MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5531490b3951e8793cb6ee449f75d6fb0b5c1347d1197ccda7ff1b9b15cf9661. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: 5531490b3951e8793cb6ee449f75d6fb0b5c1347d1197ccda7ff1b9b15cf9661
SHA3-384 hash: feae3439eb53d52aa55c8ec1dcf2b2c31155d3524f7cf2d4ebc5d94ab44f89f7ecc117d3b41a971109bad65ff6f8dc2f
SHA1 hash: 547b0af6d1f0abcea19160d361c4f2e605c3b864
MD5 hash: d4310c99d42ad36aed4679860c1c368b
humanhash: three-uniform-lion-william
File name:file
Download: download sample
Signature Smoke Loader
File size:390'082 bytes
First seen:2023-04-05 14:59:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'510 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 6144:x/QiQXCvJm+ksmpk3U9jW1U4P9b4OGBfj/WUplm6zIOYQNd28pTXdAmpCLVRZogE:pQi3vs6m6URA3Ph4lL//plmW9bTXeVh8
Threatray 292 similar samples on MalwareBazaar
TLSH T14A841292F7E54839D072CFB01C50DA62483B79655DBCA50873ECAD8F9F3B681825A783
TrID 75.1% (.EXE) Inno Setup installer (109740/4/30)
9.7% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.0% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter jstrosch
Tags:exe Smoke Loader

Intelligence


File Origin
# of uploads :
1
# of downloads :
235
Origin country :
US US
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-04-05 15:04:12 UTC
Tags:
installer loader evasion smoke trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
DNS request
Sending an HTTP GET request
Creating a process with a hidden window
Sending a custom TCP request
Connecting to a non-recommended domain
Sending an HTTP POST request
Creating a file in the Program Files subdirectories
Creating a file
Searching for the window
Searching for synchronization primitives
Adding an access-denied ACE
Using the Windows Management Instrumentation requests
Launching cmd.exe command interpreter
Launching the default Windows debugger (dwwin.exe)
Running batch commands
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Setting a single autorun event
Launching a tool to kill processes
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware installer overlay packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Fabookie, Nymaim, SmokeLoader, Socelars
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sets debug register (to hijack the execution of another thread)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Fabookie
Yara detected Generic Downloader
Yara detected Nymaim
Yara detected SmokeLoader
Yara detected Socelars
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 841940 Sample: file.exe Startdate: 05/04/2023 Architecture: WINDOWS Score: 100 112 45.12.253.56 CMCSUS Germany 2->112 114 45.12.253.72 CMCSUS Germany 2->114 116 7 other IPs or domains 2->116 140 Snort IDS alert for network traffic 2->140 142 Multi AV Scanner detection for domain / URL 2->142 144 Malicious sample detected (through community Yara rule) 2->144 146 15 other signatures 2->146 12 file.exe 2 2->12         started        16 Pavoqyshafae.exe 18 2->16         started        19 Pavoqyshafae.exe 2->19         started        signatures3 process4 dnsIp5 90 C:\Users\user\AppData\Local\Temp\...\file.tmp, PE32 12->90 dropped 164 Obfuscated command line found 12->164 21 file.tmp 3 19 12->21         started        100 uchiha.s3.pl-waw.scw.cloud 16->100 102 senju.s3.pl-waw.scw.cloud 16->102 104 2 other IPs or domains 16->104 file6 signatures7 process8 dnsIp9 118 link.storjshare.io 185.244.226.4, 443, 49705, 49706 NETCUP-ASnetcupGmbHDE unknown 21->118 74 C:\Users\user\AppData\Local\Temp\...\rt.exe, PE32 21->74 dropped 76 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 21->76 dropped 78 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 21->78 dropped 80 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 21->80 dropped 25 rt.exe 22 18 21->25         started        file10 process11 dnsIp12 120 n8w5.c12.e2-1.dev 25->120 122 link.storjshare.io 25->122 124 5 other IPs or domains 25->124 82 C:\Users\user\AppData\...82oxexozheby.exe, PE32 25->82 dropped 84 C:\Program Files (x86)\...\Pavoqyshafae.exe, PE32 25->84 dropped 86 C:\Users\user\...86oxexozheby.exe.config, XML 25->86 dropped 88 C:\...\Pavoqyshafae.exe.config, XML 25->88 dropped 148 Creates HTML files with .exe extension (expired dropper behavior) 25->148 150 Machine Learning detection for dropped file 25->150 30 Noxexozheby.exe 14 13 25->30         started        file13 signatures14 process15 dnsIp16 126 www.countlist.top 30->126 128 host-file-host6.com 185.246.221.154, 49734, 49747, 80 LVLT-10753US Germany 30->128 130 9 other IPs or domains 30->130 92 C:\Users\user\AppData\Local\Temp\...\ss29.exe, PE32+ 30->92 dropped 94 C:\Users\user\AppData\Local\...\gcleaner.exe, PE32 30->94 dropped 96 C:\Users\user\AppData\Local\...\handdiy_3.exe, PE32 30->96 dropped 98 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 30->98 dropped 132 Antivirus detection for dropped file 30->132 134 Multi AV Scanner detection for dropped file 30->134 136 May check the online IP address of the machine 30->136 138 2 other signatures 30->138 35 cmd.exe 30->35         started        37 cmd.exe 30->37         started        39 cmd.exe 30->39         started        41 cmd.exe 30->41         started        file17 signatures18 process19 process20 43 toolspub2.exe 35->43         started        46 conhost.exe 35->46         started        48 ss29.exe 37->48         started        51 conhost.exe 37->51         started        53 gcleaner.exe 39->53         started        55 conhost.exe 39->55         started        57 handdiy_3.exe 41->57         started        59 conhost.exe 41->59         started        dnsIp21 152 Detected unpacking (changes PE section rights) 43->152 154 Machine Learning detection for dropped file 43->154 61 toolspub2.exe 43->61         started        106 bz.bbbeioaag.com 103.100.211.218, 49733, 80 HKKFGL-AS-APHKKwaifongGroupLimitedHK Hong Kong 48->106 156 Detected unpacking (creates a PE file in dynamic memory) 48->156 158 Tries to harvest and steal browser information (history, passwords, etc) 48->158 160 Detected unpacking (overwrites its own PE header) 53->160 64 WerFault.exe 53->64         started        66 WerFault.exe 53->66         started        68 WerFault.exe 53->68         started        72 2 other processes 53->72 108 www.ippfinfo.top 178.18.252.110, 443, 49735 INLINE-ASDE Germany 57->108 110 iplogger.org 57->110 162 May check the online IP address of the machine 57->162 70 WerFault.exe 57->70         started        signatures22 process23 signatures24 166 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 61->166 168 Checks if the current machine is a virtual machine (disk enumeration) 61->168
Threat name:
Win32.Trojan.Nymaim
Status:
Malicious
First seen:
2023-04-05 15:00:09 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:ffdroider family:gcleaner family:smokeloader family:socelars botnet:pub2 backdoor evasion loader persistence spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Enumerates system info in registry
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies system certificate store
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Drops file in Drivers directory
Checks for common network interception software
FFDroider
GCleaner
SmokeLoader
Socelars
Socelars payload
Malware Config
C2 Extraction:
https://hdbywe.s3.us-west-2.amazonaws.com/dfgg320/
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
74376e903fc6467c4fec382d66835b446870688150a3e0b339d81b406ef6bdcb
MD5 hash:
d96302805d7f5be0eb3db99f2838c070
SHA1 hash:
7f9fa5478a6702ee5d5d969a57e30c6b47b95aee
SH256 hash:
5531490b3951e8793cb6ee449f75d6fb0b5c1347d1197ccda7ff1b9b15cf9661
MD5 hash:
d4310c99d42ad36aed4679860c1c368b
SHA1 hash:
547b0af6d1f0abcea19160d361c4f2e605c3b864
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Suspicious_Macro_Presence
Author:Mehmet Ali Kerimoglu (CYB3RMX)
Description:This rule detects common malicious/suspicious implementations.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe 5531490b3951e8793cb6ee449f75d6fb0b5c1347d1197ccda7ff1b9b15cf9661

(this sample)

  
Delivery method
Distributed via web download

Comments