MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5e71ef0583d1acd753ddbbedf66eba782e00aeadc9ddc6fb101de518b23a6df8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: 5e71ef0583d1acd753ddbbedf66eba782e00aeadc9ddc6fb101de518b23a6df8
SHA3-384 hash: 85fcd349bb5f5373a2c3a7d04bda58fb9b3f14c9230fd22751c46afdf9f39e082285d1507f1971550c7bb58755d4f207
SHA1 hash: 031db44cd56aba904c2a86bef810f468e8ed4aae
MD5 hash: b4984a96f357cc94dcc71cd41c584784
humanhash: vermont-mango-alpha-victor
File name:b4984a96f357cc94dcc71cd41c584784.exe
Download: download sample
Signature Smoke Loader
File size:297'984 bytes
First seen:2024-02-04 11:56:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e73d248f8b5138b09f44525633bf1f57 (3 x Smoke Loader, 2 x GCleaner, 1 x Stealc)
ssdeep 6144:hW8pztQVn2NsRW7AWqdXyiR0Ip61U4kUbFppU1kqc:hBSVn2NEW8WqdXBs1U4kcVUe5
TLSH T14E548D9033E5D031E2B755355970C3F14A7BBC62763396BFBAD1A62B2E347918A2430B
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon 3370ccd2ccf033da (36 x Smoke Loader, 10 x Stealc, 8 x GCleaner)
Reporter abuse_ch
Tags:exe Smoke Loader

Intelligence


File Origin
# of uploads :
1
# of downloads :
284
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
fingerprint packed smokeloader
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
LummaC, Amadey, SmokeLoader
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to infect the boot sector
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Posts data to a JPG file (protocol mismatch)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadey
Yara detected Amadeys stealer DLL
Yara detected SmokeLoader
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1386322 Sample: AVd1AwJFiQ.exe Startdate: 04/02/2024 Architecture: WINDOWS Score: 100 95 sjyey.com 2->95 97 secretionsuitcasenioise.shop 2->97 99 9 other IPs or domains 2->99 113 Snort IDS alert for network traffic 2->113 115 Multi AV Scanner detection for domain / URL 2->115 117 Found malware configuration 2->117 119 14 other signatures 2->119 12 AVd1AwJFiQ.exe 2->12         started        15 dsihgse 2->15         started        17 E7E6.exe 2->17         started        19 Utsysc.exe 2->19         started        signatures3 process4 signatures5 139 Detected unpacking (changes PE section rights) 12->139 141 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->141 143 Maps a DLL or memory area into another process 12->143 145 Creates a thread in another existing process (thread injection) 12->145 21 explorer.exe 71 9 12->21 injected 147 Multi AV Scanner detection for dropped file 15->147 149 Machine Learning detection for dropped file 15->149 151 Checks if the current machine is a virtual machine (disk enumeration) 15->151 26 WerFault.exe 22 16 17->26         started        process6 dnsIp7 101 emgvod.com 196.188.169.138, 49732, 49739, 80 EthioNet-ASET Ethiopia 21->101 103 sjyey.com 195.158.3.162, 49714, 49715, 49716 BRM-ASUZ Uzbekistan 21->103 105 mmtplonline.com 103.20.213.70, 443, 49723 NETMAGIC-APNetmagicDatacenterMumbaiIN India 21->105 71 C:\Users\user\AppData\Roaming\dsihgse, PE32 21->71 dropped 73 C:\Users\user\AppData\Local\Temp7E6.exe, PE32 21->73 dropped 75 C:\Users\user\AppData\Local\Temp\2C92.exe, PE32 21->75 dropped 77 2 other malicious files 21->77 dropped 121 System process connects to network (likely due to code injection or exploit) 21->121 123 Benign windows process drops PE files 21->123 125 Deletes itself after installation 21->125 127 Hides that the sample has been downloaded from the Internet (zone.identifier) 21->127 28 2C92.exe 3 21->28         started        32 156F.exe 21->32         started        35 E7E6.exe 21->35         started        file8 signatures9 process10 dnsIp11 87 C:\Users\user\AppData\Local\...\Utsysc.exe, PE32 28->87 dropped 153 Detected unpacking (changes PE section rights) 28->153 155 Detected unpacking (overwrites its own PE header) 28->155 157 Machine Learning detection for dropped file 28->157 159 Contains functionality to inject code into remote processes 28->159 37 Utsysc.exe 28->37         started        89 birdvigorousedetertyw.shop 104.21.40.254, 443, 49738 CLOUDFLARENETUS United States 32->89 91 claimconcessionrebe.shop 104.21.58.31, 443, 49744 CLOUDFLARENETUS United States 32->91 93 3 other IPs or domains 32->93 161 Antivirus detection for dropped file 32->161 163 Multi AV Scanner detection for dropped file 32->163 165 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 32->165 167 LummaC encrypted strings found 32->167 42 WerFault.exe 32->42         started        44 WerFault.exe 32->44         started        46 WerFault.exe 32->46         started        169 Contains functionality to infect the boot sector 35->169 48 WerFault.exe 21 35->48         started        file12 signatures13 process14 dnsIp15 107 rimakc.ru 91.189.114.4, 49745, 49750, 49753 RU-CENTERRU Russian Federation 37->107 109 190.224.203.37 TelecomArgentinaSAAR Argentina 37->109 111 3 other IPs or domains 37->111 79 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 37->79 dropped 81 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 37->81 dropped 83 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 37->83 dropped 85 C:\Users\user\AppData\Local\...\cred64[1].dll, PE32+ 37->85 dropped 129 Detected unpacking (changes PE section rights) 37->129 131 Detected unpacking (overwrites its own PE header) 37->131 133 Creates an undocumented autostart registry key 37->133 135 2 other signatures 37->135 50 rundll32.exe 37->50         started        52 rundll32.exe 37->52         started        54 rundll32.exe 37->54         started        56 schtasks.exe 37->56         started        file16 signatures17 process18 process19 58 rundll32.exe 50->58         started        61 rundll32.exe 52->61         started        63 rundll32.exe 54->63         started        65 conhost.exe 56->65         started        signatures20 137 Tries to harvest and steal browser information (history, passwords, etc) 58->137 67 WerFault.exe 61->67         started        69 WerFault.exe 63->69         started        process21
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2024-02-04 10:31:45 UTC
File Type:
PE (Exe)
Extracted files:
50
AV detection:
13 of 23 (56.52%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:amadey family:smokeloader botnet:pub1 backdoor spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Checks computer location settings
Deletes itself
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Downloads MZ/PE file
Amadey
SmokeLoader
Malware Config
C2 Extraction:
http://sjyey.com/tmp/index.php
http://babonwo.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
http://anfesq.com
http://cbinr.com
http://rimakc.ru
http://arrunda.ru
http://soetegem.com
http://tceducn.com
Unpacked files
SH256 hash:
c397c95a266d8cd0e9d4ec771d7556e08f6e30b87562a2722eac3b80e99937f1
MD5 hash:
19520192dc420be42658e333466870e7
SHA1 hash:
7d299e6b632bf115ceea4edded34518d8f1d4404
Detections:
SmokeLoaderStage2 win_smokeloader_a2
SH256 hash:
5e71ef0583d1acd753ddbbedf66eba782e00aeadc9ddc6fb101de518b23a6df8
MD5 hash:
b4984a96f357cc94dcc71cd41c584784
SHA1 hash:
031db44cd56aba904c2a86bef810f468e8ed4aae
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe 5e71ef0583d1acd753ddbbedf66eba782e00aeadc9ddc6fb101de518b23a6df8

(this sample)

  
Delivery method
Distributed via web download

Comments