Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
e8b2847717306271ad57f683246cecf592a136c6efef23038f36cf8ac8ab7e5a.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e8b2847717306271ad57f683246cecf592a136c6efef23038f36cf8ac8ab7e5a.exe
Resource
win10-20240404-en
General
-
Target
e8b2847717306271ad57f683246cecf592a136c6efef23038f36cf8ac8ab7e5a.exe
-
Size
243KB
-
MD5
5bceb53d5528fecae0f48cb1c27cd08c
-
SHA1
6af348d1fa623731379e87d810d7a76682634331
-
SHA256
e8b2847717306271ad57f683246cecf592a136c6efef23038f36cf8ac8ab7e5a
-
SHA512
2aa5120f1e58bcde4e19893a4fada60a89bcf94e3739f21b9959d5b3e19953ae80b18009d692fbb3e51ba687266271183ab5b85db47d71926f4c6b33a761b7eb
-
SSDEEP
3072:7l1HF2YvvlvPIqj11fpQ69GMn75uiunUI:Z1HZvJXzX9JEiz
Malware Config
Extracted
smokeloader
pub1
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1548-2-0x00000000023D0000-0x00000000024D0000-memory.dmpFilesize
1024KB
-
memory/1548-3-0x0000000000220000-0x000000000022B000-memory.dmpFilesize
44KB
-
memory/1548-4-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1548-1-0x0000000000400000-0x0000000001F88000-memory.dmpFilesize
27.5MB