MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 207633ae06d66e10fafea8daea7a683e555b56ccf2ac6c9062fa5ede6e3ee32b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments 1

SHA256 hash: 207633ae06d66e10fafea8daea7a683e555b56ccf2ac6c9062fa5ede6e3ee32b
SHA3-384 hash: 8c92a905176820f4480ec449a02786744fe4e8f808072bc03509d79223a671e0a8a6a98b0cdb660d2862b63e9222c0cf
SHA1 hash: 10c367059628582d4555eea84b2072b49c4c9d7b
MD5 hash: 71188b5c637e8b3b64f409b1821e5505
humanhash: ink-pizza-early-magnesium
File name:metina_2.exe
Download: download sample
Signature Smoke Loader
File size:258'560 bytes
First seen:2021-05-14 14:34:29 UTC
Last seen:2021-05-14 15:41:10 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 38bba698bf50b4891f9e712279d754b0 (1 x Smoke Loader, 1 x ArkeiStealer, 1 x FickerStealer)
ssdeep 3072:NncGzwaee1xVhXN2L6Yw/i4JWTLcAcwF6MeKCiGv/SOOBF45NOlSI8LmAsZ1TScv:NnRzweNhX4L6YwcLcZwkMf4UN8aJk
Threatray 408 similar samples on MalwareBazaar
TLSH 4A447D30B690C2F4E0BB22F475B583786A2D7DBD9B2460DB51D42AFA563C6E49C3074B
Reporter LittleRedBean2
Tags:Smoke Loader

Intelligence


File Origin
# of uploads :
3
# of downloads :
123
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
metina_2.exe
Verdict:
Suspicious activity
Analysis date:
2021-05-14 14:50:31 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Creating a file in the %temp% directory
Sending a UDP request
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Connection attempt
Sending an HTTP POST request
Deleting of the original file
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Ficker Stealer RedLine Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to infect the boot sector
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Renames NTDLL to bypass HIPS
Sample uses process hollowing technique
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Ficker Stealer
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 414357 Sample: metina_2.exe Startdate: 14/05/2021 Architecture: WINDOWS Score: 100 61 pool.minexmr.com 2->61 63 icanhazip.com 2->63 85 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->85 87 Antivirus detection for URL or domain 2->87 89 Yara detected Ficker Stealer 2->89 91 14 other signatures 2->91 12 metina_2.exe 1 2->12         started        15 btrurce 1 2->15         started        18 svchost.exe 1 2->18         started        21 3 other processes 2->21 signatures3 process4 dnsIp5 117 Detected unpacking (changes PE section rights) 12->117 119 Renames NTDLL to bypass HIPS 12->119 121 Maps a DLL or memory area into another process 12->121 123 Creates a thread in another existing process (thread injection) 12->123 23 explorer.exe 6 12->23 injected 59 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 15->59 dropped 125 Multi AV Scanner detection for dropped file 15->125 127 Machine Learning detection for dropped file 15->127 129 Checks if the current machine is a virtual machine (disk enumeration) 15->129 65 192.168.2.1 unknown unknown 18->65 file6 signatures7 process8 dnsIp9 73 37.120.239.108, 49758, 80 SECURE-DATA-ASRO Romania 23->73 75 twvickiassociation.com 14.51.96.70, 49750, 80 KIXS-AS-KRKoreaTelecomKR Korea Republic of 23->75 77 4 other IPs or domains 23->77 51 C:\Users\user\AppData\Roaming\btrurce, PE32 23->51 dropped 53 C:\Users\user\AppData\Local\Temp\ADEC.exe, PE32 23->53 dropped 55 C:\Users\user\AppData\Local\Temp\8C88.exe, PE32 23->55 dropped 57 C:\Users\user\...\btrurce:Zone.Identifier, ASCII 23->57 dropped 109 System process connects to network (likely due to code injection or exploit) 23->109 111 Benign windows process drops PE files 23->111 113 Deletes itself after installation 23->113 115 Hides that the sample has been downloaded from the Internet (zone.identifier) 23->115 28 ADEC.exe 15 3 23->28         started        32 8C88.exe 23->32         started        file10 signatures11 process12 dnsIp13 83 p6.bitrhost.ru 217.107.34.191, 443, 49772 RTCOMM-ASRU Russian Federation 28->83 131 Machine Learning detection for dropped file 28->131 133 Writes to foreign memory regions 28->133 135 Allocates memory in foreign processes 28->135 141 2 other signatures 28->141 34 AddInProcess32.exe 14 25 28->34         started        137 Detected unpacking (overwrites its own PE header) 32->137 139 Contains functionality to infect the boot sector 32->139 signatures14 process15 dnsIp16 67 45.140.146.153, 26731, 49796, 49801 SYNLINQsynlinqdeDE United Kingdom 34->67 69 api.ip.sb 34->69 71 2 other IPs or domains 34->71 49 C:\Users\user\AppData\Local\Temp\build.exe, PE32 34->49 dropped 93 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 34->93 95 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 34->95 97 Tries to harvest and steal browser information (history, passwords, etc) 34->97 99 Tries to steal Crypto Currency Wallets 34->99 39 build.exe 14 7 34->39         started        file17 signatures18 process19 dnsIp20 79 78.141.214.73, 49807, 49809, 80 AS-CHOOPAUS France 39->79 81 icanhazip.com 104.22.18.188, 49806, 49808, 80 CLOUDFLARENETUS United States 39->81 101 Antivirus detection for dropped file 39->101 103 Multi AV Scanner detection for dropped file 39->103 105 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 39->105 107 3 other signatures 39->107 43 schtasks.exe 39->43         started        45 svchost.exe 39->45         started        signatures21 process22 process23 47 conhost.exe 43->47         started       
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2021-05-14 14:35:07 UTC
AV detection:
17 of 29 (58.62%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of UnmapMainImage
Program crash
Deletes itself
Loads dropped DLL
Executes dropped EXE
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
http://khaleelahmed.com/upload/
http://twvickiassociation.com/upload/
http://www20833.com/upload/
http://cocinasintonterias.com/upload/
http://masaofukunaga.com/upload/
http://gnckids.com/upload/
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_smokeloader_a2
Author:pnx

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe 207633ae06d66e10fafea8daea7a683e555b56ccf2ac6c9062fa5ede6e3ee32b

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-14 15:08:10 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [C0003.001] Communication Micro-objective::Create Pipe::Interprocess Communication
1) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
2) [C0021.004] Cryptography Micro-objective::RC4 PRGA::Generate Pseudo-random Sequence
3) [C0045] File System Micro-objective::Copy File
4) [C0049] File System Micro-objective::Get File Attributes
5) [C0051] File System Micro-objective::Read File
6) [C0052] File System Micro-objective::Writes File
7) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
8) [C0040] Process Micro-objective::Allocate Thread Local Storage
9) [C0043] Process Micro-objective::Check Mutex
10) [C0041] Process Micro-objective::Set Thread Local Storage Value
11) [C0018] Process Micro-objective::Terminate Process