MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2ab7e6e873e7c7b1bde654551484678ea53b4ec4a20a5058a7508fc254e2146d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Smoke Loader
Vendor detections: 17
| SHA256 hash: | 2ab7e6e873e7c7b1bde654551484678ea53b4ec4a20a5058a7508fc254e2146d |
|---|---|
| SHA3-384 hash: | fdfa4aa4378fbca6e2e3b6b0ad9e0080400228d9d0ee3a4cbfc70bcf30652ecbabb67faee74da0fc82b5cf827093ddcb |
| SHA1 hash: | bb840897f9d6cb92ed7e56585f507c8ce5b3410f |
| MD5 hash: | d36332be897a501db1745c49e24f54e2 |
| humanhash: | kilo-cat-purple-lake |
| File name: | d36332be897a501db1745c49e24f54e2.exe |
| Download: | download sample |
| Signature | Smoke Loader |
| File size: | 295'936 bytes |
| First seen: | 2024-03-13 13:10:26 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 7a8f5ae038d7b13c87e3685d6f9a4e7a (1 x Smoke Loader, 1 x LummaStealer) |
| ssdeep | 3072:y+hYvpQawiypIiIlrePe4hMh1u7LQggGaT9J0irfUoAou9ZxKZZti6LJS7ae:y9Ga/ykhehteZvXcBou8XQ61A |
| TLSH | T1B854CF433AE8C4F9E5B346314C34D9540A3FBCA26A75899B7398371F69352C0AE36763 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4504/4/1) |
| File icon (PE): | |
| dhash icon | 08191a3870e4c000 (1 x Smoke Loader) |
| Reporter | |
| Tags: | exe Smoke Loader |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Unpacked files
53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c
4f6b05e7e7c2c51a1cf5569a47a8bf31f8d452359f5a37bcecd36ef3f852c858
b6c6e0ed6e5aa62baec8de42d2d8fee52df072c6a2b33530fbf8bc73d36309a9
f79fad860397942a2d808e1d2b5601f7d3b2af5057195507b782d797be07f301
edfdb10a739d1951f076ba691d2328a51d7187e93f7c26197c471a30cd6d07f3
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CloseHandle |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::FindNextVolumeMountPointW KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryW KERNEL32.dll::LoadLibraryExW KERNEL32.dll::GetVolumeInformationW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::AddConsoleAliasW KERNEL32.dll::AttachConsole KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleInputW KERNEL32.dll::ReadConsoleA KERNEL32.dll::ReadConsoleW |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CreateDirectoryA KERNEL32.dll::CreateFileA KERNEL32.dll::CreateFileW KERNEL32.dll::GetWindowsDirectoryW KERNEL32.dll::RemoveDirectoryW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::QueryDosDeviceW |
| WIN_HTTP_API | Uses HTTP services | WINHTTP.dll::WinHttpOpen |
| WIN_USER_API | Performs GUI Actions | USER32.dll::ActivateKeyboardLayout |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.