MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5967f1aef118ddfcd1d14d5cf3f29a62a845052c9ed9ce91587c0015b1047c58. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 11 File information Comments

SHA256 hash: 5967f1aef118ddfcd1d14d5cf3f29a62a845052c9ed9ce91587c0015b1047c58
SHA3-384 hash: ee4c1fb8398968badd2af3a3498267c1960bb0fa43bd66a15057385d646be25f6b235eb4cb904dcbfa39e4edd792fa73
SHA1 hash: 7c1ddc294d0d9214c1e07ba239d24ffd2a01854d
MD5 hash: c9b742fa61ccc9b3afa7217f3bfe2590
humanhash: oven-uranus-tennis-nuts
File name:setup_x86_x64_install.exe
Download: download sample
Signature Smoke Loader
File size:4'504'365 bytes
First seen:2021-09-18 21:31:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:yd8iiNNx5pZY4557wRh2douD+1LKghCJQr1Wc5ALH:ydlixZY45Ghv1h3v6LH
Threatray 558 similar samples on MalwareBazaar
TLSH T10F2633FF25DCEC36C44613B275FAA5C38EBB858EA8A503D8BC81D9993079314E70558E
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter Anonymous
Tags:exe Smoke Loader

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://179.43.187.185/ https://threatfox.abuse.ch/ioc/223391/

Intelligence


File Origin
# of uploads :
1
# of downloads :
212
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Result
Threat name:
RedLine Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates HTML files with .exe extension (expired dropper behavior)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Drops PE files with a suspicious file extension
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Costura Assembly Loader
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 485795 Sample: setup_x86_x64_install.exe Startdate: 19/09/2021 Architecture: WINDOWS Score: 100 78 194.87.138.49 MYLOC-ASIPBackboneofmyLocmanagedITAGDE Russian Federation 2->78 80 20.189.173.21 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->80 82 4 other IPs or domains 2->82 100 Multi AV Scanner detection for domain / URL 2->100 102 Antivirus detection for URL or domain 2->102 104 Antivirus detection for dropped file 2->104 106 16 other signatures 2->106 10 setup_x86_x64_install.exe 10 2->10         started        signatures3 process4 file5 46 C:\Users\user\AppData\...\setup_installer.exe, PE32 10->46 dropped 13 setup_installer.exe 21 10->13         started        process6 file7 48 C:\Users\user\AppData\...\setup_install.exe, PE32 13->48 dropped 50 C:\Users\user\AppData\...\Sat20ed203af5.exe, PE32 13->50 dropped 52 C:\Users\user\...\Sat20ecdfe3ee79f.exe, PE32 13->52 dropped 54 16 other files (10 malicious) 13->54 dropped 16 setup_install.exe 1 13->16         started        process8 dnsIp9 74 172.67.142.91 CLOUDFLARENETUS United States 16->74 76 127.0.0.1 unknown unknown 16->76 98 Adds a directory exclusion to Windows Defender 16->98 20 cmd.exe 1 16->20         started        22 cmd.exe 16->22         started        24 cmd.exe 16->24         started        26 9 other processes 16->26 signatures10 process11 signatures12 29 Sat20ecdfe3ee79f.exe 4 61 20->29         started        34 Sat20ed203af5.exe 22->34         started        36 Sat20873bc74eb80e0.exe 24->36         started        108 Adds a directory exclusion to Windows Defender 26->108 38 Sat205eb4a2ece877a.exe 26->38         started        40 Sat20578e6239.exe 4 26->40         started        42 Sat2077373f11706fb7.exe 26->42         started        44 4 other processes 26->44 process13 dnsIp14 84 37.0.10.214 WKD-ASIE Netherlands 29->84 86 37.0.10.244 WKD-ASIE Netherlands 29->86 92 11 other IPs or domains 29->92 56 C:\Users\...\veuCDEwiVHhCCyw7xWzmkicd.exe, PE32 29->56 dropped 58 C:\Users\...\oH1i96i_fi8YDrlzv_W5CKja.exe, PE32 29->58 dropped 60 C:\Users\...\nx1VN2r4jW_rJFJggd7Rick0.exe, PE32 29->60 dropped 70 35 other files (34 malicious) 29->70 dropped 110 Drops PE files to the document folder of the user 29->110 112 Creates HTML files with .exe extension (expired dropper behavior) 29->112 114 Disable Windows Defender real time protection (registry) 29->114 88 104.21.14.200 CLOUDFLARENETUS United States 34->88 62 C:\Users\user\AppData\Roaming\8839122.scr, PE32 34->62 dropped 72 3 other malicious files 34->72 dropped 116 Detected unpacking (changes PE section rights) 34->116 118 Drops PE files with a suspicious file extension 34->118 94 2 other IPs or domains 36->94 120 Antivirus detection for dropped file 36->120 122 Machine Learning detection for dropped file 36->122 64 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 38->64 dropped 90 172.67.189.151 CLOUDFLARENETUS United States 40->90 66 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 40->66 dropped 124 Creates processes via WMI 40->124 96 2 other IPs or domains 42->96 126 Tries to harvest and steal browser information (history, passwords, etc) 42->126 68 C:\Users\user\AppData\...\Sat20fbae42a4.tmp, PE32 44->68 dropped file15 signatures16
Threat name:
Win32.Trojan.Injuke
Status:
Malicious
First seen:
2021-09-18 21:32:06 UTC
AV detection:
29 of 45 (64.44%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:189qwe botnet:706 botnet:937 botnet:ani botnet:pab123 aspackv2 backdoor evasion infostealer spyware stealer themida trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry class
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
45.14.49.169:22411
45.142.215.47:27643
https://petrenko96.tumblr.com/
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
185.215.113.104:18754
Unpacked files
SH256 hash:
3fc47c586d46108bc293d260575c80182397629e56e8573f971e79882f162ee9
MD5 hash:
62800146856db6b09389b0a82aad83b5
SHA1 hash:
1a52ab89bdf4ca55cb52d0f9660fc03dc86a8bd3
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
f65327e547b64199ca630ea92acfb063e09b35537c6f8b6487c28a766f1bbacc
MD5 hash:
f5cb790fb2fd8373ba200c173696719b
SHA1 hash:
d16e36828e8604bb1017e009b7118430a731a7ad
SH256 hash:
83664d9745f1f75b770b960a253e5efc0ff4ee06b72083fa8be2bbf801328d3e
MD5 hash:
63846f6a2c15fb8d0bd80c63d8406aec
SHA1 hash:
c566c716ed8c3c69f63d866d2c7a041bdf00b4e5
SH256 hash:
e7597ce611f8ea8bce2025f710df9d7427a787329d4c8c9fbaf761db18c0075d
MD5 hash:
1bbce298ab565bb67ff67105a896ec94
SHA1 hash:
ba2b78eaace439935dd193e76c311232537bcd40
SH256 hash:
98c6637442ee6c6c5e7e089bb716fbb8c5910ed2cea5a1e42018bec26eed0cdd
MD5 hash:
3a57470f3a8c888be7977745c117c841
SHA1 hash:
a0f8a7efdc840efe35b9ec0ac87aabbcac372ba8
SH256 hash:
5f21e91b9e00c9fa9ce5df1fd336fcc83ad2463dc8f7e1663220c05e00671834
MD5 hash:
1b3a6796c3092a536b26c2c6856a8b05
SHA1 hash:
9c5d0b988c670c16951a1917da4c153c1b154ea5
SH256 hash:
1d04bbabdb6da4db379ca057ac0d63fb27d8891b01cf3ffcb94573be1853ecaf
MD5 hash:
d58b4be4f3dec4843801511def20ae7d
SHA1 hash:
90be9caf1efa58d6ea70ae6783bfc8e05bd9ea16
SH256 hash:
49346561454d5776829f354c5c79f61f58049e65bd6e9d2838a49c16ab5f0299
MD5 hash:
66c4b7be6ca02761188fd9f6c5b95ec6
SHA1 hash:
6d180fe0fa43c584af90f4debc5b89050665fdf3
SH256 hash:
092bea590204765646a241904a4ac3a5e62e7030677aadd534e2a6649180f9cb
MD5 hash:
867f9ce8bc2e055fabbe2f11fce3f13f
SHA1 hash:
418d20c7d50a00825c1817bf84c17d6dbcad0f01
SH256 hash:
111e49bc4ffa5517906b8f0388b04c7bedc814da0df7de1d2ea8ef2dc239311f
MD5 hash:
a2fc213fc92b86366258b3dfe8b7225b
SHA1 hash:
3f85b4b44c63ce6ff2a5da25ab46cc925112a0b4
SH256 hash:
5a316abb59caec8bf3e95187f20d734edcee4234f9571ab2f6fd7aad83ef07bd
MD5 hash:
5a31d99dee8653f15811fcc93651c696
SHA1 hash:
1429465b72e4b9b3e05db0fd5e5d237150f79090
SH256 hash:
c5c9d1eabb516182f0315236a96c428c382a1e2ea50784fef52124518350a9f3
MD5 hash:
3337fd47a797ba84d5fdcf50e50e19a6
SHA1 hash:
135bc7dfdcd71b82913d8c997330182f825c1f7b
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
3350c5adc44305527679af1c5209b5fe52bf06a5b14a2f61efe3b965506436d5
MD5 hash:
ffa3dc46f7e1b6e7b969b34e03842842
SHA1 hash:
dd7bcfb6074ddb942376757671a7abf47d7aa62a
SH256 hash:
5f463952815ce4f763e9f4b3b72ed70ad82f74a69a271fc2b1588055c3fec4cc
MD5 hash:
21775ff041e7277d87aa8fdf1e09da6c
SHA1 hash:
6dd1d6716cb93adef6c9b39490a79e77fd5396c9
SH256 hash:
588626e5e2d07844f2b59eb51dce36bc8f6c123ceff817813bf4c31aebdd1bf5
MD5 hash:
8ecea1e237042ecd057de60e97b89e7a
SHA1 hash:
fb1a226b3c324c49d88ac6a6726f90641dc93977
SH256 hash:
0fd897b1e74f50e47526f974bf4906ecbe4a331b1ae4e2ec309fbee57a032586
MD5 hash:
4c3423a6e5e3337c71c551358f1334c1
SHA1 hash:
e3f59c4781ab6b19adb9eb85054a060b34c3df73
SH256 hash:
c02d2c9ae0b587f9b7631c443ce5a7d6d409c0a5d09ff6b389ca1330d44a1149
MD5 hash:
a91a81780273bb279790c1fbb6fb3105
SHA1 hash:
4bedae163300009aac8afa2c2b42ea6c184ca9dd
SH256 hash:
36d5afdcb0fa8d512656aa5a59f34018885bb1b9dd5cc0780766552809cfb45f
MD5 hash:
4f9c74430d72b9500a0d99cc28fc7a7e
SHA1 hash:
a67cf6a62a6cabec501aa2f14e97c48b71dbd97c
SH256 hash:
d1417ebebd174d666a6abc9481d65b39fc2d88559f7fd92ebb7e2f1ae93787db
MD5 hash:
70220a3ce6ffd34101b3770342505f2c
SHA1 hash:
b55c421634d8eeaec5c6193f34c04625d21a9ae9
SH256 hash:
0fbd853a669d4590b44cda0525f41aa99175133be439db7ca9cd575a2af2636b
MD5 hash:
bb4e4f419dbe419d5cdca7e8534ac023
SHA1 hash:
cdacd0ad82dcefa585734e751b1cea42161a9033
SH256 hash:
7d20b00ed7f3a8070fad2ff7f3da7f9c3a2cf94012f91c2f5578f18611ecd917
MD5 hash:
f5d46bfd99ca0e6da3c30304c4f8d2b8
SHA1 hash:
bf6d855807101497f314c497a34ae225e8c1e80a
SH256 hash:
40fb038c3cb32d3d80a1ad16a1299bbc9acd4725451b3eb32c958cb7c717a164
MD5 hash:
16ed1b38351932f6e6e64b8e255c13c7
SHA1 hash:
84a5f6b903dcc1dc0b508ee8bd2bc6dd6d9d4991
SH256 hash:
5a71dd08c7f2193dcb10babc733ed6ee23eb90032dcf06024a2ad233b4d8a7b5
MD5 hash:
783319062db4352f0b47154686ace174
SHA1 hash:
1dc06950365e4c116bb4d72bc82d76610c2d76e7
SH256 hash:
5ec51a9d00e05e78551076c1998fdda9ea65f89f0806231d07b5e07c7031117f
MD5 hash:
f87d3898e01c81502090f250a37c5fe7
SHA1 hash:
887cf74ebb5c6fa8b98853385adc1a1d66edc815
SH256 hash:
21c7a1ddd948b731bea6c3e86a73f5123de0d4217190af33c82b8c0d55bc8326
MD5 hash:
25fb3da71fe6d075728986a28c6b6e12
SHA1 hash:
a1a51b5995cd3184d44995ef91682cc109fd4a18
Detections:
win_socelars_auto
SH256 hash:
5967f1aef118ddfcd1d14d5cf3f29a62a845052c9ed9ce91587c0015b1047c58
MD5 hash:
c9b742fa61ccc9b3afa7217f3bfe2590
SHA1 hash:
7c1ddc294d0d9214c1e07ba239d24ffd2a01854d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments