MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2bf758ec68ee38fb0e7bc577e3f8f0e3be2da66e73ccfb1328b8da6a496840c9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 16


Intelligence 16 IOCs YARA 1 File information Comments

SHA256 hash: 2bf758ec68ee38fb0e7bc577e3f8f0e3be2da66e73ccfb1328b8da6a496840c9
SHA3-384 hash: e7ad8fc1f0f3e5cb3e90cf2c3e7ab8c7a2135df5e107c80a3af1cb8e5a1339ffb7feb12dd3cc9f78181ae14c7117f690
SHA1 hash: 8e3bbf0f0a899b8bb2eac42830081aff222a87a8
MD5 hash: 27fdfbc4a5388e3c43fb79d75ee2b048
humanhash: crazy-south-aspen-mexico
File name:27fdfbc4a5388e3c43fb79d75ee2b048.exe
Download: download sample
Signature Smoke Loader
File size:176'640 bytes
First seen:2024-07-03 05:45:00 UTC
Last seen:2024-07-03 06:35:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a2f98760372f92ec7255c044ca187eb8 (2 x Smoke Loader)
ssdeep 3072:1t50LNHDm3D6u39Efajf33A3lXhPtP5vtLgvl1KuU3:D50LNHDUD6uyA3AbDCvS7
Threatray 2'313 similar samples on MalwareBazaar
TLSH T1EE04375177F6D026FFF78B311A74A2941A3BBC637A7481AEA650324E0E33AD18D61713
TrID 67.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
12.2% (.EXE) Win64 Executable (generic) (10523/12/4)
5.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.2% (.EXE) Win32 Executable (generic) (4504/4/1)
2.4% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 9671e896ccd0d4cc (9 x Smoke Loader, 3 x Stealc, 2 x Tofsee)
Reporter abuse_ch
Tags:exe Smoke Loader

Intelligence


File Origin
# of uploads :
2
# of downloads :
366
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2bf758ec68ee38fb0e7bc577e3f8f0e3be2da66e73ccfb1328b8da6a496840c9.exe
Verdict:
Malicious activity
Analysis date:
2024-07-03 05:49:24 UTC
Tags:
loader smokeloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
epmicrosoft_visual_cc fingerprint microsoft_visual_cc packed smokeloader
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
LummaC, Poverty Stealer, SmokeLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected LummaC Stealer
Yara detected Poverty Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1466592 Sample: LXbM8RbhLa.exe Startdate: 03/07/2024 Architecture: WINDOWS Score: 100 112 Found malware configuration 2->112 114 Malicious sample detected (through community Yara rule) 2->114 116 Antivirus detection for dropped file 2->116 118 11 other signatures 2->118 12 LXbM8RbhLa.exe 2->12         started        15 ervhhuc 2->15         started        process3 signatures4 152 Detected unpacking (changes PE section rights) 12->152 154 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->154 156 Maps a DLL or memory area into another process 12->156 17 explorer.exe 79 10 12->17 injected 158 Checks if the current machine is a virtual machine (disk enumeration) 15->158 160 Creates a thread in another existing process (thread injection) 15->160 162 Switches to a custom stack to bypass stack traces 15->162 process5 dnsIp6 94 201.110.238.249 UninetSAdeCVMX Mexico 17->94 96 185.68.16.7 UKRAINE-ASUA Ukraine 17->96 98 2 other IPs or domains 17->98 70 C:\Users\user\AppData\Roaming\ervhhuc, PE32 17->70 dropped 72 C:\Users\user\AppData\Local\TempDA0.exe, PE32 17->72 dropped 74 C:\Users\user\AppData\Local\Temp\C9EB.exe, PE32 17->74 dropped 76 2 other malicious files 17->76 dropped 120 System process connects to network (likely due to code injection or exploit) 17->120 122 Benign windows process drops PE files 17->122 124 Deletes itself after installation 17->124 126 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->126 22 C9EB.exe 3 35 17->22         started        26 A50C.exe 17->26         started        29 EDA0.exe 12 17->29         started        file7 signatures8 process9 dnsIp10 78 C:\Users\user\AppData\Local\Temp\setup.exe, PE32 22->78 dropped 80 C:\Users\user\AppData\Local\...\blowfish.dll, PE32 22->80 dropped 82 C:\Users\user\AppData\Local\...\huge[1].dat, PE32 22->82 dropped 84 2 other files (none is malicious) 22->84 dropped 134 Antivirus detection for dropped file 22->134 136 Multi AV Scanner detection for dropped file 22->136 31 setup.exe 112 22->31         started        104 188.114.96.3 CLOUDFLARENETUS European Union 26->104 138 Query firmware table information (likely to detect VMs) 26->138 140 Machine Learning detection for dropped file 26->140 142 Found many strings related to Crypto-Wallets (likely being stolen) 26->142 150 3 other signatures 26->150 106 146.70.169.164 TENET-1ZA United Kingdom 29->106 108 104.192.141.1 AMAZON-02US United States 29->108 144 Detected unpacking (creates a PE file in dynamic memory) 29->144 146 Found evasive API chain (may stop execution after checking mutex) 29->146 148 Tries to harvest and steal browser information (history, passwords, etc) 29->148 file11 signatures12 process13 file14 86 C:\Users\user\AppData\...\vulkan-1.dll, PE32 31->86 dropped 88 C:\Users\user\AppData\...\vk_swiftshader.dll, PE32 31->88 dropped 90 C:\Users\user\AppData\...\libGLESv2.dll, PE32 31->90 dropped 92 16 other files (13 malicious) 31->92 dropped 110 Antivirus detection for dropped file 31->110 35 GamePall.exe 31->35         started        signatures15 process16 dnsIp17 100 104.21.45.251 CLOUDFLARENETUS United States 35->100 128 Antivirus detection for dropped file 35->128 130 Multi AV Scanner detection for dropped file 35->130 132 Machine Learning detection for dropped file 35->132 39 GamePall.exe 35->39         started        41 GamePall.exe 35->41         started        44 GamePall.exe 35->44         started        46 5 other processes 35->46 signatures18 process19 dnsIp20 48 GamePall.exe 39->48         started        50 GamePall.exe 39->50         started        52 GamePall.exe 39->52         started        54 9 other processes 39->54 102 1.1.1.1 CLOUDFLARENETUS Australia 41->102 process21 process22 56 GamePall.exe 48->56         started        58 GamePall.exe 48->58         started        60 GamePall.exe 48->60         started        62 GamePall.exe 48->62         started        64 GamePall.exe 50->64         started        66 GamePall.exe 50->66         started        68 GamePall.exe 50->68         started       
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2024-07-02 23:14:43 UTC
File Type:
PE (Exe)
Extracted files:
19
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader botnet:pub2 backdoor trojan
Behaviour
Checks SCSI registry key(s)
Program crash
SmokeLoader
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe 2bf758ec68ee38fb0e7bc577e3f8f0e3be2da66e73ccfb1328b8da6a496840c9

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::FindFirstVolumeA
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::WriteConsoleA
KERNEL32.dll::ReadConsoleOutputA
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleAliasExesLengthW
KERNEL32.dll::GetConsoleAliasesW
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileA
KERNEL32.dll::SetVolumeMountPointW
WIN_BASE_USER_APIRetrieves Account InformationKERNEL32.dll::GetComputerNameW

Comments