MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0850e7daf8a13b13aeb3d48bf41303856735c01e2b4d97819222c9b8c700aebe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments 1

SHA256 hash: 0850e7daf8a13b13aeb3d48bf41303856735c01e2b4d97819222c9b8c700aebe
SHA3-384 hash: 0e2df1b021cfa3799f160fd8c4c80053a1766ac4ed0e030b5fb71060519daf61872fe67cc38068f9858c9b041bc3be4b
SHA1 hash: 3cf498e32d901ab24b9ba927c0c92c80c9377687
MD5 hash: a251ed6c078614e663e4ada306429782
humanhash: berlin-cat-yankee-black
File name:a251ed6c078614e663e4ada306429782
Download: download sample
Signature Smoke Loader
File size:218'624 bytes
First seen:2021-12-08 13:27:46 UTC
Last seen:2021-12-08 15:31:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1559f4aa5dc01b6c1b22ab1692d59632 (3 x Smoke Loader, 1 x CryptBot)
ssdeep 3072:LuOLbJNQ5+uVUgYN3Y1vlfi5tqTr0uWrxpzbgqru2sxkgaBChApZa9uD6Vdyhke3:VL91uXvlf/r0uuzbgwujigaLwVfw
Threatray 12'519 similar samples on MalwareBazaar
TLSH T15024AD317ADCA871D4635E708821D6E05B2BBC125930A14FF654575E2EB3F9C8AF232E
File icon (PE):PE icon
dhash icon fcfcd4d4d4d4d8c0 (75 x RedLineStealer, 56 x RaccoonStealer, 23 x Smoke Loader)
Reporter zbetcheckin
Tags:32 exe Smoke Loader

Intelligence


File Origin
# of uploads :
2
# of downloads :
135
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a251ed6c078614e663e4ada306429782
Verdict:
Suspicious activity
Analysis date:
2021-12-08 13:30:11 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Unauthorized injection to a recently created process
Searching for synchronization primitives
DNS request
Sending a custom TCP request
Reading critical registry keys
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Searching for analyzing tools
Query of malicious DNS domain
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
CPUID_Instruction
CheckCmdLine
EvasionGetTickCount
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware lockbit packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Raccoon RedLine SmokeLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contain functionality to detect virtual machines
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to infect the boot sector
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 536316 Sample: XYVqQFUuMu Startdate: 08/12/2021 Architecture: WINDOWS Score: 100 49 host-data-coin-11.com 2->49 65 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->65 67 Multi AV Scanner detection for domain / URL 2->67 69 Found malware configuration 2->69 71 13 other signatures 2->71 10 XYVqQFUuMu.exe 2->10         started        13 tjicrfc 2->13         started        signatures3 process4 signatures5 89 Contains functionality to inject code into remote processes 10->89 91 Injects a PE file into a foreign processes 10->91 15 XYVqQFUuMu.exe 10->15         started        93 Machine Learning detection for dropped file 13->93 18 tjicrfc 13->18         started        process6 signatures7 115 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 15->115 117 Maps a DLL or memory area into another process 15->117 119 Checks if the current machine is a virtual machine (disk enumeration) 15->119 20 explorer.exe 6 15->20 injected 121 Creates a thread in another existing process (thread injection) 18->121 process8 dnsIp9 51 185.233.81.115, 443, 49818 SUPERSERVERSDATACENTERRU Russian Federation 20->51 53 185.186.142.166, 49812, 80 ASKONTELRU Russian Federation 20->53 55 6 other IPs or domains 20->55 39 C:\Users\user\AppData\Roaming\tjicrfc, PE32 20->39 dropped 41 C:\Users\user\AppData\Local\Temp\D19.exe, PE32 20->41 dropped 43 C:\Users\user\AppData\Local\Temp\BE11.exe, PE32 20->43 dropped 45 5 other malicious files 20->45 dropped 81 System process connects to network (likely due to code injection or exploit) 20->81 83 Benign windows process drops PE files 20->83 85 Deletes itself after installation 20->85 87 Hides that the sample has been downloaded from the Internet (zone.identifier) 20->87 25 14C0.exe 4 20->25         started        29 BE11.exe 20->29         started        31 9345.exe 2 20->31         started        34 2 other processes 20->34 file10 signatures11 process12 dnsIp13 57 45.9.20.149, 42871, 49827 DEDIPATH-LLCUS Russian Federation 25->57 95 Multi AV Scanner detection for dropped file 25->95 97 Detected unpacking (changes PE section rights) 25->97 99 Query firmware table information (likely to detect VMs) 25->99 113 4 other signatures 25->113 101 Tries to detect sandboxes and other dynamic analysis tools (window names) 29->101 103 Machine Learning detection for dropped file 29->103 105 Contains functionality to infect the boot sector 29->105 107 Contain functionality to detect virtual machines 29->107 59 91.219.236.27, 80 SERVERASTRA-ASHU Hungary 31->59 61 94.158.245.147, 49857, 80 MIVOCLOUDMD Moldova Republic of 31->61 63 2 other IPs or domains 31->63 47 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 31->47 dropped 109 Detected unpacking (overwrites its own PE header) 31->109 111 Tries to harvest and steal browser information (history, passwords, etc) 31->111 36 7145.exe 34->36         started        file14 signatures15 process16 signatures17 73 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 36->73 75 Maps a DLL or memory area into another process 36->75 77 Checks if the current machine is a virtual machine (disk enumeration) 36->77 79 Creates a thread in another existing process (thread injection) 36->79
Threat name:
Win32.Trojan.Raccoon
Status:
Malicious
First seen:
2021-12-08 13:28:11 UTC
File Type:
PE (Exe)
Extracted files:
58
AV detection:
26 of 28 (92.86%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:bazarloader family:raccoon family:redline family:smokeloader botnet:f797145799b7b1b77b35d81de942eee0908da519 botnet:fd4f23250443a724a3d1548e6ab07c481dfc2814 backdoor discovery dropper infostealer loader spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Deletes itself
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Bazar/Team9 Loader payload
Bazar Loader
Raccoon
RedLine
RedLine Payload
SmokeLoader
Malware Config
C2 Extraction:
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe 0850e7daf8a13b13aeb3d48bf41303856735c01e2b4d97819222c9b8c700aebe

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-12-08 13:27:48 UTC

url : hxxp://privacytools-for-you-777.com/downloads/toolspab3.exe