General
-
Target
bestthingsalwaysgetbesrentirelifethingstogdomybetterthignswithgreat.hta
-
Size
178KB
-
Sample
241118-v6j5ks1nct
-
MD5
05dcffe1d8e8e209a90b522192ad8000
-
SHA1
77c19b392d39bce4906b5c4e5f1ab0a0c9182dc7
-
SHA256
35717c891450767af251ec90a7c05ffd407d7b2d2897d96c176c51b5b8a156b5
-
SHA512
11eafd5f126bb4873ec7be1dc6fe7246f3de8324c413073bc914827695ed1db1bb9b6e870414c0d4aba990a6a817d6c029f7aa02e5061434dcdb965a378b5734
-
SSDEEP
48:4vahW5oZz7eWLB2ZfywyQhhY1ywyQbD6ngS5RJCS0d399Dd5nCYmIYZAjo3ueufc:4vCl17ZtQjtQhVFlfnnCO4AjovtQX5Q
Static task
static1
Behavioral task
behavioral1
Sample
bestthingsalwaysgetbesrentirelifethingstogdomybetterthignswithgreat.hta
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bestthingsalwaysgetbesrentirelifethingstogdomybetterthignswithgreat.hta
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
Targets
-
-
Target
bestthingsalwaysgetbesrentirelifethingstogdomybetterthignswithgreat.hta
-
Size
178KB
-
MD5
05dcffe1d8e8e209a90b522192ad8000
-
SHA1
77c19b392d39bce4906b5c4e5f1ab0a0c9182dc7
-
SHA256
35717c891450767af251ec90a7c05ffd407d7b2d2897d96c176c51b5b8a156b5
-
SHA512
11eafd5f126bb4873ec7be1dc6fe7246f3de8324c413073bc914827695ed1db1bb9b6e870414c0d4aba990a6a817d6c029f7aa02e5061434dcdb965a378b5734
-
SSDEEP
48:4vahW5oZz7eWLB2ZfywyQhhY1ywyQbD6ngS5RJCS0d399Dd5nCYmIYZAjo3ueufc:4vCl17ZtQjtQhVFlfnnCO4AjovtQX5Q
-
Smokeloader family
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-