MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 510be444b9535b0d81562414c330f864d3842dc868b37e2f1c0b6ce6594afe7d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 17


Intelligence 17 IOCs YARA 1 File information Comments

SHA256 hash: 510be444b9535b0d81562414c330f864d3842dc868b37e2f1c0b6ce6594afe7d
SHA3-384 hash: 5ec91bf70bff0b13fb6451495c724255e10ebc458a15587b888cb612b65be26f0e956629a3cd9a45c40e74c1a947a332
SHA1 hash: dea08ef8451daf795a42bd11f0d82ac78cf06fa0
MD5 hash: 4fa6db5bee6f864996fcd186a90de62c
humanhash: fish-mexico-east-august
File name:4fa6db5bee6f864996fcd186a90de62c.exe
Download: download sample
Signature Smoke Loader
File size:279'040 bytes
First seen:2023-12-02 16:52:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f109daeffa34d8a3742c87df9b7731c0 (4 x Smoke Loader, 1 x Stealc, 1 x Tofsee)
ssdeep 3072:kRq1/WcoG5mP9PonpM1XLby5kQzUX558:w6B5ml5pQ4A
TLSH T1DC54A45392F17D44E9268B729F2EE6EC775DF6608F8A7B69221C9E1F00B1172C263710
TrID 37.3% (.EXE) Win64 Executable (generic) (10523/12/4)
17.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
16.0% (.EXE) Win32 Executable (generic) (4505/5/1)
7.3% (.ICL) Windows Icons Library (generic) (2059/9)
7.2% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 0018d4c084b0a480 (1 x Smoke Loader)
Reporter abuse_ch
Tags:exe Smoke Loader

Intelligence


File Origin
# of uploads :
1
# of downloads :
304
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4fa6db5bee6f864996fcd186a90de62c.exe
Verdict:
Malicious activity
Analysis date:
2023-12-02 17:05:53 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Gathering data
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm azorult greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Babuk, Clipboard Hijacker, DCRat, Djvu,
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops PE files to the user root directory
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found ransom note / readme
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes a notice file (html or txt) to demand a ransom
Yara detected Babuk Ransomware
Yara detected Clipboard Hijacker
Yara detected DCRat
Yara detected Djvu Ransomware
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1352147 Sample: s6n00Z3C86.exe Startdate: 02/12/2023 Architecture: WINDOWS Score: 100 152 zexeq.com 2->152 154 transfer.sh 2->154 156 8 other IPs or domains 2->156 184 Snort IDS alert for network traffic 2->184 186 Multi AV Scanner detection for domain / URL 2->186 188 Found malware configuration 2->188 190 18 other signatures 2->190 15 s6n00Z3C86.exe 2->15         started        18 fssseii 2->18         started        20 21C.exe 2->20         started        22 mstsca.exe 2->22         started        signatures3 process4 signatures5 248 Detected unpacking (changes PE section rights) 15->248 250 Contains functionality to inject code into remote processes 15->250 252 Injects a PE file into a foreign processes 15->252 24 s6n00Z3C86.exe 15->24         started        254 Multi AV Scanner detection for dropped file 18->254 27 fssseii 18->27         started        256 Detected unpacking (overwrites its own PE header) 20->256 29 21C.exe 20->29         started        process6 signatures7 218 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 24->218 220 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 24->220 222 Maps a DLL or memory area into another process 24->222 31 explorer.exe 45 18 24->31 injected 224 Checks if the current machine is a virtual machine (disk enumeration) 27->224 226 Creates a thread in another existing process (thread injection) 27->226 process8 dnsIp9 170 89.104.67.117, 49745, 80 RU-CENTER-ASRU Russian Federation 31->170 172 lb.zenjabba.com 208.99.62.242, 443, 49735 ST-BGPUS Reserved 31->172 174 4 other IPs or domains 31->174 112 C:\Users\user\AppData\Roaming\fssseii, PE32 31->112 dropped 114 C:\Users\user\AppData\Local\Temp\DCE0.exe, PE32 31->114 dropped 116 C:\Users\user\AppData\Local\Temp\5F52.exe, PE32 31->116 dropped 118 4 other malicious files 31->118 dropped 176 System process connects to network (likely due to code injection or exploit) 31->176 178 Benign windows process drops PE files 31->178 180 Deletes itself after installation 31->180 182 Hides that the sample has been downloaded from the Internet (zone.identifier) 31->182 36 5F52.exe 31->36         started        40 21C.exe 31->40         started        42 DCE0.exe 8 4 31->42         started        45 5 other processes 31->45 file10 signatures11 process12 dnsIp13 122 C:\Users\user\Desktop\xcVmCPny.log, PE32 36->122 dropped 124 C:\Users\user\Desktop\woReRCrA.log, PE32 36->124 dropped 126 C:\Users\user\Desktop\vrqWvCcG.log, PE32 36->126 dropped 128 20 other malicious files 36->128 dropped 192 Antivirus detection for dropped file 36->192 194 Machine Learning detection for dropped file 36->194 210 2 other signatures 36->210 47 cmd.exe 36->47         started        196 Multi AV Scanner detection for dropped file 40->196 198 Detected unpacking (changes PE section rights) 40->198 200 Detected unpacking (overwrites its own PE header) 40->200 212 2 other signatures 40->212 49 21C.exe 1 15 40->49         started        158 38.47.221.193, 34368, 49725 COGENT-174US United States 42->158 202 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 42->202 204 Query firmware table information (likely to detect VMs) 42->204 206 Tries to detect sandboxes and other dynamic analysis tools (window names) 42->206 214 3 other signatures 42->214 160 20.96.123.147 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 45->160 162 176.123.7.190 ALEXHOSTMD Moldova Republic of 45->162 208 Found many strings related to Crypto-Wallets (likely being stolen) 45->208 216 2 other signatures 45->216 53 conhost.exe 45->53         started        55 reg.exe 1 1 45->55         started        57 conhost.exe 45->57         started        59 2 other processes 45->59 file14 signatures15 process16 dnsIp17 61 5F52.exe 47->61         started        65 conhost.exe 47->65         started        150 api.2ip.ua 104.21.65.24, 443, 49734, 49741 CLOUDFLARENETUS United States 49->150 120 C:\Users\user\AppData\Local\...\21C.exe, PE32 49->120 dropped 67 21C.exe 49->67         started        69 icacls.exe 49->69         started        file18 process19 file20 134 C:\Windows\SchCache\ctfmon.exe, PE32 61->134 dropped 136 C:\Users\user\Desktop\yZdEtzIc.log, PE32 61->136 dropped 138 C:\Users\user\Desktop\sxyNiZXs.log, PE32 61->138 dropped 140 25 other malicious files 61->140 dropped 244 Adds a directory exclusion to Windows Defender 61->244 71 cmd.exe 61->71         started        73 powershell.exe 61->73         started        75 powershell.exe 61->75         started        82 16 other processes 61->82 246 Injects a PE file into a foreign processes 67->246 77 21C.exe 67->77         started        signatures21 process22 dnsIp23 99 2 other processes 71->99 84 conhost.exe 73->84         started        86 conhost.exe 75->86         started        168 zexeq.com 14.33.209.147, 49746, 49747, 80 KIXS-AS-KRKoreaTelecomKR Korea Republic of 77->168 142 C:\Users\user\AppData\Local\...\build3[1].exe, PE32 77->142 dropped 144 C:\Users\user\AppData\Local\...\build2[1].exe, PE32 77->144 dropped 146 C:\Users\user\AppData\Local\...\build3.exe, PE32 77->146 dropped 148 8 other malicious files 77->148 dropped 258 Modifies existing user documents (likely ransomware behavior) 77->258 88 build3.exe 77->88         started        91 build2.exe 77->91         started        93 conhost.exe 82->93         started        95 conhost.exe 82->95         started        97 conhost.exe 82->97         started        101 13 other processes 82->101 file24 signatures25 process26 signatures27 228 Antivirus detection for dropped file 88->228 230 Multi AV Scanner detection for dropped file 88->230 232 Detected unpacking (changes PE section rights) 88->232 240 2 other signatures 88->240 103 build3.exe 88->103         started        234 Machine Learning detection for dropped file 91->234 236 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 91->236 238 Injects a PE file into a foreign processes 91->238 106 build2.exe 91->106         started        process28 dnsIp29 130 C:\Users\user\AppData\Roaming\...\mstsca.exe, PE32 103->130 dropped 110 schtasks.exe 103->110         started        164 t.me 149.154.167.99, 443, 49749 TELEGRAMRU United Kingdom 106->164 166 116.202.184.4, 49755, 49757, 49758 HETZNER-ASDE Germany 106->166 132 C:\Users\user\AppData\...\sqlite3[1].dll, PE32 106->132 dropped 242 Tries to harvest and steal browser information (history, passwords, etc) 106->242 file30 signatures31 process32
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2023-12-01 04:35:10 UTC
File Type:
PE (Exe)
Extracted files:
73
AV detection:
25 of 37 (67.57%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader botnet:pu10 backdoor trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Program crash
Suspicious use of SetThreadContext
Deletes itself
SmokeLoader
Malware Config
C2 Extraction:
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
f3d6234e9f0a06d62a42df2860289adefaaf239782a25dc9bd2191aae0b40594
MD5 hash:
d6f5920dfcf53e57c229b6dbf86a6fcd
SHA1 hash:
8a8f60601bd8b454807d5b8d8bc4273c26a97a2a
Detections:
SmokeLoaderStage2 win_smokeloader_a2
Parent samples :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 hash:
510be444b9535b0d81562414c330f864d3842dc868b37e2f1c0b6ce6594afe7d
MD5 hash:
4fa6db5bee6f864996fcd186a90de62c
SHA1 hash:
dea08ef8451daf795a42bd11f0d82ac78cf06fa0
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe 510be444b9535b0d81562414c330f864d3842dc868b37e2f1c0b6ce6594afe7d

(this sample)

  
Delivery method
Distributed via web download

Comments