MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0b06c6a25000addde175277b2d157d5bca4ab95cbfe3d984f1dba2ecefa3a4cd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: 0b06c6a25000addde175277b2d157d5bca4ab95cbfe3d984f1dba2ecefa3a4cd
SHA3-384 hash: b35e77af38ac39427de67de52eb0a228e115391823d693160cd088f6b4adb0cf412433550b4fe7e248e58b994dc29f13
SHA1 hash: 21d606a2eb1867c45a77181ecfc4acd7eb9c5130
MD5 hash: 53da8bea71bfe1b72632e354166437fb
humanhash: floor-summer-indigo-failed
File name:0b06c6a25000addde175277b2d157d5bca4ab95cbfe3d984f1dba2ecefa3a4cd
Download: download sample
Signature Smoke Loader
File size:46'592 bytes
First seen:2026-03-04 15:46:12 UTC
Last seen:2026-03-04 16:43:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 768:HnX3jtMYOlOOVfY3SCUTt6DgmUEEm63bd28P4QsOmrA:HX3BMYEfePcBvp35XPXms
Threatray 446 similar samples on MalwareBazaar
TLSH T15523E1978CF8AD60C4C98975CD92D267E3EB25C31DD3168CF32A9D224495FDA933DA80
TrID 42.6% (.EXE) Win32 Executable (generic) (4504/4/1)
19.2% (.EXE) OS/2 Executable (generic) (2029/13)
18.9% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable (generic) (2000/1)
0.2% (.VXD) VXD Driver (29/21)
Magika pebin
Reporter Myrtus0x0
Tags:exe Smoke Smoke Loader SmokeLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
158
Origin country :
US US
Vendor Threat Intelligence
Malware configuration found for:
SmokeLoader
Details
SmokeLoader
an extracted component
SmokeLoader
c2 urls and a version number
Malware family:
n/a
ID:
1
File name:
0b06c6a25000addde175277b2d157d5bca4ab95cbfe3d984f1dba2ecefa3a4cd
Verdict:
No threats detected
Analysis date:
2026-03-04 15:46:45 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
virus
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-09-24T00:46:00Z UTC
Last seen:
2025-09-24T01:41:00Z UTC
Hits:
~10
Detections:
Backdoor.Win32.Mokes.sb Backdoor.Win32.Mokes.c Backdoor.Agent.HTTP.C&C Trojan-Dropper.Win32.Injector.sb Packed.Win32.Redpill.sb HEUR:Trojan.Win32.Generic
Gathering data
Threat name:
Win32.Trojan.Alevaul
Status:
Malicious
First seen:
2025-09-24 05:42:54 UTC
File Type:
PE (Exe)
AV detection:
22 of 36 (61.11%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor discovery persistence trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Deletes itself
Detects Smokeloader version 2025 payload
SmokeLoader
Smokeloader family
Malware Config
C2 Extraction:
http://ownmbaego.com/index.php
https://ownmbaego.com/index.php
Unpacked files
SH256 hash:
0b06c6a25000addde175277b2d157d5bca4ab95cbfe3d984f1dba2ecefa3a4cd
MD5 hash:
53da8bea71bfe1b72632e354166437fb
SHA1 hash:
21d606a2eb1867c45a77181ecfc4acd7eb9c5130
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_no_import_table
Description:Detect pe file that no import table

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments