General
-
Target
05dcffe1d8e8e209a90b522192ad8000.bin
-
Size
3KB
-
Sample
241120-bcvvfa1qcr
-
MD5
ce74bdd7f7dbeb754a7c320b59f29074
-
SHA1
b9442308abb0a4454d44d35635a74f902843ba0b
-
SHA256
7abe05251323a89ff4f0939f7f4a09662ff4b4450ffb00bd457c8cdef52903a5
-
SHA512
816931078c7954a87c59c4b167dbf27e6e014ed32034f3cfa6bb12dfa5049f7002fa002fca5c65e553d9197bd03b27aa73459d64e2ceebf6dd855f697aac4dbc
Static task
static1
Behavioral task
behavioral1
Sample
35717c891450767af251ec90a7c05ffd407d7b2d2897d96c176c51b5b8a156b5.hta
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
35717c891450767af251ec90a7c05ffd407d7b2d2897d96c176c51b5b8a156b5.hta
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
Targets
-
-
Target
35717c891450767af251ec90a7c05ffd407d7b2d2897d96c176c51b5b8a156b5.hta
-
Size
178KB
-
MD5
05dcffe1d8e8e209a90b522192ad8000
-
SHA1
77c19b392d39bce4906b5c4e5f1ab0a0c9182dc7
-
SHA256
35717c891450767af251ec90a7c05ffd407d7b2d2897d96c176c51b5b8a156b5
-
SHA512
11eafd5f126bb4873ec7be1dc6fe7246f3de8324c413073bc914827695ed1db1bb9b6e870414c0d4aba990a6a817d6c029f7aa02e5061434dcdb965a378b5734
-
SSDEEP
48:4vahW5oZz7eWLB2ZfywyQhhY1ywyQbD6ngS5RJCS0d399Dd5nCYmIYZAjo3ueufc:4vCl17ZtQjtQhVFlfnnCO4AjovtQX5Q
-
Smokeloader family
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-