MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 083c9a8679034f65137bce38b2f1db98225a8d1f18dc351ee4d5adfc464fa72b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Smoke Loader
Vendor detections: 16
| SHA256 hash: | 083c9a8679034f65137bce38b2f1db98225a8d1f18dc351ee4d5adfc464fa72b |
|---|---|
| SHA3-384 hash: | f5b1fa39aea0dacd4dca80cfcc7e0f1725627a967f7bfc27101ff5693bcd8b7217e1f990cbb36c5b6828f6dce73ff179 |
| SHA1 hash: | 96099aced1b2724dd7fc56f6978802b87aeebaab |
| MD5 hash: | 8b2f1a0f480177fe032cbf896442a44e |
| humanhash: | leopard-north-angel-uncle |
| File name: | file |
| Download: | download sample |
| Signature | Smoke Loader |
| File size: | 273'408 bytes |
| First seen: | 2024-03-30 09:23:54 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 624073eb8eb5db9d6388daa3da73856e (1 x Smoke Loader) |
| ssdeep | 3072:8LZMm58BE5RRc8+HBi1/G66Czp+lbWhXrcrB0F0VC2MZUrTTk3:8KEVc8dH6ColYrcrB0F0k2MZmTT |
| TLSH | T19844AD01F6E1F075F9F3467158708A954E3FFC77EAB18A8B3388664E58712C18626B63 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4504/4/1) |
| File icon (PE): | |
| dhash icon | 0000082010100000 (1 x Smoke Loader) |
| Reporter | |
| Tags: | exe Smoke Loader |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerException__SetConsoleCtrl |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | EXE_Stealer_StealC_Feb2024 |
|---|---|
| Author: | Yashraj Solanki - Cyber Threat Intelligence Analyst at Bridewell |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::WriteProcessMemory KERNEL32.dll::CloseHandle |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::FindFirstVolumeMountPointW KERNEL32.dll::FindNextVolumeW KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryExW KERNEL32.dll::GetVolumeInformationW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::PeekConsoleInputA KERNEL32.dll::ReadConsoleInputA KERNEL32.dll::ReadConsoleA KERNEL32.dll::SetConsoleCtrlHandler KERNEL32.dll::SetStdHandle |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CreateFileW KERNEL32.dll::GetWindowsDirectoryW KERNEL32.dll::RemoveDirectoryW KERNEL32.dll::GetTempPathA |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::QueryDosDeviceW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.