General
-
Target
2025-04-01_f513dc988cb2c77428b754ffb9669040_amadey_konni_smoke-loader
-
Size
201KB
-
Sample
250401-sdrylsz1fx
-
MD5
f513dc988cb2c77428b754ffb9669040
-
SHA1
e8e5386c5e7e53f0ef1270e92c1b45c2df3bd71a
-
SHA256
a36bb3dbfa3e5ecbbafc07e1f3829035101a2f5883667bf0cbe2e686857a9ccd
-
SHA512
80cbb72d888744352db1fe73139aee3beefb3d98f06c91f90cbc87f3be6470f5b890f41d8a75910a50fec7969cf310802bfba05c99ec70b1090789a1f790e99a
-
SSDEEP
3072:m5S0VvIH4lindUJXw58BkgnyNMIoVtmvVg4gdYbnybcapz/0Ic6o+Fc28V4EK:ma4InuJg58BkgqPoDH49n8Bb/c20Q
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-01_f513dc988cb2c77428b754ffb9669040_amadey_konni_smoke-loader.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
2025-04-01_f513dc988cb2c77428b754ffb9669040_amadey_konni_smoke-loader
-
Size
201KB
-
MD5
f513dc988cb2c77428b754ffb9669040
-
SHA1
e8e5386c5e7e53f0ef1270e92c1b45c2df3bd71a
-
SHA256
a36bb3dbfa3e5ecbbafc07e1f3829035101a2f5883667bf0cbe2e686857a9ccd
-
SHA512
80cbb72d888744352db1fe73139aee3beefb3d98f06c91f90cbc87f3be6470f5b890f41d8a75910a50fec7969cf310802bfba05c99ec70b1090789a1f790e99a
-
SSDEEP
3072:m5S0VvIH4lindUJXw58BkgnyNMIoVtmvVg4gdYbnybcapz/0Ic6o+Fc28V4EK:ma4InuJg58BkgqPoDH49n8Bb/c20Q
-
Disables service(s)
-
Modifies Windows Defender Real-time Protection settings
-
UAC bypass
-
Windows security bypass
-
Modifies Windows Firewall
-
Possible privilege escalation attempt
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Hide Artifacts: Hidden Users
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
1Hidden Users
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1