MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 170ddb2583efd2402e84a7eb2c48754d978c8862e5c033fef9b7df34eadceb52. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Smoke Loader
Vendor detections: 9
| SHA256 hash: | 170ddb2583efd2402e84a7eb2c48754d978c8862e5c033fef9b7df34eadceb52 |
|---|---|
| SHA3-384 hash: | 34a985c4c56bf450e517fbfc9e53b1d1450332115c4cfc511a0a70cfc34377ceedaee9ea7e64be790e66ccb3857690ea |
| SHA1 hash: | 5d81c7f60371c156fc29b840991a10fbc10b2ef1 |
| MD5 hash: | 3f237a04bc8ec74f62cbed6b1a31ca12 |
| humanhash: | bravo-robert-bluebird-colorado |
| File name: | 3f237a04bc8ec74f62cbed6b1a31ca12.exe |
| Download: | download sample |
| Signature | Smoke Loader |
| File size: | 1'078'552 bytes |
| First seen: | 2021-01-19 13:05:22 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2fb819a19fe4dee5c03e8c6a79342f79 (56 x Adware.InstallCore, 8 x RedLineStealer, 7 x Adware.ExtenBro) |
| ssdeep | 24576:AyIXLhjLox0UGO4Gpn302pqa5ugHd+XfycUWmFCMo8eoSg1vpADsC/b:AyeLRu0UCGp302pcgHd+X6z94MWwvpgj |
| Threatray | 485 similar samples on MalwareBazaar |
| TLSH | A93523C3EFD00434D2A98A3A1534C1521FB6BD96EDFD04AC314CB497AF7A622E61671E |
| Reporter | |
| Tags: | Dofoil exe Smoke Loader |
Intelligence
File Origin
# of uploads :
1
# of downloads :
469
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3f237a04bc8ec74f62cbed6b1a31ca12.exe
Verdict:
Suspicious activity
Analysis date:
2021-01-19 13:15:07 UTC
Tags:
installer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cyberduck Djvu SmokeLoader Vidar
Detection:
malicious
Classification:
rans.phis.troj.spyw.evad
Score:
90 / 100
Signature
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary contains a suspicious time stamp
Changes security center settings (notifications, updates, antivirus, firewall)
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Renames NTDLL to bypass HIPS
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to resolve many domain names, but no domain seems valid
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Yara detected Cyberduck
Yara detected Djvu Ransomware
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-01-19 01:19:59 UTC
AV detection:
16 of 29 (55.17%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 475 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
98f3f2560dd120afa32c7b40c6a20966553cc0bcbc0f26a784b4fcc7ebe938fd
MD5 hash:
ca1d3fcb7b57c129bd8efae456333681
SHA1 hash:
3396ff1744cbcefcc48880bbdc4ff27569f3b72b
SH256 hash:
61c21c7cfdd25523265a5151626709418bc5df1ebf1a51e109cadfe68e6d6661
MD5 hash:
845dd290e7f92401af14192701dcf2b3
SHA1 hash:
3046f3ba18ec50051c23e9180f17a335954dcd2a
SH256 hash:
9835eef781d97d59e2f66d9af3baf09d28074815f4fdf2b87220d97958d98c84
MD5 hash:
6b09e2d8415b2a9dbffabd96a74ccb22
SHA1 hash:
6c26959055614686626b15b9a4ddb9ca0da69cbd
SH256 hash:
170ddb2583efd2402e84a7eb2c48754d978c8862e5c033fef9b7df34eadceb52
MD5 hash:
3f237a04bc8ec74f62cbed6b1a31ca12
SHA1 hash:
5d81c7f60371c156fc29b840991a10fbc10b2ef1
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
FileTour
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.