MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7c90cf45e068bd9b227b648cda33de1bc0e5bcaa4c3a0ff74147851458f13d32. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 14


Intelligence 14 IOCs YARA 38 File information Comments

SHA256 hash: 7c90cf45e068bd9b227b648cda33de1bc0e5bcaa4c3a0ff74147851458f13d32
SHA3-384 hash: aa94a2aa4c0fcec119fdc29351e2232a5b54528e3f4f919351a1feebc2871ddccea9ad1b66e540e495f4c5a3e9b304fb
SHA1 hash: fcdeac22ea222c3ce1247d30d1caa77da94b8b6d
MD5 hash: 8985e6332c78355fd49efcd46700fe37
humanhash: six-nitrogen-rugby-delaware
File name:source code of carbanak backdoor discovered_patched.exe
Download: download sample
Signature Smoke Loader
File size:34'123'776 bytes
First seen:2026-03-06 11:14:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ebc247a77b4d4a804b261f97a1fd075c (43 x Vidar, 18 x Smoke Loader, 3 x Stealc)
ssdeep 786432:VyYdZwvM+6TNHZkOMghYglCnBSDf/1g0755f:ldxPNGOlh7tg03
Threatray 340 similar samples on MalwareBazaar
TLSH T1E777CE17B7D840A5D0BB8234897B9716E771BC110B3196CF2254BA6D2F73BD05E3AB22
TrID 45.6% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
18.0% (.EXE) Win64 Executable (generic) (6522/11/2)
13.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.6% (.ICL) Windows Icons Library (generic) (2059/9)
5.6% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter aachum
Tags:baxe-pics de-pumped exe Smoke Loader


Avatar
iamaachum
https://media.rapidfilevault3.cfd/Source+Code+of+CARBANAK+backdoor+discovered.zip

SmokeLoader C2:
http://baxe.pics:48261/
65.21.104.235:48261

Intelligence


File Origin
# of uploads :
1
# of downloads :
125
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
source code of carbanak backdoor discovered_patched.exe
Verdict:
Malicious activity
Analysis date:
2026-03-06 11:17:51 UTC
Tags:
stealer golang

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Verdict:
Malicious
File Type:
exe x64
Detections:
Trojan.Win32.Injuke.pmjc PDM:Trojan.Win32.Generic Backdoor.Agent.HTTP.C&C
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to register a low level keyboard hook
Detected CypherIt Packer
Drops password protected ZIP file
Found many strings related to Crypto-Wallets (likely being stolen)
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potentially malicious time measurement code found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Stop EventLog
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Tries to steal Mail credentials (via file / registry access)
Unusual module load detection (module proxying)
Uses known network protocols on non-standard ports
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1879488 Sample: source code of carbanak bac... Startdate: 06/03/2026 Architecture: WINDOWS Score: 100 95 pastebin.com 2->95 97 pool.hashvault.pro 2->97 99 2 other IPs or domains 2->99 115 Suricata IDS alerts for network traffic 2->115 117 Antivirus detection for URL or domain 2->117 119 Multi AV Scanner detection for submitted file 2->119 123 10 other signatures 2->123 11 source code of carbanak backdoor discovered_patched.exe 1 2->11         started        16 wsmlbprntquv.exe 2->16         started        18 svchost.exe 2->18         started        20 7 other processes 2->20 signatures3 121 Connects to a pastebin service (likely for C&C) 95->121 process4 dnsIp5 107 filezilla.cc 150.241.66.54, 443, 49698 TECNALIAES Spain 11->107 109 baxe.pics 65.21.104.235, 48261, 49692 CP-ASDE United States 11->109 91 C:\Users\...\D35a0FBgui3RFsyLL12HDZXuX56o.exe, PE32 11->91 dropped 143 Query firmware table information (likely to detect VMs) 11->143 145 Tries to steal Mail credentials (via file / registry access) 11->145 147 Found many strings related to Crypto-Wallets (likely being stolen) 11->147 159 4 other signatures 11->159 22 D35a0FBgui3RFsyLL12HDZXuX56o.exe 8 11->22         started        93 C:\Windows\Temp\qtgtqypqoiqk.sys, PE32+ 16->93 dropped 149 Injects code into the Windows Explorer (explorer.exe) 16->149 151 Modifies the context of a thread in another process (thread injection) 16->151 153 Adds a directory exclusion to Windows Defender 16->153 155 Sample is not signed and drops a device driver 16->155 26 explorer.exe 16->26         started        29 powershell.exe 16->29         started        31 cmd.exe 16->31         started        33 conhost.exe 16->33         started        157 Changes security center settings (notifications, updates, antivirus, firewall) 18->157 35 MpCmdRun.exe 18->35         started        111 127.0.0.1 unknown unknown 20->111 file6 signatures7 process8 dnsIp9 87 C:\Users\user\AppData\Local\Temp\...\7z.exe, PE32+ 22->87 dropped 89 C:\Users\user\AppData\Local\Temp\...\7z.dll, PE32+ 22->89 dropped 127 Multi AV Scanner detection for dropped file 22->127 129 Contains functionality to register a low level keyboard hook 22->129 37 cmd.exe 2 22->37         started        101 185.84.98.5, 443, 49707 COLTENGINECOLTENGINENetworkIT Italy 26->101 103 pool.hashvault.pro 185.84.98.85, 443, 49705 COLTENGINECOLTENGINENetworkIT Italy 26->103 105 pastebin.com 104.20.29.150, 443, 49706 CLOUDFLARENETUS United States 26->105 131 System process connects to network (likely due to code injection or exploit) 26->131 133 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 26->133 135 Query firmware table information (likely to detect VMs) 26->135 137 Unusual module load detection (module proxying) 26->137 139 Loading BitLocker PowerShell Module 29->139 40 conhost.exe 29->40         started        42 conhost.exe 31->42         started        44 wusa.exe 31->44         started        46 conhost.exe 35->46         started        file10 signatures11 process12 signatures13 125 Detected CypherIt Packer 37->125 48 Setup.exe 1 2 37->48         started        52 7z.exe 2 37->52         started        54 7z.exe 2 37->54         started        56 9 other processes 37->56 process14 file15 83 C:\ProgramData\...\wsmlbprntquv.exe, PE32+ 48->83 dropped 113 Adds a directory exclusion to Windows Defender 48->113 58 powershell.exe 22 48->58         started        61 cmd.exe 48->61         started        63 sc.exe 48->63         started        67 3 other processes 48->67 85 C:\Users\user\AppData\Local\...\Setup.exe, PE32+ 52->85 dropped 65 WmiPrvSE.exe 54->65         started        signatures16 process17 signatures18 141 Loading BitLocker PowerShell Module 58->141 69 conhost.exe 58->69         started        71 conhost.exe 61->71         started        73 wusa.exe 61->73         started        75 conhost.exe 63->75         started        77 conhost.exe 67->77         started        79 conhost.exe 67->79         started        81 conhost.exe 67->81         started        process19
Gathering data
Threat name:
Win64.Trojan.Alevaul
Status:
Malicious
First seen:
2026-03-06 11:15:48 UTC
File Type:
PE+ (Exe)
Extracted files:
5
AV detection:
17 of 38 (44.74%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig defense_evasion discovery execution miner persistence spyware stealer upx
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
UPX packed file
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Contacts third-party web service commonly abused for C2
Checks computer location settings
Creates new service(s)
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Stops running service(s)
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
XMRig Miner payload
xmrig
Xmrig family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:dependsonpythonailib
Author:Tim Brown
Description:Hunts for dependencies on Python AI libraries
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:DetectGoMethodSignatures
Author:Wyatt Tauber
Description:Detects Go method signatures in unpacked Go binaries
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:GoBinTest
Rule name:golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:Golang_Find_CSC846
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:Golang_Find_CSC846_Simple
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:Indicator_MiniDumpWriteDump
Author:Obscurity Labs LLC
Description:Detects PE files and PowerShell scripts that use MiniDumpWriteDump either through direct imports or string references
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:NET
Author:malware-lu
Rule name:NETDLLMicrosoft
Author:malware-lu
Rule name:ProgramLanguage_Golang
Author:albertzsigovits
Description:Application written in Golang programming language
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:skip20_sqllang_hook
Author:Mathieu Tartare <mathieu.tartare@eset.com>
Description:YARA rule to detect if a sqllang.dll version is targeted by skip-2.0. Each byte pattern corresponds to a function hooked by skip-2.0. If $1_0 or $1_1 match, it is probably targeted as it corresponds to the hook responsible for bypassing the authentication.
Reference:https://www.welivesecurity.com/
Rule name:Suspicious_Golang_Binary
Author:Tim Machac
Description:Triage: Golang-compiled binary with suspicious OS/persistence/network strings (not family-specific)
Rule name:Suspicious_Process
Author:Security Research Team
Description:Suspicious process creation
Rule name:Sus_All_Windows_PE_Malware
Author:DiegoAnalytics
Description:Detects Windows PE malware of all types, avoids non-executables like .html
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:telebot_framework
Author:vietdx.mb
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:TH_Win_ETW_Bypass_2025_CYFARE
Author:CYFARE
Description:Windows ETW Bypass Detection Rule - 2025
Reference:https://cyfare.net/
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:win_shylock_w0
Author:Jean-Philippe Teissier / @Jipe_
Description:Shylock Banker

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe 7c90cf45e068bd9b227b648cda33de1bc0e5bcaa4c3a0ff74147851458f13d32

(this sample)

  
Delivery method
Distributed via web download

Comments