MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 288bdb52e7a511af92d68c3baec8d10ff18c2bde1d973a7ed1e947f56abdf2c0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 288bdb52e7a511af92d68c3baec8d10ff18c2bde1d973a7ed1e947f56abdf2c0
SHA3-384 hash: 066266668e2c55bf4e66a2ff15a0e2abdff9daf931374a1a49b6286132fe89a45a0356cfb86c688203ba7f99f1ba8628
SHA1 hash: a313187d2aad15e496bbdeb5d26db4f4e979727e
MD5 hash: 283f649245bbb929988121ef164da2da
humanhash: summer-football-fish-kansas
File name:Tax Invoice - INV00016490.xll
Download: download sample
Signature Smoke Loader
File size:580'096 bytes
First seen:2022-03-14 18:55:00 UTC
Last seen:2022-04-20 09:52:24 UTC
File type:Excel file xll
MIME type:application/x-dosexec
imphash f20a8db3e4a8c03c1ab177b2660fdd78 (4 x Smoke Loader, 3 x AgentTesla, 2 x Gozi)
ssdeep 12288:azLjlZHAt+AZrkOCH8bzbBSreYOi1uWD242S6+4k:azLhltAdkjcX1LDWeS6Z
Threatray 73 similar samples on MalwareBazaar
TLSH T1EFC4AE57F6D77A65E6AFC1BAC6B1C92C66B3309612B0C3CE7B4055492D22392483DB0F
Reporter abuse_ch
Tags:Smoke Loader xll

Intelligence


File Origin
# of uploads :
3
# of downloads :
155
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
Office Add-Ins - Suspicious
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.GenericML
Status:
Malicious
First seen:
2022-03-14 13:36:40 UTC
File Type:
PE+ (Dll)
Extracted files:
3
AV detection:
12 of 27 (44.44%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Program crash
Drops file in System32 directory
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
SmokeLoader
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments