Behavioral task
behavioral1
Sample
1984-4-0x0000000000400000-0x000000000040B000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1984-4-0x0000000000400000-0x000000000040B000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
1984-4-0x0000000000400000-0x000000000040B000-memory.dmp
-
Size
44KB
-
MD5
1633a80e7c17298ad078d09880221b99
-
SHA1
91ede71e232da0d064bc9f605ccf0325d9f57f51
-
SHA256
f825478674b0045c6324a279b0e75e44134df6f2b7c533140bf6d1b45212a193
-
SHA512
9b7d8566bfcd3137957f7bd7b4f0e544750393b27f7f524544acc674adc9b80779ba36eb2b6db150999d3b2855d3c501f206529b914c3c82f05f6196c0e48d86
-
SSDEEP
768:CNRArRrjnz5y+bgsDF5I0haNLj1PokgJ4T:CNRAdnnzVF20MBj1PgJ4T
Malware Config
Extracted
smokeloader
pub2
Signatures
-
Smokeloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1984-4-0x0000000000400000-0x000000000040B000-memory.dmp
Files
-
1984-4-0x0000000000400000-0x000000000040B000-memory.dmp.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE