General
-
Target
53bcd8239258dcbb10f9d3b6d057103c18fe3dd614c5809053426b01b741500d.exe
-
Size
270KB
-
Sample
240725-df4ymavbjr
-
MD5
49d7edc4f51e03058654bdaffdfe9992
-
SHA1
8f6831a72019f1361e1174e1dbaa00113a034618
-
SHA256
53bcd8239258dcbb10f9d3b6d057103c18fe3dd614c5809053426b01b741500d
-
SHA512
05795d5a19f24bd6a14a8942730e588d5a5ef5b186d3f65ed3821efeb9d0e29c49352867bf8d8d7bc933f3f5356b55d40dd2e39080847d564bf0c24afd7a36d7
-
SSDEEP
6144:SzrS9ZldfBpR/xV/tlTUEuA38xplKK9/2Y/Um4voF:ScdfBpR/xV/tuTa85K4JU
Static task
static1
Behavioral task
behavioral1
Sample
53bcd8239258dcbb10f9d3b6d057103c18fe3dd614c5809053426b01b741500d.exe
Resource
win7-20240705-en
Malware Config
Extracted
smokeloader
pub1
Targets
-
-
Target
53bcd8239258dcbb10f9d3b6d057103c18fe3dd614c5809053426b01b741500d.exe
-
Size
270KB
-
MD5
49d7edc4f51e03058654bdaffdfe9992
-
SHA1
8f6831a72019f1361e1174e1dbaa00113a034618
-
SHA256
53bcd8239258dcbb10f9d3b6d057103c18fe3dd614c5809053426b01b741500d
-
SHA512
05795d5a19f24bd6a14a8942730e588d5a5ef5b186d3f65ed3821efeb9d0e29c49352867bf8d8d7bc933f3f5356b55d40dd2e39080847d564bf0c24afd7a36d7
-
SSDEEP
6144:SzrS9ZldfBpR/xV/tlTUEuA38xplKK9/2Y/Um4voF:ScdfBpR/xV/tuTa85K4JU
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-