MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 62d0160c7b22e6474d9a7fc70c3f97c07997e11bc734f0698a285aece71957e0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments

SHA256 hash: 62d0160c7b22e6474d9a7fc70c3f97c07997e11bc734f0698a285aece71957e0
SHA3-384 hash: bc8544e47899af3dcce701c023949762346cae571f558e662392dd7369d7bd8656c937e091dd4aac346804a8fd072708
SHA1 hash: 4349e7f7880476cc463ee09c2c757745fffc1a3d
MD5 hash: 8da74ab19d25d13d507bf8fafecc0c29
humanhash: friend-asparagus-low-high
File name:setupexe
Download: download sample
Signature Smoke Loader
File size:235'520 bytes
First seen:2020-07-06 12:01:45 UTC
Last seen:2020-07-06 13:15:55 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 98df304f30a17a3e736081eea589eb62 (2 x Gozi, 1 x Smoke Loader)
ssdeep 3072:jnRS+dzGpMUP4IPBBNw+lu6DB7GJDd0n2rdjlxmfppXY:Tn4pMS4qnNydakjr2Y
TLSH 8E34BF2172B1C873E55A157448A5C7B09A3BBD350F214ACB3B841B6E5F363E29F36386
Reporter JAMESWT_WT
Tags:Gozi isfb Smoke Loader Ursnif

Intelligence


File Origin
# of uploads :
2
# of downloads :
109
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending an HTTP GET request
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
DNS request
Creating a file in the %temp% directory
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Moving a file to the Windows subdirectory
Sending a custom TCP request
Launching a process
Creating a service
Creating a file
Launching a service
Launching the process to change the firewall settings
Creating a window
Reading critical registry keys
Deleting a recently created file
Connection attempt
Enabling autorun for a service
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Deleting of the original file
Enabling autorun with Startup directory
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Threat name:
Win32.Trojan.Propagate
Status:
Malicious
First seen:
2020-07-06 12:03:04 UTC
File Type:
PE (Exe)
Extracted files:
30
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: MapViewOfSection
Suspicious behavior: MapViewOfSection
Checks SCSI registry key(s)
Maps connected drives based on registry
Maps connected drives based on registry
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_smokeloader_a2
Author:pnx

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments