General
-
Target
ffff.exe
-
Size
13KB
-
Sample
241230-j8cbzatnck
-
MD5
a441e40fb514d694749fc5b61af5ca91
-
SHA1
63a70ac55fcfa210fbc30ee104be29a037f691d2
-
SHA256
b7e03030f50714f574f595bf9d92ab5b3179bb6b617e658db88f0e8c7d05989b
-
SHA512
c5f5d3eae4ac85955c13e91fdf19f3438c56aaaf77470413428180f4fff2c865128c24d0281acbcbb0ef281db299189c99b9d39ff68105c444452a766e654188
-
SSDEEP
192:vBAlEMZWAY5nCtCY61l40CMvPSohzWLz5xWfgOQ/muu/d5THm4Ot4O:JAnLAXNy/m3/bTK4O
Static task
static1
Behavioral task
behavioral1
Sample
ffff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffff.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
smokeloader
2017
http://dogewareservice.ru/
Targets
-
-
Target
ffff.exe
-
Size
13KB
-
MD5
a441e40fb514d694749fc5b61af5ca91
-
SHA1
63a70ac55fcfa210fbc30ee104be29a037f691d2
-
SHA256
b7e03030f50714f574f595bf9d92ab5b3179bb6b617e658db88f0e8c7d05989b
-
SHA512
c5f5d3eae4ac85955c13e91fdf19f3438c56aaaf77470413428180f4fff2c865128c24d0281acbcbb0ef281db299189c99b9d39ff68105c444452a766e654188
-
SSDEEP
192:vBAlEMZWAY5nCtCY61l40CMvPSohzWLz5xWfgOQ/muu/d5THm4Ot4O:JAnLAXNy/m3/bTK4O
Score10/10-
Smokeloader family
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-