Behavioral task
behavioral1
Sample
1412-3-0x0000000000400000-0x000000000040B000-memory.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1412-3-0x0000000000400000-0x000000000040B000-memory.exe
Resource
win10v2004-20240709-en
General
-
Target
1412-3-0x0000000000400000-0x000000000040B000-memory.dmp
-
Size
44KB
-
MD5
308df761f73a86bc759a5aa3f640511b
-
SHA1
4294c84607fc7ea1b31cd1db0d5df279c321e773
-
SHA256
0b85f3675385e51f9848a2d148b9eec660662f60a3dc983cc94b7e47881e0c31
-
SHA512
50bd2ca435a5c658f586f1c43ea8668913d15ce67a91ae3fa68e9fb93d46c1ddf412f5f7b697a8319f041d000cafe269ca3f8c26ea5f007a25153143142875dc
-
SSDEEP
768:Z/8mWE+vIY/U6DhR8ZSDc28hO3c3VgDeoVZnE:2a+QYs6DhR8658533s
Malware Config
Extracted
smokeloader
pub2
Signatures
-
Smokeloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1412-3-0x0000000000400000-0x000000000040B000-memory.dmp
Files
-
1412-3-0x0000000000400000-0x000000000040B000-memory.dmp.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE