MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 24b66c0d6f26f5de09b4cb7a2496bf87ad0ed9d45e846870dee70941b565bc3c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 17


Intelligence 17 IOCs YARA File information Comments

SHA256 hash: 24b66c0d6f26f5de09b4cb7a2496bf87ad0ed9d45e846870dee70941b565bc3c
SHA3-384 hash: d1f67cf5114f9930e23fed86bf38d08b9302e668a4ba37361a9cad13074d4239df066e08d0afac6e82b3a55bdfc5581c
SHA1 hash: 9834dc9a4fd1f037c574c27a932c96d68409c882
MD5 hash: 12382062c6abc23ebdf6aec25f383fa4
humanhash: monkey-massachusetts-juliet-carolina
File name:WEXTRACT.exe
Download: download sample
Signature Smoke Loader
File size:1'617'408 bytes
First seen:2023-12-28 05:11:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 49152:/I4a/fuUWyY2dhl3pmcmVFSD2TDi+SyEU/6QB4:wx/GUxmVoJvyR/6R
Threatray 2'577 similar samples on MalwareBazaar
TLSH T174752356E2F84971C9336F700AF616531336BC93D835866D3396A84A0EF16C5F1B23AB
TrID 41.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
22.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
7.5% (.EXE) Win64 Executable (generic) (10523/12/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter adm1n_usa32
Tags:exe Smoke Loader WEXTRACT

Intelligence


File Origin
# of uploads :
1
# of downloads :
321
Origin country :
RO RO
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a service
Creating a file
Sending a custom TCP request
Creating a window
Сreating synchronization primitives
Launching cmd.exe command interpreter
Running batch commands
Behavior that indicates a threat
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Setting a single autorun event
Forced shutdown of a system process
Blocking the Windows Defender launch
Disabling the operating system update service
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer installer lolbin lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Babadeda, Mystic Stealer, RedLin
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Sample uses string decryption to hide its real strings
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey
Yara detected Amadey bot
Yara detected Amadeys stealer DLL
Yara detected Babadeda
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1367569 Sample: WEXTRACT.exe Startdate: 28/12/2023 Architecture: WINDOWS Score: 100 126 Found malware configuration 2->126 128 Malicious sample detected (through community Yara rule) 2->128 130 Antivirus detection for URL or domain 2->130 132 18 other signatures 2->132 12 WEXTRACT.exe 1 4 2->12         started        15 explothe.exe 2->15         started        17 explothe.exe 2->17         started        19 2 other processes 2->19 process3 file4 100 C:\Users\user\AppData\Local\...\Rw4YT03.exe, PE32 12->100 dropped 102 C:\Users\user\AppData\Local\...\7ct2pQ14.exe, PE32 12->102 dropped 21 Rw4YT03.exe 1 4 12->21         started        process5 file6 88 C:\Users\user\AppData\Local\...\nf4rn60.exe, PE32 21->88 dropped 90 C:\Users\user\AppData\Local\...\6dg6UC8.exe, PE32 21->90 dropped 134 Antivirus detection for dropped file 21->134 136 Multi AV Scanner detection for dropped file 21->136 138 Machine Learning detection for dropped file 21->138 25 nf4rn60.exe 1 4 21->25         started        29 6dg6UC8.exe 21->29         started        signatures7 process8 file9 96 C:\Users\user\AppData\Local\...\FJ4OU94.exe, PE32 25->96 dropped 98 C:\Users\user\AppData\Local\...\5NS8xD0.exe, PE32 25->98 dropped 156 Antivirus detection for dropped file 25->156 158 Multi AV Scanner detection for dropped file 25->158 160 Machine Learning detection for dropped file 25->160 31 FJ4OU94.exe 1 4 25->31         started        35 5NS8xD0.exe 25->35         started        signatures10 process11 file12 108 C:\Users\user\AppData\Local\...\kK0yG24.exe, PE32 31->108 dropped 110 C:\Users\user\AppData\Local\...\4ew995pG.exe, PE32 31->110 dropped 120 Antivirus detection for dropped file 31->120 122 Multi AV Scanner detection for dropped file 31->122 124 Machine Learning detection for dropped file 31->124 37 kK0yG24.exe 1 4 31->37         started        41 4ew995pG.exe 31->41         started        112 C:\Users\user\AppData\Local\...\explothe.exe, PE32 35->112 dropped 43 explothe.exe 35->43         started        signatures13 process14 dnsIp15 92 C:\Users\user\AppData\Local\...\qP5Qb44.exe, PE32 37->92 dropped 94 C:\Users\user\AppData\Local\...\3Hm09Ej.exe, PE32 37->94 dropped 140 Antivirus detection for dropped file 37->140 142 Multi AV Scanner detection for dropped file 37->142 144 Machine Learning detection for dropped file 37->144 46 qP5Qb44.exe 1 4 37->46         started        50 3Hm09Ej.exe 37->50         started        146 Writes to foreign memory regions 41->146 148 Allocates memory in foreign processes 41->148 150 Injects a PE file into a foreign processes 41->150 52 AppLaunch.exe 2 41->52         started        55 AppLaunch.exe 41->55         started        118 77.91.124.1, 80 ECOTEL-ASRU Russian Federation 43->118 152 Creates an undocumented autostart registry key 43->152 154 Uses schtasks.exe or at.exe to add and modify task schedules 43->154 57 cmd.exe 43->57         started        59 schtasks.exe 43->59         started        file16 signatures17 process18 dnsIp19 104 C:\Users\user\AppData\Local\...\2Ro9432.exe, PE32 46->104 dropped 106 C:\Users\user\AppData\Local\...\1rs14bk1.exe, PE32 46->106 dropped 178 Antivirus detection for dropped file 46->178 180 Multi AV Scanner detection for dropped file 46->180 182 Machine Learning detection for dropped file 46->182 61 1rs14bk1.exe 46->61         started        64 2Ro9432.exe 46->64         started        184 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 50->184 186 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 50->186 188 Maps a DLL or memory area into another process 50->188 190 2 other signatures 50->190 66 explorer.exe 13 2 50->66 injected 116 77.91.124.86, 19084, 49729, 49734 ECOTEL-ASRU Russian Federation 52->116 69 conhost.exe 57->69         started        71 cmd.exe 57->71         started        73 cacls.exe 57->73         started        77 4 other processes 57->77 75 conhost.exe 59->75         started        file20 signatures21 process22 dnsIp23 162 Multi AV Scanner detection for dropped file 61->162 164 Contains functionality to inject code into remote processes 61->164 166 Writes to foreign memory regions 61->166 168 Injects a PE file into a foreign processes 61->168 79 AppLaunch.exe 9 1 61->79         started        170 Antivirus detection for dropped file 64->170 172 Machine Learning detection for dropped file 64->172 174 Allocates memory in foreign processes 64->174 82 AppLaunch.exe 64->82         started        114 77.91.68.29, 49737, 80 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 66->114 176 System process connects to network (likely due to code injection or exploit) 66->176 84 rundll32.exe 66->84         started        86 rundll32.exe 66->86         started        signatures24 process25 signatures26 192 Modifies windows update settings 79->192 194 Disables Windows Defender Tamper protection 79->194 196 Disable Windows Defender notifications (registry) 79->196 198 Disable Windows Defender real time protection (registry) 79->198
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2023-10-30 23:50:12 UTC
File Type:
PE (Exe)
Extracted files:
226
AV detection:
17 of 23 (73.91%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:amadey family:dcrat family:mystic family:redline family:smokeloader botnet:grome backdoor brand:google brand:paypal evasion infostealer persistence phishing rat stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Enumerates system info in registry
Modifies Internet Explorer settings
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Detected potential entity reuse from brand paypal.
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Amadey
DcRat
Detect Mystic stealer payload
Detected google phishing page
Modifies Windows Defender Real-time Protection settings
Mystic
RedLine
RedLine payload
SmokeLoader
Malware Config
C2 Extraction:
http://77.91.68.29/fks/
77.91.124.86:19084
http://77.91.124.1
Unpacked files
SH256 hash:
160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1
MD5 hash:
22b50c95b39cbbdb00d5a4cd3d4886bd
SHA1 hash:
db8326c4fad0064ce3020226e8556e7cce8ce04e
Detections:
INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender
SH256 hash:
2e2692ae0f3da1a0aa708513de5f860c7725d9c401e5be4c881f641598c89616
MD5 hash:
4d9a8301dbe7de79dbe09f1257eaddab
SHA1 hash:
30078c5fa3f4e01b791474512110c4a91e066496
Detections:
SmokeLoaderStage2 win_smokeloader_a2
SH256 hash:
757476f7f5adaf82e3f061138482ef0f55cb807fb98513d907f7a6e16c2187bc
MD5 hash:
a99acc7432955bac28c2ab68404cad63
SHA1 hash:
a31dee2fb7731a906d1ae0df499c79de7c583484
SH256 hash:
e27404515cd6a130a6b63be6cf84b0056f71d5c5f5032cc2135b739f382f5d36
MD5 hash:
8b7928dee4bdefae026bcf0b2c6812bc
SHA1 hash:
60a96c86790c2b8b1a34572754205368a5348c09
SH256 hash:
2289e037478dd296cc5f34f954c1743ca6a13ca6ced6f9e6530e95a92028b442
MD5 hash:
cf41f3e7d2f67c992919436229bb4d83
SHA1 hash:
8849509bd35506d1bb550a32b33cca89e7336c32
Detections:
SUSP_Imphash_Mar23_3
SH256 hash:
24b66c0d6f26f5de09b4cb7a2496bf87ad0ed9d45e846870dee70941b565bc3c
MD5 hash:
12382062c6abc23ebdf6aec25f383fa4
SHA1 hash:
9834dc9a4fd1f037c574c27a932c96d68409c882
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments