MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Smoke Loader
Vendor detections: 17
| SHA256 hash: | 53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c |
|---|---|
| SHA3-384 hash: | d31ef9271605d06520aeefc462008cb46d76dd676f13b389132d612d0082716d41d72f7604e39fbcbcbce95a629c91d2 |
| SHA1 hash: | 1c0b7ebe21c9abac3416ed32b1238c8607090f4d |
| MD5 hash: | 53801a0bcd9199d21c20df467beee881 |
| humanhash: | twenty-sink-cat-mango |
| File name: | 53801a0bcd9199d21c20df467beee881.exe |
| Download: | download sample |
| Signature | Smoke Loader |
| File size: | 324'096 bytes |
| First seen: | 2024-03-21 19:36:10 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 22d51019ef926c7d67891a16d936728c (3 x Smoke Loader, 3 x Stealc, 1 x Glupteba) |
| ssdeep | 3072:z0iD5S2RZihP2+ccK+EXWkDo/jXnKw3MrMhLv1tmoL7XMwY1olXM4Q6d:FHON2ZW9n3M6vN7ZYi |
| Threatray | 2'168 similar samples on MalwareBazaar |
| TLSH | T1D9646A0371D1EC71E46247358E2CA9EC372EFCA69D259B5733483E4F28B11A1DA27B52 |
| TrID | 37.3% (.EXE) Win64 Executable (generic) (10523/12/4) 17.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 15.9% (.EXE) Win32 Executable (generic) (4504/4/1) 7.3% (.ICL) Windows Icons Library (generic) (2059/9) 7.1% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | 0000208051211808 (1 x Smoke Loader) |
| Reporter | |
| Tags: | exe Smoke Loader |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Unpacked files
53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c
4f6b05e7e7c2c51a1cf5569a47a8bf31f8d452359f5a37bcecd36ef3f852c858
b6c6e0ed6e5aa62baec8de42d2d8fee52df072c6a2b33530fbf8bc73d36309a9
f79fad860397942a2d808e1d2b5601f7d3b2af5057195507b782d797be07f301
edfdb10a739d1951f076ba691d2328a51d7187e93f7c26197c471a30cd6d07f3
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | USER32.dll::SetUserObjectSecurity |
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CloseHandle |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::FindNextVolumeMountPointW KERNEL32.dll::LoadLibraryW KERNEL32.dll::LoadLibraryExW KERNEL32.dll::GetVolumeInformationA KERNEL32.dll::GetStartupInfoW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::FreeConsole KERNEL32.dll::PeekConsoleInputW KERNEL32.dll::ReadConsoleA KERNEL32.dll::ReadConsoleOutputCharacterW KERNEL32.dll::SetStdHandle |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateFileW KERNEL32.dll::GetWindowsDirectoryW KERNEL32.dll::RemoveDirectoryW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::QueryDosDeviceW |
| WIN_HTTP_API | Uses HTTP services | WINHTTP.dll::WinHttpOpen |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.