MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 08dcc0cd8aa90a04708aab25c7de5b66d62b4218ef0c5d2654a24b3cef83e534. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 08dcc0cd8aa90a04708aab25c7de5b66d62b4218ef0c5d2654a24b3cef83e534
SHA3-384 hash: 9697ef39a16622bccec3fee7ba1befb522a91f734f2fa68b7c58bbda497b86e79e2c8021d6773007da89cab674c6dcf5
SHA1 hash: 5a59f647912e2b26e4e953a6f975931a52b7488e
MD5 hash: 98586f27312dac0074453e56df6f853d
humanhash: white-friend-enemy-eighteen
File name:setup_x86_x64_install.exe
Download: download sample
Signature Smoke Loader
File size:5'378'406 bytes
First seen:2021-09-20 21:29:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:y+60DjG/U5hdRjAzfkMeQ35wQ7NazNRsZ3VyB/VY9D7RovkqZzG02SGf:y+6Mj1Uf1haz7sZ3VyBdYdRikqZzG02z
Threatray 564 similar samples on MalwareBazaar
TLSH T1BE46336C6E02C003D216EA339E5C85179B4EB307C831A155DD45123AEEC6A7EDBB76B3
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter Anonymous
Tags:exe Smoke Loader

Intelligence


File Origin
# of uploads :
1
# of downloads :
134
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
setup_x86_x64_install.exe
Verdict:
No threats detected
Analysis date:
2021-09-20 21:30:37 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Result
Threat name:
RedLine Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to a pastebin service (likely for C&C)
Creates processes via WMI
Disable Windows Defender real time protection (registry)
Drops PE files with a suspicious file extension
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Costura Assembly Loader
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 486896 Sample: setup_x86_x64_install.exe Startdate: 20/09/2021 Architecture: WINDOWS Score: 100 96 20.189.173.20 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->96 98 morselconstruction.bar 2->98 100 google.vrthcobj.com 2->100 118 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->118 120 Antivirus detection for URL or domain 2->120 122 Antivirus detection for dropped file 2->122 124 17 other signatures 2->124 12 setup_x86_x64_install.exe 10 2->12         started        signatures3 process4 file5 84 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->84 dropped 15 setup_installer.exe 22 12->15         started        process6 file7 86 C:\Users\user\AppData\...\setup_install.exe, PE32 15->86 dropped 88 C:\Users\user\AppData\...\Mon20d995a123a.exe, PE32+ 15->88 dropped 90 C:\Users\user\AppData\...\Mon20b2f419377.exe, PE32 15->90 dropped 92 17 other files (12 malicious) 15->92 dropped 18 setup_install.exe 1 15->18         started        process8 dnsIp9 102 hsiens.xyz 172.67.142.91, 49749, 80 CLOUDFLARENETUS United States 18->102 104 127.0.0.1 unknown unknown 18->104 126 Performs DNS queries to domains with low reputation 18->126 128 Adds a directory exclusion to Windows Defender 18->128 22 cmd.exe 18->22         started        24 cmd.exe 1 18->24         started        26 cmd.exe 18->26         started        28 13 other processes 18->28 signatures10 process11 signatures12 31 Mon2047be34ad4.exe 22->31         started        34 Mon2034b53252.exe 2 24->34         started        37 Mon200a63c67be5270.exe 26->37         started        130 Adds a directory exclusion to Windows Defender 28->130 39 Mon2066007704442e45.exe 28->39         started        42 Mon20821cb384.exe 28->42         started        44 Mon20503e322c02af83f.exe 28->44         started        46 9 other processes 28->46 process13 dnsIp14 132 Multi AV Scanner detection for dropped file 31->132 134 Query firmware table information (likely to detect VMs) 31->134 136 Tries to detect sandboxes and other dynamic analysis tools (window names) 31->136 152 2 other signatures 31->152 64 C:\Users\user\AppData\...\Mon2034b53252.tmp, PE32 34->64 dropped 138 Antivirus detection for dropped file 34->138 48 Mon2034b53252.tmp 34->48         started        140 Machine Learning detection for dropped file 37->140 142 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 37->142 154 2 other signatures 37->154 108 dependstar.bar 104.21.14.200, 443, 49758, 49762 CLOUDFLARENETUS United States 39->108 66 C:\Users\user\AppData\Roaming\7026774.scr, PE32 39->66 dropped 68 C:\Users\user\AppData\Roaming\4059808.scr, PE32 39->68 dropped 70 C:\Users\user\AppData\Roaming\3964349.scr, PE32 39->70 dropped 144 Drops PE files with a suspicious file extension 39->144 146 Injects a PE file into a foreign processes 42->146 110 162.159.129.233, 443, 49755 CLOUDFLARENETUS United States 44->110 72 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 44->72 dropped 112 37.0.10.244, 80 WKD-ASIE Netherlands 46->112 114 ip-api.com 208.95.112.1, 49738, 80 TUT-ASUS United States 46->114 116 11 other IPs or domains 46->116 74 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 46->74 dropped 148 May check the online IP address of the machine 46->148 150 Tries to harvest and steal browser information (history, passwords, etc) 46->150 156 3 other signatures 46->156 file15 signatures16 process17 dnsIp18 94 safialinks.com 162.0.214.42, 49739, 80 ACPCA Canada 48->94 56 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 48->56 dropped 58 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 48->58 dropped 60 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 48->60 dropped 62 C:\Users\user\AppData\...talevzaJet.exe, PE32 48->62 dropped 52 EtalevzaJet.exe 48->52         started        file19 process20 dnsIp21 106 162.0.210.44 ACPCA Canada 52->106 76 C:\Users\user\AppData\...\ZHutekidaefo.exe, PE32 52->76 dropped 78 C:\Program Files (x86)\...\Pysewejifi.exe, PE32 52->78 dropped 80 C:\Users\user\...\ZHutekidaefo.exe.config, XML 52->80 dropped 82 3 other files (1 malicious) 52->82 dropped file22
Threat name:
Win32.Infostealer.Reline
Status:
Malicious
First seen:
2021-09-20 21:30:07 UTC
AV detection:
29 of 45 (64.44%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:janesam botnet:nanani aspackv2 backdoor evasion infostealer spyware stealer themida trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Kills process with taskkill
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
https://petrenko96.tumblr.com/
45.142.215.47:27643
65.108.20.195:6774
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Unpacked files
SH256 hash:
36d5afdcb0fa8d512656aa5a59f34018885bb1b9dd5cc0780766552809cfb45f
MD5 hash:
4f9c74430d72b9500a0d99cc28fc7a7e
SHA1 hash:
a67cf6a62a6cabec501aa2f14e97c48b71dbd97c
SH256 hash:
5f463952815ce4f763e9f4b3b72ed70ad82f74a69a271fc2b1588055c3fec4cc
MD5 hash:
21775ff041e7277d87aa8fdf1e09da6c
SHA1 hash:
6dd1d6716cb93adef6c9b39490a79e77fd5396c9
SH256 hash:
24348bf669e03444119c11b262b0e0b117102d81c6f1d1448eab1eecaf4bf77f
MD5 hash:
e6baca37f452fc98630853205ce11ee8
SHA1 hash:
03e3b3f87d0be94e40ddf900210ebc67b5445659
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
52587a260b384278c789b134c8f08d8af9997aedd818c3c6a280d00aaaa77d2d
MD5 hash:
2c509753fac93810c09574a8b56af1e4
SHA1 hash:
e53da7ff5a9cfc3bda21794d639ed1f02cd7a881
SH256 hash:
bb858b8d47ac686d95fa950f6877c8d456a3d8f0b65795b113283409320c5492
MD5 hash:
ed7aa1a3e71fa7dbc854f581d9620e5c
SHA1 hash:
d125456c0a8bc14ca5d564536003fe47ec6488ca
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
ec599b0b771a292902f3c42ce378c62abe78f524a4a0e9224c5c985691dcc40a
MD5 hash:
062d3693875aef480647447a99242b0d
SHA1 hash:
8c4a3888bf313fdac328058ae95250f81bc9bd80
SH256 hash:
8721a407a4ff662f299febaddea27ba570498718af39365b6bfdade2687cd09e
MD5 hash:
f433fcbd733cf5c44370c55558204e71
SHA1 hash:
7478e59537fb5f5a50d3785d4eff63718d5a05e8
SH256 hash:
aff9ab692225614831ee1630686474da45ab76c978f91345309f76dc8f85c039
MD5 hash:
3a07caaa60f3b83b0e230fbfa6b0b357
SHA1 hash:
57d995c58ad58865787f32d7a1a0eedab1cf8e0f
SH256 hash:
1e50bead67a29eaeec16eb7f67ae9624e2e117c21838753b339f8dedcc1d0819
MD5 hash:
34a48b5bb71c3e586ab70823760ab20a
SHA1 hash:
4a2a5053f44be79b897a9c126befbdf32df5c4d3
SH256 hash:
f1df7e40b22c3be3f745e5e9bfcb63e0d1cdeaa0f4277c58688f645b4c03cd86
MD5 hash:
4d5ca32c1087623afa573f0cea3b443d
SHA1 hash:
46cd2a6fa67759ff35912c1cadf0bc398c9b19b8
SH256 hash:
4216c9244383319112c28dc0986df099991aaababbea7dd3a70e37764d97ed32
MD5 hash:
dd242b03908ffa99b8a6e7c13fca68ee
SHA1 hash:
38843a3659445a619543406dafc8b8518b79361f
SH256 hash:
d7e681228fba9eb79c5cb956e00fc67bbae6430c51bb06208ca3ff6b7bb4f0d0
MD5 hash:
44bef05849fe4a31a13b3cac1093b9c8
SHA1 hash:
3026601edac7d49ac6d70381b5e3e163b30d5ef1
SH256 hash:
cb5405f78d1959eac2ff9dd0f595598327a9d7369cc7d4e4eb76b30fa463f77e
MD5 hash:
1850f151d8862c9f5ea50b0e01ff38ab
SHA1 hash:
1ce9a174cd47bf97b39dcc95dd9b13d90e6ee383
SH256 hash:
5a316abb59caec8bf3e95187f20d734edcee4234f9571ab2f6fd7aad83ef07bd
MD5 hash:
5a31d99dee8653f15811fcc93651c696
SHA1 hash:
1429465b72e4b9b3e05db0fd5e5d237150f79090
SH256 hash:
ff236ccbd61d322a223e3152e768d0a195bde866d4debbe98929a80946382832
MD5 hash:
14b846dbd77dbedb574227310467d5fb
SHA1 hash:
01318111c3ae602914839f4f44f66dc095f3aa51
SH256 hash:
247d69da57e075f15e7fedc62ef99404f3e4e15988d35c598054f6771567b12a
MD5 hash:
0ef47ae88282ced5a011034e25a46e07
SHA1 hash:
4ee96fa7cf4c7c0d3d909a1726a48551a81aaf72
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
894300eca1742f48ed61be1043d3cb9924e89522c24b0f01b7cceb261a1fa073
MD5 hash:
7c82c868054a4fc8a5f6337a55f8d82e
SHA1 hash:
279ef02de285cbaf873e1ac2794406baa1f84f19
SH256 hash:
0fbd853a669d4590b44cda0525f41aa99175133be439db7ca9cd575a2af2636b
MD5 hash:
bb4e4f419dbe419d5cdca7e8534ac023
SHA1 hash:
cdacd0ad82dcefa585734e751b1cea42161a9033
SH256 hash:
f986e7da2b7e9f5d3a647d53055de296d3654210b7ae1245ed6881d4b28c7dd5
MD5 hash:
e4736bf88023f1b245eaf9e96a0559a5
SHA1 hash:
a0306a7c4039745ce2e504921f88f06c3324b855
SH256 hash:
3988e0bc57b0ba4edefcc4632905f4989851bc78caaacc15f10fb009c531f355
MD5 hash:
968107128270cca089b277709d1307df
SHA1 hash:
aabc403080d808d23abb110b26bf8eda2523ddda
SH256 hash:
79000f1fc2c1b80ca27b75b311014c401e8b5b431ebe16d5eb9d1e21103927cd
MD5 hash:
46fb5b0d1328cdd2752e9dee6db34f7d
SHA1 hash:
fa709a3f39aa4e7320ea647a5a6b97423ed06fe8
Detections:
win_socelars_auto
SH256 hash:
129aaef67c89f0e677eda19ae342893fd21f9799970169eed7d69928a46359aa
MD5 hash:
6c05aac715aa1f2e00ae332d5a6709c8
SHA1 hash:
98b0e68255e82958d179e0727fd0b356a53232f6
SH256 hash:
bc2d01bfa4d1d35ad1b92e0b5b60f40ff290ce2494d964fe039cbbba583161bf
MD5 hash:
6d3575bc9364d647e19c313c33b60edb
SHA1 hash:
2590132753dbb3312393948e9249b9f135c4247b
SH256 hash:
08dcc0cd8aa90a04708aab25c7de5b66d62b4218ef0c5d2654a24b3cef83e534
MD5 hash:
98586f27312dac0074453e56df6f853d
SHA1 hash:
5a59f647912e2b26e4e953a6f975931a52b7488e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments