MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 82892062b4432f34295067175e034affbdee564cbe93d429322a507cf0f46a99. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: 82892062b4432f34295067175e034affbdee564cbe93d429322a507cf0f46a99
SHA3-384 hash: cf92f9c5ef9b4d0e142750290585cec83956641bc79c9d929a5e0c2ac4740bc82f85467fcd2ec126f085fc1dfafab848
SHA1 hash: 7630446d8dc1fdaa224e716178ef3f30f7618b2f
MD5 hash: 957c3a276c43035e96c8e638171f7a2e
humanhash: orange-triple-network-seventeen
File name:SecuriteInfo.com.Win32.Malware-gen.8146.28087
Download: download sample
Signature Smoke Loader
File size:1'963'448 bytes
First seen:2022-10-12 09:12:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f96ee9fda622fa198bccf076715bfe3f (1 x Smoke Loader, 1 x RecordBreaker, 1 x RedLineStealer)
ssdeep 49152:gr/l0lk8KXjyGzN9ILr/V3LPRklxb8PhkqxvWt:gDlMXKXjyRLDpbRcb8pkqgt
TLSH T1F495125473C44139D2E1FEF0AD21B2A538FCF642D6C7FF64A26503748DA56ABC88538A
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon c4c4d4e8d894cccc (1 x Smoke Loader)
Reporter SecuriteInfoCom
Tags:exe signed Smoke Loader

Code Signing Certificate

Organisation:flush.com
Issuer:Amazon
Algorithm:sha256WithRSAEncryption
Valid from:2022-06-22T00:00:00Z
Valid to:2023-07-21T23:59:59Z
Serial number: 04f9e3f115b98ad8dcbcb252f033737f
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: e2e1c668ad7df45d7b3ed7329290d7523289542e535d9b115ca40b212449c8e5
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
237
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
SystemUptime
MeasuringTime
CheckCmdLine
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
SmokeLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Self deletion via cmd or bat file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 721355 Sample: SecuriteInfo.com.Win32.Malw... Startdate: 12/10/2022 Architecture: WINDOWS Score: 100 75 Snort IDS alert for network traffic 2->75 77 Malicious sample detected (through community Yara rule) 2->77 79 Antivirus detection for dropped file 2->79 81 5 other signatures 2->81 9 SecuriteInfo.com.Win32.Malware-gen.8146.28087.exe 4 2->9         started        13 xapekovo nojig xaga dirocise quep capo yagekiv jijofas sabo quica.exe 2->13         started        15 cggjawi 4 2->15         started        17 cggjawi 3 2->17         started        process3 file4 57 xapekovo nojig xag...ofas sabo quica.exe, PE32 9->57 dropped 59 xapekovo nojig xag...exe:Zone.Identifier, ASCII 9->59 dropped 91 Self deletion via cmd or bat file 9->91 93 Uses schtasks.exe or at.exe to add and modify task schedules 9->93 19 xapekovo nojig xaga dirocise quep capo yagekiv jijofas sabo quica.exe 9->19         started        22 cmd.exe 1 9->22         started        24 schtasks.exe 1 9->24         started        95 Writes to foreign memory regions 13->95 97 Allocates memory in foreign processes 13->97 99 Injects a PE file into a foreign processes 13->99 26 InstallUtil.exe 13->26         started        28 conhost.exe 15->28         started        30 conhost.exe 17->30         started        signatures5 process6 signatures7 83 Writes to foreign memory regions 19->83 85 Allocates memory in foreign processes 19->85 87 Injects a PE file into a foreign processes 19->87 32 InstallUtil.exe 19->32         started        89 Uses ping.exe to check the status of other devices and networks 22->89 35 PING.EXE 1 22->35         started        38 conhost.exe 22->38         started        40 chcp.com 1 22->40         started        42 conhost.exe 24->42         started        process8 dnsIp9 67 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 32->67 69 Maps a DLL or memory area into another process 32->69 71 Checks if the current machine is a virtual machine (disk enumeration) 32->71 73 Creates a thread in another existing process (thread injection) 32->73 44 explorer.exe 2 32->44 injected 63 127.0.0.1 unknown unknown 35->63 signatures10 process11 dnsIp12 65 195.178.120.154, 49809, 80 HEXAGLOBE-ASFR unknown 44->65 61 C:\Users\user\AppData\Roaming\cggjawi, PE32 44->61 dropped 101 Benign windows process drops PE files 44->101 103 Injects code into the Windows Explorer (explorer.exe) 44->103 105 Writes to foreign memory regions 44->105 107 Hides that the sample has been downloaded from the Internet (zone.identifier) 44->107 49 explorer.exe 44->49         started        51 explorer.exe 44->51         started        53 explorer.exe 44->53         started        55 explorer.exe 44->55         started        file13 signatures14 process15
Threat name:
Win32.Trojan.Tasker
Status:
Malicious
First seen:
2022-10-11 23:59:29 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
11 of 26 (42.31%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Deletes itself
Loads dropped DLL
Executes dropped EXE
Detects Smokeloader packer
SmokeLoader
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
34f132a7d504dc49c20787a733af7b5ab201e7b87b480f2f9eb058656cc6fda5
MD5 hash:
df6ff6ad34411aa2da8d2596b75c9628
SHA1 hash:
059fa5678ba2d53e7e350d9a420b7fa96cee7810
SH256 hash:
82892062b4432f34295067175e034affbdee564cbe93d429322a507cf0f46a99
MD5 hash:
957c3a276c43035e96c8e638171f7a2e
SHA1 hash:
7630446d8dc1fdaa224e716178ef3f30f7618b2f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe 82892062b4432f34295067175e034affbdee564cbe93d429322a507cf0f46a99

(this sample)

  
Delivery method
Distributed via web download

Comments