MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1b8943b2ccea3ee9e464b5865711db721bae33ca0364630dfa6f75eb7f2c8a47. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 17
| SHA256 hash: | 1b8943b2ccea3ee9e464b5865711db721bae33ca0364630dfa6f75eb7f2c8a47 |
|---|---|
| SHA3-384 hash: | 9e76d7a6a358e208d45646eb4b3635acb5ca0b1be8e8071fc6dc2cc9d80030b576aa71b9586f4b1610d79128a06ef2b8 |
| SHA1 hash: | 2c477e9ef7f055f7dab54078c9aff8eb30694b89 |
| MD5 hash: | 99aaffa85ef7f0f16fb71435a1789210 |
| humanhash: | montana-helium-finch-muppet |
| File name: | 1B8943B2CCEA3EE9E464B5865711DB721BAE33CA03646.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 237'056 bytes |
| First seen: | 2023-12-25 20:35:08 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2e02f6b73811afb8377f3033bdeecd68 (1 x Stealc, 1 x RedLineStealer) |
| ssdeep | 3072:uI71HpD138zSIQ6WoVTEEiS+IWWWkElI8ULPz6j0kmZorp:F7111MzSoPVTKIWNkEGVH6gvo |
| Threatray | 3 similar samples on MalwareBazaar |
| TLSH | T14234DF22B7E0C072E16346304A71C7A65A377CB19B7199CF2BD41A7E6E702D1CB7934A |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 0ad092484844c84c (1 x RedLineStealer) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
# of uploads :
1
# of downloads :
513
Origin country :
NLVendor Threat Intelligence
Malware family:
smoke
ID:
1
File name:
1B8943B2CCEA3EE9E464B5865711DB721BAE33CA03646.exe
Verdict:
Malicious activity
Analysis date:
2023-12-25 20:36:21 UTC
Tags:
loader smoke smokeloader
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
SmokeLoader
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP GET request
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
control lolbin packed zusy
Verdict:
Malicious
Labled as:
Trojan.Kryptik
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
BazaLoader, SmokeLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to detect sleep reduction / modifications
Creates a thread in another existing process (thread injection)
Delayed program exit found
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Found malware configuration
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May use the Tor software to hide its network traffic
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected BazaLoader
Yara detected SmokeLoader
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2023-11-22 09:35:55 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
28 of 37 (75.68%)
Threat level:
5/5
Detection(s):
Malicious file
Result
Malware family:
smokeloader
Score:
10/10
Tags:
family:smokeloader botnet:pub1 backdoor trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Drops file in Windows directory
Deletes itself
Executes dropped EXE
Loads dropped DLL
Downloads MZ/PE file
SmokeLoader
Malware Config
C2 Extraction:
http://dpav.cc/tmp/
http://lrproduct.ru/tmp/
http://kggcp.com/tmp/
http://talesofpirates.net/tmp/
http://pirateking.online/tmp/
http://piratia.pw/tmp/
http://go-piratia.ru/tmp/
http://lrproduct.ru/tmp/
http://kggcp.com/tmp/
http://talesofpirates.net/tmp/
http://pirateking.online/tmp/
http://piratia.pw/tmp/
http://go-piratia.ru/tmp/
Unpacked files
SH256 hash:
dfce14ca9fa6c76df25ff3d3ff18ba943031d07a5cae3f0bad422e2b5e7eb559
MD5 hash:
37875cacee117b15e05b3f1c808592ac
SHA1 hash:
6a7882ca410e781262af685cf395bd2458c35a3b
Detections:
SmokeLoaderStage2
win_smokeloader_a2
Parent samples :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 hash:
1b8943b2ccea3ee9e464b5865711db721bae33ca0364630dfa6f75eb7f2c8a47
MD5 hash:
99aaffa85ef7f0f16fb71435a1789210
SHA1 hash:
2c477e9ef7f055f7dab54078c9aff8eb30694b89
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.