MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7140765cd0d5f61bb453f0511e24786e21d950c2cb3b30aa2945ba1846a4e0a5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 15


Intelligence 15 IOCs 2 YARA File information Comments

SHA256 hash: 7140765cd0d5f61bb453f0511e24786e21d950c2cb3b30aa2945ba1846a4e0a5
SHA3-384 hash: f34644f62071a571a6c2213c8c241f48a78ac86c71b263f72aba68d2f0882d107809ec910a97ad08947342f778cbed38
SHA1 hash: 59beeba0a1e82ae41cbfcbec56ba8d30e3702f03
MD5 hash: 556412f983de13496bbee4fd87e1a966
humanhash: whiskey-jig-ack-jersey
File name:7140765CD0D5F61BB453F0511E24786E21D950C2CB3B3.exe
Download: download sample
Signature Smoke Loader
File size:3'326'144 bytes
First seen:2022-10-01 01:20:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:JhXlDXkM77yrTrLG7Xk0+G94TksGWQKx7+g:JdVXkM3qrCzk0+G6IshhxCg
Threatray 4'122 similar samples on MalwareBazaar
TLSH T1D9F53386A6A04031DA5790F62F958F550C37CD35CABCC7230A92746DF621A53EFCA2DB
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe Smoke Loader


Avatar
abuse_ch
Smoke Loader C2:
79.110.62.196:35726

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
79.110.62.196:35726 https://threatfox.abuse.ch/ioc/858753/
http://116.202.5.121/ https://threatfox.abuse.ch/ioc/865816/

Intelligence


File Origin
# of uploads :
1
# of downloads :
310
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Moving a recently created file
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Creating a window
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Nymaim, PrivateLoader, RedLine, SmokeLoa
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Creates HTML files with .exe extension (expired dropper behavior)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Drops PE files with a suspicious file extension
Found C&C like URL pattern
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Snort IDS alert for network traffic
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected Nymaim
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 713853 Sample: 7140765CD0D5F61BB453F0511E2... Startdate: 01/10/2022 Architecture: WINDOWS Score: 100 158 s.lletlee.com 2->158 160 107.182.129.235 META-ASUS Reserved 2->160 162 23 other IPs or domains 2->162 202 Snort IDS alert for network traffic 2->202 204 Multi AV Scanner detection for domain / URL 2->204 206 Malicious sample detected (through community Yara rule) 2->206 212 20 other signatures 2->212 15 7140765CD0D5F61BB453F0511E24786E21D950C2CB3B3.exe 10 2->15         started        signatures3 208 May check the online IP address of the machine 158->208 210 Performs DNS queries to domains with low reputation 158->210 process4 file5 150 C:\Users\user\AppData\...\setup_installer.exe, PE32 15->150 dropped 18 setup_installer.exe 16 15->18         started        process6 file7 100 C:\Users\user\AppData\...\setup_install.exe, PE32 18->100 dropped 102 C:\Users\user\AppData\Local\...\sahiba_8.txt, PE32+ 18->102 dropped 104 C:\Users\user\AppData\Local\...\sahiba_7.txt, PE32 18->104 dropped 106 11 other files (10 malicious) 18->106 dropped 214 Multi AV Scanner detection for dropped file 18->214 22 setup_install.exe 1 18->22         started        signatures8 process9 dnsIp10 192 127.0.0.1 unknown unknown 22->192 194 watira.xyz 22->194 196 s.lletlee.com 22->196 138 C:\Users\user\AppData\...\sahiba_8.exe (copy), PE32+ 22->138 dropped 140 C:\Users\user\AppData\...\sahiba_7.exe (copy), PE32 22->140 dropped 142 C:\Users\user\AppData\...\sahiba_6.exe (copy), PE32 22->142 dropped 144 5 other malicious files 22->144 dropped 238 Multi AV Scanner detection for dropped file 22->238 240 Performs DNS queries to domains with low reputation 22->240 27 cmd.exe 1 22->27         started        29 cmd.exe 22->29         started        31 cmd.exe 1 22->31         started        34 8 other processes 22->34 file11 signatures12 process13 signatures14 36 sahiba_6.exe 27->36         started        41 sahiba_7.exe 29->41         started        250 Obfuscated command line found 31->250 252 Uses ping.exe to sleep 31->252 254 Drops PE files with a suspicious file extension 31->254 256 Uses ping.exe to check the status of other devices and networks 31->256 43 sahiba_1.exe 2 31->43         started        45 sahiba_4.exe 2 34->45         started        47 sahiba_3.exe 12 34->47         started        49 sahiba_8.exe 34->49         started        51 2 other processes 34->51 process15 dnsIp16 164 212.193.30.115, 49713, 80 SPD-NETTR Russian Federation 36->164 166 37.0.11.8, 80 WKD-ASIE Netherlands 36->166 174 15 other IPs or domains 36->174 108 C:\Users\...\yGyR6Ow_BttXOob5GnsPZMBy.exe, PE32 36->108 dropped 110 C:\Users\...\wjreJGBQQVQ7kwFJCxuHHQs2.exe, PE32 36->110 dropped 112 C:\Users\...\w9mssveZ0sbN4ovnmiYiq_jk.exe, PE32+ 36->112 dropped 118 16 other malicious files 36->118 dropped 218 Drops PE files to the document folder of the user 36->218 220 May check the online IP address of the machine 36->220 222 Creates HTML files with .exe extension (expired dropper behavior) 36->222 224 Disable Windows Defender real time protection (registry) 36->224 53 OUZaDycFO162JuH4sx3vdyXl.exe 36->53         started        58 mnj8YRpdB6fvc3duCd3_FcyN.exe 36->58         started        60 w9mssveZ0sbN4ovnmiYiq_jk.exe 36->60         started        70 6 other processes 36->70 114 C:\Users\user\AppData\Local\...\Compatto.rtf, ASCII 41->114 dropped 62 cmd.exe 41->62         started        64 sahiba_1.exe 43->64         started        116 C:\Users\user\AppData\Local\...\sahiba_4.tmp, PE32 45->116 dropped 226 Obfuscated command line found 45->226 66 sahiba_4.tmp 45->66         started        168 116.202.183.50, 80 HETZNER-ASDE Germany 47->168 170 xeronxikxxx.tumblr.com 74.114.154.18, 443, 49704 AUTOMATTICUS Canada 47->170 172 192.168.2.1 unknown unknown 49->172 176 2 other IPs or domains 49->176 68 explorer.exe 51->68 injected file17 signatures18 process19 dnsIp20 178 49.12.226.201 HETZNER-ASDE Germany 53->178 180 t.me 149.154.167.99 TELEGRAMRU United Kingdom 53->180 188 3 other IPs or domains 53->188 120 C:\Users\...\KSuE3JC6DD64apsRYhhXK4LH.exe, PE32 53->120 dropped 132 2 other malicious files 53->132 dropped 228 Multi AV Scanner detection for dropped file 53->228 230 Drops PE files to the document folder of the user 53->230 232 May check the online IP address of the machine 53->232 122 C:\Users\user\AppData\Local\...\Cleaner.exe, PE32 58->122 dropped 124 C:\Users\user\...\Bunifu_UI_v1.5.3.dll, PE32 58->124 dropped 134 2 other malicious files 58->134 dropped 234 Tries to harvest and steal browser information (history, passwords, etc) 60->234 236 Tries to detect virtualization through RDTSC time measurements 60->236 72 cmd.exe 62->72         started        76 conhost.exe 62->76         started        182 telegram.org 64->182 190 3 other IPs or domains 64->190 78 conhost.exe 64->78         started        184 superstationcity.com 194.163.135.248, 49703, 80 NEXINTO-DE Germany 66->184 186 requested404.com 66->186 126 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 66->126 dropped 136 2 other files (none is malicious) 66->136 dropped 128 C:\Users\user\AppData\Local\Temp\UuKr.A, PE32 70->128 dropped 130 C:\Users\user\AppData\Local\...\SETUP_~1.EXE, PE32 70->130 dropped 80 bHg1jUcHRTN3At2J_FnSw4vt.exe 70->80         started        82 conhost.exe 70->82         started        file21 signatures22 process23 file24 146 C:\Users\user\AppData\...\Triste.exe.com, PE32 72->146 dropped 242 Obfuscated command line found 72->242 244 Uses ping.exe to sleep 72->244 84 Triste.exe.com 72->84         started        87 findstr.exe 72->87         started        89 PING.EXE 72->89         started        signatures25 process26 signatures27 216 Machine Learning detection for dropped file 84->216 91 Triste.exe.com 84->91         started        process28 dnsIp29 198 XvFGsHKHPpgkvS.XvFGsHKHPpgkvS 91->198 148 C:\Users\user\AppData\Local\...\RegAsm.exe, PE32 91->148 dropped 246 Writes to foreign memory regions 91->246 248 Injects a PE file into a foreign processes 91->248 96 RegAsm.exe 91->96         started        file30 signatures31 process32 dnsIp33 152 193.56.146.36, 80 LVLT-10753US unknown 96->152 154 www.invch.com 147.255.121.194, 49753, 80 LEASEWEB-USA-SFO-12US United States 96->154 156 6 other IPs or domains 96->156 200 Creates HTML files with .exe extension (expired dropper behavior) 96->200 signatures34
Threat name:
Win32.Trojan.Crypzip
Status:
Malicious
First seen:
2021-07-29 01:20:53 UTC
File Type:
PE (Exe)
Extracted files:
123
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:djvu family:nullmixer family:nymaim family:privateloader family:smokeloader family:vidar botnet:1679 botnet:706 aspackv2 backdoor dropper evasion loader ransomware spyware stealer themida trojan vmprotect
Behaviour
Checks SCSI registry key(s)
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies system certificate store
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
Executes dropped EXE
VMProtect packed file
ASPack v2.12-2.42
Downloads MZ/PE file
Vidar Stealer
Detected Djvu ransomware
Detects Smokeloader packer
Djvu Ransomware
Modifies Windows Defender Real-time Protection settings
NullMixer
NyMaim
PrivateLoader
SmokeLoader
Vidar
Malware Config
C2 Extraction:
http://watira.xyz/
https://xeronxikxxx.tumblr.com/
http://winnlinne.com/test3/get.php
208.67.104.97
85.31.46.167
https://t.me/trampapanam
https://nerdculture.de/@yoxhyp
Unpacked files
SH256 hash:
64939754308d10b596016bedc01b4c4d45ddce712435ccf738e9571551b70f71
MD5 hash:
0c90240d7ddd30bf1cdfa650a1f21ee3
SHA1 hash:
ca60f66f95613785875456b4fb3b2c405edc7379
SH256 hash:
f3809c2693d85812d0ed4f06fd2af9f4299d7de6c1d57633c50bc74c1de21f4e
MD5 hash:
0a8ab9fed28f10d3980e2c13eff9a23c
SHA1 hash:
12fe116ab580975ca777febdba37021e13a51b27
SH256 hash:
c916a8706f49a43b43cd58dd129234541fcc8642ca0d3014010a50d45f1bab40
MD5 hash:
9d69fe12fa6d4e6f0ddbc06a6fc462df
SHA1 hash:
b1b41c900cde2da580efdbd10cd33dd4deed5993
SH256 hash:
640df13e7605d0fd539eaac1474643d4e6ab2f3519cab2450f9b755778dfac6e
MD5 hash:
94fed52e8630b37790927fc7cf29f71c
SHA1 hash:
d9ba132522803b81eb70ca81f7ff5922fab33527
SH256 hash:
71f5bb7d9ace05cfb89e95843499c1c19ca1d6c8b1cd66561d24ceb9ffa94862
MD5 hash:
7a99d0912a3371081b8a866c6ff48351
SHA1 hash:
6b1d33d1afec238f49a23be639790145ee0b3dfd
Detections:
PrivateLoader win_privateloader_w0 win_privateloader_auto win_privateloader_a0
SH256 hash:
bfebe04424e0a8621eb53d2d6da9d5c969e4b94e33ea532bb70e9212869ee9eb
MD5 hash:
28ddc420be08a62b8da803d14d0bcb93
SHA1 hash:
587ca5df9f7fdd3c6915f801f8cd15057342193f
SH256 hash:
6ea92579c10ff6128399ec8092b44388da56b89e83103797601d334d6c866ca0
MD5 hash:
f14bcba48fb3817154228ed4cf9df6cb
SHA1 hash:
26ae758142d6dd0d69d5f4ff127a0d9c633b6690
SH256 hash:
78958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
MD5 hash:
c0d18a829910babf695b4fdaea21a047
SHA1 hash:
236a19746fe1a1063ebe077c8a0553566f92ef0f
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
0fb6e44e0abe166c767d8755ec2d5197bfcddc70fddcf1ff8016bb4042bba176
MD5 hash:
70ed60542fd6b63798819c81e6297d18
SHA1 hash:
e88b2a00cee6c060401d83ee0c3ab069c354d0c1
SH256 hash:
e8671420b6b74ebbad9e63e51aded1c2121b63174a266677f4839e630e192705
MD5 hash:
5dadcdca68e273088ad5f7e3ec3a1b19
SHA1 hash:
8683f3dfda34c51f4a26c4ae05a8bdf845dec784
SH256 hash:
d97f6c9a42157b01cdd6ac11ea6fff45a3a8d4c4483d1ba3d68c47761a242224
MD5 hash:
1347606800fd85705b595296aa3d8db3
SHA1 hash:
9ea2b85c750ddb4ae1f61bc2ef0bb3ef0aeeee0f
SH256 hash:
7140765cd0d5f61bb453f0511e24786e21d950c2cb3b30aa2945ba1846a4e0a5
MD5 hash:
556412f983de13496bbee4fd87e1a966
SHA1 hash:
59beeba0a1e82ae41cbfcbec56ba8d30e3702f03
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments