNwhDOqDTkhvSzxPzbXQmStSkWRwx
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-