MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 404afd3c18b203aa9ce9f8f5f9b7a813fda0d2a322252cd28e002e142080a4f7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 18


Intelligence 18 IOCs YARA 4 File information Comments

SHA256 hash: 404afd3c18b203aa9ce9f8f5f9b7a813fda0d2a322252cd28e002e142080a4f7
SHA3-384 hash: f1ca5b7ea56f61be14e22da513a2a2a71cc4b16c6f87f858f2e702a5021e4ca4124fd465d45f70d562a6d0911de0ca42
SHA1 hash: e50592a1e1734166e0de086260abeb600fcc4b63
MD5 hash: 574bb24987d6ee22f7813b2dd21b272b
humanhash: six-mississippi-stream-five
File name:file
Download: download sample
Signature Smoke Loader
File size:208'384 bytes
First seen:2024-01-05 11:54:13 UTC
Last seen:2024-01-05 13:00:03 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 13c13daaeabbf99c3add1e933fb88baa (1 x Stealc, 1 x Smoke Loader)
ssdeep 3072:MROnyLlGWfuN2AqLRhVDJMGzMAdWx+23XEef4wDQWZr:MRqyLkgJvrDMGzMAdq+cQw/
TLSH T12D149ED7A6E96C93E9274A328D7EDAF4762EF9134F46635B12187A1F09702F1C263301
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 0008ccc8a284c4c0 (1 x Smoke Loader)
Reporter andretavare5
Tags:exe Smoke Loader


Avatar
andretavare5
Sample downloaded from http://emgvod.com/emd/index.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
324
Origin country :
US US
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
404afd3c18b203aa9ce9f8f5f9b7a813fda0d2a322252cd28e002e142080a4f7.exe
Verdict:
Malicious activity
Analysis date:
2024-01-05 12:33:24 UTC
Tags:
loader smoke smokeloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP GET request
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
lolbin packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
LummaC, BazaLoader, LummaC Stealer, Smok
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to detect sleep reduction / modifications
Creates a thread in another existing process (thread injection)
Delayed program exit found
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Downloads files with wrong headers with respect to MIME Content-Type
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files to the user root directory
Drops PE files with benign system names
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May use the Tor software to hide its network traffic
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potentially malicious time measurement code found
Query firmware table information (likely to detect VMs)
Sigma detected: Schedule system process
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected BazaLoader
Yara detected LummaC Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1370308 Sample: file.exe Startdate: 05/01/2024 Architecture: WINDOWS Score: 100 89 gxutc2c.com 2->89 91 carstirgapcheatdeposwte.pw 2->91 93 a0897335.xsph.ru 2->93 115 Snort IDS alert for network traffic 2->115 117 Multi AV Scanner detection for domain / URL 2->117 119 Found malware configuration 2->119 121 18 other signatures 2->121 13 file.exe 2->13         started        16 dgreivw 2->16         started        signatures3 process4 signatures5 161 Detected unpacking (changes PE section rights) 13->161 163 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 13->163 165 Maps a DLL or memory area into another process 13->165 167 Creates a thread in another existing process (thread injection) 13->167 18 explorer.exe 6 7 13->18 injected 169 Multi AV Scanner detection for dropped file 16->169 171 Machine Learning detection for dropped file 16->171 173 Checks if the current machine is a virtual machine (disk enumeration) 16->173 process6 dnsIp7 95 gxutc2c.com 175.119.10.231, 49718, 49719, 49720 SKB-ASSKBroadbandCoLtdKR Korea Republic of 18->95 97 45.82.13.158, 49737, 49739, 49742 SIRINFO-ASIT Russian Federation 18->97 99 2 other IPs or domains 18->99 69 C:\Users\user\AppData\Roaming\dgreivw, PE32 18->69 dropped 71 C:\Users\user\AppData\Local\Temp\7CA0.exe, PE32+ 18->71 dropped 73 C:\Users\user\AppData\Local\Temp\2F7B.exe, PE32+ 18->73 dropped 75 C:\Users\user\...\dgreivw:Zone.Identifier, ASCII 18->75 dropped 123 System process connects to network (likely due to code injection or exploit) 18->123 125 Benign windows process drops PE files 18->125 127 Deletes itself after installation 18->127 129 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->129 23 2F7B.exe 44 18->23         started        27 7CA0.exe 18->27         started        file8 signatures9 process10 file11 79 C:\Windows \System32\WINMM.dll, PE32+ 23->79 dropped 81 C:\Windows \System32\winSAT.exe, PE32+ 23->81 dropped 137 Detected unpacking (overwrites its own PE header) 23->137 139 Machine Learning detection for dropped file 23->139 141 Found Tor onion address 23->141 149 4 other signatures 23->149 29 winSAT.exe 1 23->29         started        31 winSAT.exe 23->31         started        83 C:\Users\user\TseYctAbhGnspNi.pdf, PE32 27->83 dropped 85 C:\Users\user\MclaFZSORzeigay.pdf, PE32 27->85 dropped 143 Drops PE files to the user root directory 27->143 145 Writes to foreign memory regions 27->145 147 Allocates memory in foreign processes 27->147 151 3 other signatures 27->151 33 Au3Check.exe 27->33         started        signatures12 process13 dnsIp14 37 2F7B.exe 76 29->37         started        41 conhost.exe 29->41         started        87 carstirgapcheatdeposwte.pw 172.67.142.124, 443, 49765, 49766 CLOUDFLARENETUS United States 33->87 107 Query firmware table information (likely to detect VMs) 33->107 109 Found many strings related to Crypto-Wallets (likely being stolen) 33->109 111 Tries to harvest and steal browser information (history, passwords, etc) 33->111 113 Tries to steal Crypto Currency Wallets 33->113 signatures15 process16 file17 77 C:\Windows\System\svchost.exe, PE32+ 37->77 dropped 131 Found Tor onion address 37->131 133 Drops executables to the windows directory (C:\Windows) and starts them 37->133 135 Adds a directory exclusion to Windows Defender 37->135 43 svchost.exe 37->43         started        47 powershell.exe 23 37->47         started        49 powershell.exe 23 37->49         started        51 2 other processes 37->51 signatures18 process19 dnsIp20 101 45.66.33.45, 443, 49755 SPECTRENL Netherlands 43->101 103 142.4.213.88, 443, 49750 OVHFR Canada 43->103 105 10 other IPs or domains 43->105 153 System process connects to network (likely due to code injection or exploit) 43->153 155 Detected unpacking (overwrites its own PE header) 43->155 157 Machine Learning detection for dropped file 43->157 159 2 other signatures 43->159 53 powershell.exe 43->53         started        55 powershell.exe 43->55         started        57 conhost.exe 47->57         started        59 conhost.exe 49->59         started        61 conhost.exe 51->61         started        63 conhost.exe 51->63         started        signatures21 process22 process23 65 conhost.exe 53->65         started        67 conhost.exe 55->67         started       
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2024-01-05 11:55:05 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
18 of 23 (78.26%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader botnet:pub2 backdoor trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Uses Task Scheduler COM API
Deletes itself
Downloads MZ/PE file
SmokeLoader
Malware Config
C2 Extraction:
http://gxutc2c.com/tmp/index.php
http://proekt8.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://pirateking.online/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Unpacked files
SH256 hash:
383d07797727802747eeefbc189944bc8438460e492752063d4b899659264e54
MD5 hash:
9bcde9dfa26981ec609bf45b3494e78a
SHA1 hash:
23d424a8dbd67eb4337500271eab6d125ce98702
Detections:
SmokeLoaderStage2 win_smokeloader_a2
SH256 hash:
404afd3c18b203aa9ce9f8f5f9b7a813fda0d2a322252cd28e002e142080a4f7
MD5 hash:
574bb24987d6ee22f7813b2dd21b272b
SHA1 hash:
e50592a1e1734166e0de086260abeb600fcc4b63
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments