MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 40e7d0c9f2e846c55ab450848c817c58c1423ec2f9af57595fc8a829af63fa63. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 40e7d0c9f2e846c55ab450848c817c58c1423ec2f9af57595fc8a829af63fa63
SHA3-384 hash: f214a2762beffb53e52eb7931096ecc21a130d06f689e376c99a198191f468bf29023e1b58c6430593817f418cc7ca45
SHA1 hash: f0e7eb239555ca6d35645ef2f9c8972f4c6945a3
MD5 hash: 36157d5e337748f90187c4d02e08d8a9
humanhash: coffee-beer-coffee-fifteen
File name:8351f8d6706e5fd316edb6ac296df3b6
Download: download sample
Signature Smoke Loader
File size:163'840 bytes
First seen:2020-11-17 12:12:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 56a7962f46adbe8366bcec27ea5f2542 (2 x ArkeiStealer, 1 x Smoke Loader, 1 x Ramnit)
ssdeep 3072:jhWXLFcO1sQRhUmDCJi/NlcABMrIflDoLMel2YO9Ssx5WKpnu:aFcOKQRZDVNlv/0LMyBoT
Threatray 193 similar samples on MalwareBazaar
TLSH 22F39D1134E5C0B2D5E7157B8070C7B05EBBBC672B726D8F2B9532B84F35AE1962130A
Reporter seifreed
Tags:Smoke Loader

Intelligence


File Origin
# of uploads :
1
# of downloads :
59
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file in the %temp% directory
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Deleting of the original file
Enabling autorun by creating a file
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2020-11-17 12:17:34 UTC
AV detection:
25 of 28 (89.29%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of UnmapMainImage
Deletes itself
Loads dropped DLL
SmokeLoader
Malware Config
C2 Extraction:
http://vot552.com/upload/
http://offce221.com/upload/
http://lavanda.best/upload/
http://kinolive.best/upload/
Unpacked files
SH256 hash:
40e7d0c9f2e846c55ab450848c817c58c1423ec2f9af57595fc8a829af63fa63
MD5 hash:
36157d5e337748f90187c4d02e08d8a9
SHA1 hash:
f0e7eb239555ca6d35645ef2f9c8972f4c6945a3
SH256 hash:
710c50026519950c3781a642c94a48a412cbd023eff8dff60d715a022867f6fb
MD5 hash:
93006eeec334d77cc38e530fcd3ce9b8
SHA1 hash:
1202c127dfaaaf07052f0c2ee9d7b95e7e533bc7
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments