MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4ba5c87a94c9929e51c3c8c09b45d8a70fda5e1518691c979b770d64bec3cf4d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 16


Intelligence 16 IOCs YARA 1 File information Comments

SHA256 hash: 4ba5c87a94c9929e51c3c8c09b45d8a70fda5e1518691c979b770d64bec3cf4d
SHA3-384 hash: f2a3685f60f55d54e77bee890b200fd353add469343207a881965afec4f224e5e7b088c0c822ec1d8980a0b435662830
SHA1 hash: 57f6639214c0585ac2ca94c1fe4ec9dd7c42267d
MD5 hash: 9f034c7e35bd5ac25923a93605d516cf
humanhash: august-eight-indigo-lion
File name:9f034c7e35bd5ac25923a93605d516cf.exe
Download: download sample
Signature Smoke Loader
File size:275'456 bytes
First seen:2024-02-23 14:57:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash eece28fa725ed1cdfebc98e3f9f15000 (1 x Smoke Loader)
ssdeep 3072:LKKN3V681HJ6hLz1elSSUfaZ99u9wHxa+cty1FFxofkKaqUjlg5bAZ8:W69A5ek847+1Zx4kKy+A
TLSH T13C444A1392E17D91EB668B729E2EC6F8369EF5704F59776B22188E2F04B4173C223711
TrID 37.3% (.EXE) Win64 Executable (generic) (10523/12/4)
17.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
15.9% (.EXE) Win32 Executable (generic) (4504/4/1)
7.3% (.ICL) Windows Icons Library (generic) (2059/9)
7.1% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 3032313020647133 (1 x Smoke Loader)
Reporter abuse_ch
Tags:exe Smoke Loader

Intelligence


File Origin
# of uploads :
1
# of downloads :
383
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Connection attempt
Sending an HTTP POST request
Connection attempt to an infection source
Sending an HTTP GET request
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
fingerprint lolbin packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
SmokeLoader, Vidar
Detection:
malicious
Classification:
troj.evad.spyw
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to register a low level keyboard hook
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Drops PE files with a suspicious file extension
Found API chain indicative of sandbox detection
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected AntiVM3
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1397720 Sample: fRhC9IDQga.exe Startdate: 23/02/2024 Architecture: WINDOWS Score: 100 98 wearethebestin2024.com 2->98 100 sjyey.com 2->100 102 4 other IPs or domains 2->102 116 Snort IDS alert for network traffic 2->116 118 Multi AV Scanner detection for domain / URL 2->118 120 Found malware configuration 2->120 122 11 other signatures 2->122 15 fRhC9IDQga.exe 2->15         started        18 avjtuud 2->18         started        20 wscript.exe 2->20         started        22 explorer.exe 39 146 2->22         started        signatures3 process4 signatures5 142 Detected unpacking (changes PE section rights) 15->142 144 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 15->144 146 Maps a DLL or memory area into another process 15->146 148 Creates a thread in another existing process (thread injection) 15->148 24 explorer.exe 12 6 15->24 injected 150 Multi AV Scanner detection for dropped file 18->150 152 Machine Learning detection for dropped file 18->152 154 Checks if the current machine is a virtual machine (disk enumeration) 18->154 156 Windows Scripting host queries suspicious COM object (likely to drop second stage) 20->156 29 SecureSphereR.pif 20->29         started        158 Query firmware table information (likely to detect VMs) 22->158 process6 dnsIp7 104 wearethebestin2024.com 198.252.102.119, 443, 49741 HAWKHOSTCA Canada 24->104 106 sjyey.com 95.107.163.44, 49735, 49736, 49737 ASC-AL-ASAL Albania 24->106 78 C:\Users\user\AppData\Roaming\avjtuud, PE32 24->78 dropped 80 C:\Users\user\AppData\Local\Temp3A1.exe, PE32 24->80 dropped 82 C:\Users\user\...\avjtuud:Zone.Identifier, ASCII 24->82 dropped 132 System process connects to network (likely due to code injection or exploit) 24->132 134 Benign windows process drops PE files 24->134 136 Deletes itself after installation 24->136 138 Hides that the sample has been downloaded from the Internet (zone.identifier) 24->138 31 E3A1.exe 10 24->31         started        file8 signatures9 process10 file11 94 C:\Users\user\AppData\Local\Temp\...\Worm, DOS 31->94 dropped 96 C:\Users\user\AppData\Local\Temp\...\Compound, PE32 31->96 dropped 114 Contains functionality to register a low level keyboard hook 31->114 35 cmd.exe 1 31->35         started        38 conhost.exe 31->38         started        signatures12 process13 signatures14 124 Uses ping.exe to sleep 35->124 126 Drops PE files with a suspicious file extension 35->126 128 Uses ping.exe to check the status of other devices and networks 35->128 40 Sagem.pif 1 35->40         started        43 PING.EXE 1 35->43         started        46 cmd.exe 2 35->46         started        49 7 other processes 35->49 process15 dnsIp16 130 Found API chain indicative of sandbox detection 40->130 51 cmd.exe 40->51         started        108 127.0.0.1 unknown unknown 43->108 84 C:\Users\user\AppData\Local\...\Sagem.pif, PE32 46->84 dropped file17 signatures18 process19 process20 53 E3A1.exe 51->53         started        56 conhost.exe 51->56         started        file21 74 C:\Users\user\AppData\Local\Temp\...\Worm, DOS 53->74 dropped 76 C:\Users\user\AppData\Local\Temp\...\Compound, PE32 53->76 dropped 58 cmd.exe 53->58         started        process22 signatures23 140 Uses ping.exe to sleep 58->140 61 Sagem.pif 58->61         started        66 cmd.exe 58->66         started        68 conhost.exe 58->68         started        70 7 other processes 58->70 process24 dnsIp25 110 142.132.224.223, 49791, 49792, 49793 UNIVERSITYOFWINNIPEG-ASNCA Canada 61->110 112 t.me 149.154.167.99, 443, 49790 TELEGRAMRU United Kingdom 61->112 86 C:\Users\user\AppData\...\SecureSphereR.pif, PE32 61->86 dropped 88 C:\Users\user\AppData\Local\...\sqlm[1].dll, PE32 61->88 dropped 90 C:\Users\user\AppData\...\SecureSphereR.js, ASCII 61->90 dropped 160 Detected unpacking (creates a PE file in dynamic memory) 61->160 162 Found API chain indicative of sandbox detection 61->162 164 Drops PE files with a suspicious file extension 61->164 166 3 other signatures 61->166 72 schtasks.exe 61->72         started        92 C:\Users\user\AppData\Local\...\Sagem.pif, PE32 66->92 dropped file26 signatures27 process28
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2024-02-23 14:58:07 UTC
File Type:
PE (Exe)
Extracted files:
46
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader botnet:pub1 backdoor trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Deletes itself
Executes dropped EXE
SmokeLoader
Malware Config
C2 Extraction:
http://sjyey.com/tmp/index.php
http://babonwo.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Unpacked files
SH256 hash:
c397c95a266d8cd0e9d4ec771d7556e08f6e30b87562a2722eac3b80e99937f1
MD5 hash:
19520192dc420be42658e333466870e7
SHA1 hash:
7d299e6b632bf115ceea4edded34518d8f1d4404
Detections:
SmokeLoaderStage2 win_smokeloader_a2
SH256 hash:
4ba5c87a94c9929e51c3c8c09b45d8a70fda5e1518691c979b770d64bec3cf4d
MD5 hash:
9f034c7e35bd5ac25923a93605d516cf
SHA1 hash:
57f6639214c0585ac2ca94c1fe4ec9dd7c42267d
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe 4ba5c87a94c9929e51c3c8c09b45d8a70fda5e1518691c979b770d64bec3cf4d

(this sample)

  
Delivery method
Distributed via web download

Comments