General

  • Target

    2220-1-0x0000000000400000-0x000000000040B000-memory.dmp

  • Size

    44KB

  • Sample

    241101-mg52razdkc

  • MD5

    7db88ad25b53d7480e8eb20226c108ea

  • SHA1

    bd0b335000602d432e64864596508f4466c5bb0c

  • SHA256

    cdedcec403517b93850115afae5cdc00a83cb5b4feaeb996c0197fabfb1044bf

  • SHA512

    d3395757714d8cfca40d91a23071a323f6cef33b6430b36b62d2b3833bec7339a999bd282edc4b53579bfbf99335d09a3bc61bb7bb380df6348f844b10cba766

  • SSDEEP

    768:CazBIa4ueiy5prvFvY9NSiNUzhHzp587z78Lj946ZYlueKZN:tguWr4SiN2lz/e7kcueKZN

Malware Config

Extracted

Family

smokeloader

Botnet

pub2

Targets

    • Target

      2220-1-0x0000000000400000-0x000000000040B000-memory.dmp

    • Size

      44KB

    • MD5

      7db88ad25b53d7480e8eb20226c108ea

    • SHA1

      bd0b335000602d432e64864596508f4466c5bb0c

    • SHA256

      cdedcec403517b93850115afae5cdc00a83cb5b4feaeb996c0197fabfb1044bf

    • SHA512

      d3395757714d8cfca40d91a23071a323f6cef33b6430b36b62d2b3833bec7339a999bd282edc4b53579bfbf99335d09a3bc61bb7bb380df6348f844b10cba766

    • SSDEEP

      768:CazBIa4ueiy5prvFvY9NSiNUzhHzp587z78Lj946ZYlueKZN:tguWr4SiN2lz/e7kcueKZN

MITRE ATT&CK Enterprise v15

Tasks