MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 22d1c9fff60aa2736eb351ba23eeafe4a2abd0d7144693066b2b392862c9e209. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 22d1c9fff60aa2736eb351ba23eeafe4a2abd0d7144693066b2b392862c9e209
SHA3-384 hash: 48df7795c493b00dc243807d474636a0042ddf3537e5821d330131a058c8818c41a7c043dbbc34fcc6d99be977f09c4b
SHA1 hash: a1b4b37b727dffdccd8f62fe7b5b5d164e83ea31
MD5 hash: a76bc7f546c4423ef67f11625578abc6
humanhash: uranus-pizza-sixteen-bakerloo
File name:a76bc7f546c4423ef67f11625578abc6.exe
Download: download sample
Signature Smoke Loader
File size:348'672 bytes
First seen:2021-07-29 15:01:46 UTC
Last seen:2021-07-29 16:05:55 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f69d275c0dda431bea9e1980bd7b9759 (1 x Smoke Loader, 1 x DanaBot, 1 x GCleaner)
ssdeep 6144:vPdL2D/MKVDgEynzog/dydqsEvu49ws8TIpXfYAss:9L2bMKVDgEy0g/dUBFTIpgX
Threatray 2'546 similar samples on MalwareBazaar
TLSH T170748E30B690C038E5B716F845B6D37CA82D7EA25B3450CBA2E536EE56356E4DC3039B
dhash icon ead8a89cc6e68ee0 (43 x RaccoonStealer, 31 x RedLineStealer, 20 x Smoke Loader)
Reporter abuse_ch
Tags:Dofoil exe Smoke Loader

Intelligence


File Origin
# of uploads :
2
# of downloads :
232
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a76bc7f546c4423ef67f11625578abc6.exe
Verdict:
Suspicious activity
Analysis date:
2021-07-29 15:04:46 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon RedLine SmokeLoader Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DLL reload attack detected
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Obfuscated command line found
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to resolve many domain names, but no domain seems valid
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 456343 Sample: seH7cBPXgW.exe Startdate: 29/07/2021 Architecture: WINDOWS Score: 100 64 nusurtal4f.net 2->64 66 api.ip.sb 2->66 68 6 other IPs or domains 2->68 86 Antivirus detection for URL or domain 2->86 88 System process connects to network (likely due to code injection or exploit) 2->88 90 DLL reload attack detected 2->90 94 9 other signatures 2->94 10 seH7cBPXgW.exe 2->10         started        13 hbhriht 2->13         started        signatures3 92 Tries to resolve many domain names, but no domain seems valid 66->92 process4 signatures5 106 Detected unpacking (changes PE section rights) 10->106 15 seH7cBPXgW.exe 10->15         started        108 Contains functionality to inject code into remote processes 13->108 110 Injects a PE file into a foreign processes 13->110 18 hbhriht 13->18         started        process6 signatures7 136 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 15->136 138 Maps a DLL or memory area into another process 15->138 140 Checks if the current machine is a virtual machine (disk enumeration) 15->140 20 explorer.exe 3 30 15->20 injected 142 Creates a thread in another existing process (thread injection) 18->142 process8 dnsIp9 70 readinglistforjuly9.xyz 20->70 72 readinglistforjuly8.xyz 20->72 74 13 other IPs or domains 20->74 38 C:\Users\user\AppData\Roaming\hbhriht, PE32 20->38 dropped 40 C:\Users\user\AppData\Local\Temp\B3C0.exe, PE32 20->40 dropped 42 C:\Users\user\AppData\Local\Temp\A835.exe, PE32 20->42 dropped 44 12 other files (5 malicious) 20->44 dropped 96 System process connects to network (likely due to code injection or exploit) 20->96 98 Benign windows process drops PE files 20->98 100 Performs DNS queries to domains with low reputation 20->100 104 4 other signatures 20->104 25 A835.exe 20->25         started        30 94AA.exe 92 20->30         started        32 A100.exe 14 3 20->32         started        34 2 other processes 20->34 file10 102 Tries to resolve many domain names, but no domain seems valid 72->102 signatures11 process12 dnsIp13 76 telete.in 195.201.225.248, 443, 49720 HETZNER-ASDE Germany 25->76 78 34.141.84.7, 49721, 80 ATGS-MMD-ASUS United States 25->78 46 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 25->46 dropped 48 C:\Users\user\AppData\...\vcruntime140.dll, PE32 25->48 dropped 50 C:\Users\user\AppData\...\ucrtbase.dll, PE32 25->50 dropped 60 56 other files (none is malicious) 25->60 dropped 112 Detected unpacking (changes PE section rights) 25->112 114 Detected unpacking (overwrites its own PE header) 25->114 116 Tries to steal Mail credentials (via file access) 25->116 80 xeronxikxxx.tumblr.com 30->80 82 116.202.183.50, 49719, 80 HETZNER-ASDE Germany 30->82 84 xeronxikxxx.tumblr.com 74.114.154.18, 443, 49718 AUTOMATTICUS Canada 30->84 52 C:\Users\user\AppData\...\vcruntime140[1].dll, PE32 30->52 dropped 54 C:\Users\user\AppData\...\mozglue[1].dll, PE32 30->54 dropped 56 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 30->56 dropped 62 9 other files (none is malicious) 30->62 dropped 118 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 30->118 120 Tries to harvest and steal browser information (history, passwords, etc) 30->120 122 Tries to steal Crypto Currency Wallets 30->122 124 Query firmware table information (likely to detect VMs) 32->124 126 Tries to detect sandboxes and other dynamic analysis tools (window names) 32->126 128 Hides threads from debuggers 32->128 130 Tries to detect sandboxes / dynamic malware analysis system (registry check) 32->130 36 conhost.exe 32->36         started        58 C:\Users\user\AppData\Local\...\98F1.exe.log, ASCII 34->58 dropped 132 Sample uses process hollowing technique 34->132 file14 134 Tries to resolve many domain names, but no domain seems valid 80->134 signatures15 process16
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-07-29 15:02:06 UTC
AV detection:
16 of 28 (57.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:loaderbot family:raccoon family:redline family:smokeloader family:vidar botnet:29kush botnet:408 botnet:824 botnet:828 botnet:cd8dc1031358b1aec55cc6bc447df1018b068607 botnet:solovey backdoor discovery evasion infostealer loader miner persistence spyware stealer suricata themida trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry class
Modifies system certificate store
Runs ping.exe
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Checks BIOS information in registry
Deletes itself
Drops startup file
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Themida packer
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
LoaderBot executable
Vidar Stealer
LoaderBot
Raccoon
Raccoon Stealer Payload
RedLine
RedLine Payload
SmokeLoader
Vidar
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
Malware Config
C2 Extraction:
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
http://nusurtal4f.net/
http://netomishnetojuk.net/
http://escalivrouter.net/
http://nick22doom4.net/
http://wrioshtivsio.su/
http://nusotiso4.su/
http://rickkhtovkka.biz/
http://palisotoliso.net/
https://xeronxikxxx.tumblr.com/
salanoajalio.xyz:80
193.188.22.4:45689
Unpacked files
SH256 hash:
8ac5259909dbe5f2072c1806f3438f9740dbb4ba8f8f786925a643e73f58e73a
MD5 hash:
5fd3463632f363a8adcf7105209eb6ec
SHA1 hash:
0a2aa8aea269d9580ba623add2af44fea45c2714
SH256 hash:
22d1c9fff60aa2736eb351ba23eeafe4a2abd0d7144693066b2b392862c9e209
MD5 hash:
a76bc7f546c4423ef67f11625578abc6
SHA1 hash:
a1b4b37b727dffdccd8f62fe7b5b5d164e83ea31
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe 22d1c9fff60aa2736eb351ba23eeafe4a2abd0d7144693066b2b392862c9e209

(this sample)

  
Delivery method
Distributed via web download

Comments