MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3afe01534a7b396016185fcbd28aeca02a10bb84c82603286ca663c7b994b3ea. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 15


Intelligence 15 IOCs YARA 6 File information Comments

SHA256 hash: 3afe01534a7b396016185fcbd28aeca02a10bb84c82603286ca663c7b994b3ea
SHA3-384 hash: 3193ad2facf4053f2655cf21e3a08e0321e341e2c011f1a113b8def504b80d8a6354f4072a30736279253df27751dbfa
SHA1 hash: e846a45862ae97a9ab671e67d22881cec4720dda
MD5 hash: 87f903e0878c0dae7646a412a4d60e42
humanhash: zebra-missouri-saturn-bravo
File name:setup3.exe
Download: download sample
Signature Smoke Loader
File size:242'176 bytes
First seen:2024-09-14 10:10:10 UTC
Last seen:2024-09-14 10:37:36 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1d1ec441fe0c255b7bd79f009a10a8a3 (1 x Smoke Loader, 1 x Stealc)
ssdeep 3072:LacJUV+XiTZS1lG4nlY5RFBPnOyL0u5i1qYIjMKIvGKla8GKlaJalNuCdhG:+cJUVG6Sy4u5BPnOxugRv/z7uW
TLSH T1C6344B0162F16639F2B74B309E39EAE716AFF872ADB5925D310E5A1F3C312518B41F12
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
File icon (PE):PE icon
dhash icon 12716d4cf4d4c4c4 (1 x Smoke Loader, 1 x LummaStealer, 1 x Stealc)
Reporter aachum
Tags:exe Smoke Loader


Avatar
iamaachum
olivergboxz.zone/ge5hnjg3/setup3.exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
397
Origin country :
ES ES
Vendor Threat Intelligence
Verdict:
Malicious
Score:
70%
Tags:
Network Stealth
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
epmicrosoft_visual_cc fingerprint microsoft_visual_cc packed smokeloader
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
LummaC, Amadey, LummaC Stealer, SmokeLoa
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Drops large PE files
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_StartupCommand, often done to detect sandboxes)
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1511205 Sample: setup3.exe Startdate: 14/09/2024 Architecture: WINDOWS Score: 100 97 tenntysjuxmz.shop 2->97 99 stitchmiscpaew.shop 2->99 101 12 other IPs or domains 2->101 145 Suricata IDS alerts for network traffic 2->145 147 Found malware configuration 2->147 149 Malicious sample detected (through community Yara rule) 2->149 151 15 other signatures 2->151 15 setup3.exe 2->15         started        18 ijhhjsg 2->18         started        20 uuhhjsg 2->20         started        22 2 other processes 2->22 signatures3 process4 signatures5 171 Detected unpacking (changes PE section rights) 15->171 173 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 15->173 175 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 15->175 24 explorer.exe 61 14 15->24 injected 177 Multi AV Scanner detection for dropped file 18->177 179 Machine Learning detection for dropped file 18->179 181 Maps a DLL or memory area into another process 18->181 183 Checks if the current machine is a virtual machine (disk enumeration) 20->183 185 Creates a thread in another existing process (thread injection) 20->185 187 Switches to a custom stack to bypass stack traces 20->187 189 Injects a PE file into a foreign processes 22->189 29 Hkbsse.exe 22->29         started        process6 dnsIp7 109 2.185.214.11, 49817, 49834, 49860 TCIIR Iran (ISLAMIC Republic Of) 24->109 111 calvinandhalls.com 23.145.40.162, 443, 49749, 49750 SURFAIRWIRELESS-IN-01US Reserved 24->111 113 3 other IPs or domains 24->113 77 C:\Users\user\AppData\Roaming\uuhhjsg, PE32 24->77 dropped 79 C:\Users\user\AppData\Roaming\ijhhjsg, PE32 24->79 dropped 81 C:\Users\user\AppData\Local\Temp\FDDB.exe, PE32 24->81 dropped 83 4 other malicious files 24->83 dropped 163 System process connects to network (likely due to code injection or exploit) 24->163 165 Benign windows process drops PE files 24->165 167 Injects code into the Windows Explorer (explorer.exe) 24->167 169 3 other signatures 24->169 31 53DE.exe 1 2 24->31         started        35 FDDB.exe 24->35         started        37 846C.exe 2 24->37         started        39 7 other processes 24->39 file8 signatures9 process10 dnsIp11 95 C:\Users\user\Pictures\...\USBAgent.exe, PE32 31->95 dropped 117 Multi AV Scanner detection for dropped file 31->117 119 Detected unpacking (creates a PE file in dynamic memory) 31->119 137 3 other signatures 31->137 42 53DE.exe 4 31->42         started        121 Detected unpacking (changes PE section rights) 35->121 123 Machine Learning detection for dropped file 35->123 139 5 other signatures 35->139 125 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 37->125 127 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 37->127 129 Queries sensitive service information (via WMI, Win32_StartupCommand, often done to detect sandboxes) 37->129 45 cmd.exe 37->45         started        103 basedsymsotp.shop 104.21.78.130, 443, 49738 CLOUDFLARENETUS United States 39->103 105 stitchmiscpaew.shop 172.67.136.135, 443, 49745 CLOUDFLARENETUS United States 39->105 107 3 other IPs or domains 39->107 131 Antivirus detection for dropped file 39->131 133 System process connects to network (likely due to code injection or exploit) 39->133 135 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 39->135 141 4 other signatures 39->141 file12 signatures13 process14 file15 85 C:\Users\user\AppData\Local\...\Hkbsse.exe, PE32 42->85 dropped 47 Hkbsse.exe 1 42->47         started        50 WMIC.exe 45->50         started        52 conhost.exe 45->52         started        54 WMIC.exe 45->54         started        56 4 other processes 45->56 process16 signatures17 191 Multi AV Scanner detection for dropped file 47->191 193 Detected unpacking (creates a PE file in dynamic memory) 47->193 195 Injects a PE file into a foreign processes 47->195 58 Hkbsse.exe 47->58         started        197 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 50->197 process18 dnsIp19 115 5.181.86.244, 49755, 49756, 49757 DINET-ASRU Ukraine 58->115 87 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 58->87 dropped 89 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 58->89 dropped 91 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 58->91 dropped 93 C:\Users\user\AppData\Local\...\cred64[1].dll, PE32+ 58->93 dropped 62 rundll32.exe 58->62         started        64 rundll32.exe 58->64         started        file20 process21 signatures22 67 rundll32.exe 62->67         started        143 System process connects to network (likely due to code injection or exploit) 64->143 process23 signatures24 153 Tries to steal Instant Messenger accounts or passwords 67->153 155 Uses netsh to modify the Windows network and firewall settings 67->155 157 Tries to harvest and steal ftp login credentials 67->157 159 2 other signatures 67->159 70 powershell.exe 67->70         started        73 netsh.exe 67->73         started        process25 signatures26 161 Loading BitLocker PowerShell Module 70->161 75 conhost.exe 73->75         started        process27
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader botnet:pub3 backdoor discovery trojan
Behaviour
Checks SCSI registry key(s)
Program crash
System Location Discovery: System Language Discovery
SmokeLoader
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
93af4cc041a8352939e0ee5662ae235bbe2ab1022e5801f850ed870f27139188
MD5 hash:
fe0be0a8ef242e9f8587e3b914fbcbac
SHA1 hash:
f7c06d6374d134c287247afddd6b3f3f2ad443e9
Detections:
SmokeLoaderStage2 win_smokeloader_a2
SH256 hash:
3afe01534a7b396016185fcbd28aeca02a10bb84c82603286ca663c7b994b3ea
MD5 hash:
87f903e0878c0dae7646a412a4d60e42
SHA1 hash:
e846a45862ae97a9ab671e67d22881cec4720dda
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Active
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:pe_detect_tls_callbacks

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe 3afe01534a7b396016185fcbd28aeca02a10bb84c82603286ca663c7b994b3ea

(this sample)

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetVolumeInformationW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::FillConsoleOutputCharacterW
KERNEL32.dll::WriteConsoleOutputA
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::SetConsoleTitleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleAliasExesLengthA
KERNEL32.dll::GetConsoleAliasesLengthA
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleAliasesW
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CopyFileExA
KERNEL32.dll::CreateDirectoryA
KERNEL32.dll::CreateFileW
KERNEL32.dll::GetFileAttributesA
WIN_BASE_USER_APIRetrieves Account InformationKERNEL32.dll::GetComputerNameA
KERNEL32.dll::GetComputerNameW
KERNEL32.dll::QueryDosDeviceA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyA

Comments