MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 95dfee83748679197df8cb6f4a060b88b8c97d1472b3eac2b0d23e8413c97eaf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 95dfee83748679197df8cb6f4a060b88b8c97d1472b3eac2b0d23e8413c97eaf
SHA3-384 hash: d8cd6c67494e24ef09ceae1c0e54c21a2e27fd86bcef75285d7ac5f3f29b3150309db793c8d1bc484080e747ace5f8d5
SHA1 hash: 816d595d2b029caec8261b7add578bf0ee1eedbb
MD5 hash: b44fae0dd120ac9ca3885d5e7c656cd3
humanhash: quebec-video-washington-stairway
File name:SecuriteInfo.com.Trojan.Win32.Redline.WW.MTB.3562.30075
Download: download sample
Signature Smoke Loader
File size:5'743'796 bytes
First seen:2022-11-10 03:41:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6c9b62aae6117060f9867b92d139b95e (9 x ArkeiStealer, 2 x Smoke Loader, 1 x RedLineStealer)
ssdeep 98304:TaURnsjfaRQbn/hjVaaj0R9pO2MJlorB2MJlorP:Tznsjf3/hjiF1UecUeP
Threatray 12'911 similar samples on MalwareBazaar
TLSH T18E46AF22738A253AD82615399C7BD9988C3BB9602717CDC776ED394CCF351D1AA3B10B
TrID 52.6% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
29.3% (.EXE) Inno Setup installer (109740/4/30)
11.0% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
2.8% (.EXE) Win64 Executable (generic) (10523/12/4)
1.2% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 96b0f0e8e8e9b296 (1 x Smoke Loader)
Reporter SecuriteInfoCom
Tags:exe Smoke Loader

Intelligence


File Origin
# of uploads :
1
# of downloads :
209
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Trojan.Win32.Redline.WW.MTB.3562.30075
Verdict:
Malicious activity
Analysis date:
2022-11-10 03:43:46 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Delayed reading of the file
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
cmd.exe fingerprint greyware keylogger overlay packed regasm.exe rundll32.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
SmokeLoader
Detection:
malicious
Classification:
bank.troj.spyw.expl.evad
Score:
100 / 100
Signature
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if browser processes are running
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to behave differently if execute on a Russian/Kazak computer
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Found evasive API chain (may stop execution after checking mutex)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 742647 Sample: SecuriteInfo.com.Trojan.Win... Startdate: 10/11/2022 Architecture: WINDOWS Score: 100 68 Malicious sample detected (through community Yara rule) 2->68 70 Multi AV Scanner detection for submitted file 2->70 72 Yara detected SmokeLoader 2->72 74 C2 URLs / IPs found in malware configuration 2->74 10 SecuriteInfo.com.Trojan.Win32.Redline.WW.MTB.3562.30075.exe 10 2->10         started        13 rsjevjh 2->13         started        process3 file4 44 C:\Users\user\AppData\...\C70D93CAEFCC.exe, PE32 10->44 dropped 16 C70D93CAEFCC.exe 10->16         started        92 Multi AV Scanner detection for dropped file 13->92 94 Detected unpacking (changes PE section rights) 13->94 96 Machine Learning detection for dropped file 13->96 98 Injects a PE file into a foreign processes 13->98 19 rsjevjh 13->19         started        signatures5 process6 signatures7 52 Multi AV Scanner detection for dropped file 16->52 54 Detected unpacking (changes PE section rights) 16->54 56 Machine Learning detection for dropped file 16->56 66 3 other signatures 16->66 21 C70D93CAEFCC.exe 16->21         started        58 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 19->58 60 Maps a DLL or memory area into another process 19->60 62 Checks if the current machine is a virtual machine (disk enumeration) 19->62 64 Creates a thread in another existing process (thread injection) 19->64 process8 signatures9 76 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 21->76 78 Maps a DLL or memory area into another process 21->78 80 Checks if the current machine is a virtual machine (disk enumeration) 21->80 82 Creates a thread in another existing process (thread injection) 21->82 24 explorer.exe 2 21->24 injected process10 dnsIp11 48 ubochinkeasaa.co.ug 94.103.90.122, 443, 49701, 49702 VDSINA-ASRU Russian Federation 24->48 42 C:\Users\user\AppData\Roaming\rsjevjh, PE32 24->42 dropped 84 Benign windows process drops PE files 24->84 86 Injects code into the Windows Explorer (explorer.exe) 24->86 88 Writes to foreign memory regions 24->88 90 Hides that the sample has been downloaded from the Internet (zone.identifier) 24->90 29 explorer.exe 6 24->29         started        33 explorer.exe 24->33         started        35 explorer.exe 24->35         started        37 12 other processes 24->37 file12 signatures13 process14 dnsIp15 50 ubochinkeasaa.co.ug 29->50 100 System process connects to network (likely due to code injection or exploit) 29->100 102 Found evasive API chain (may stop execution after checking mutex) 29->102 104 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 29->104 108 3 other signatures 29->108 106 Tries to harvest and steal browser information (history, passwords, etc) 33->106 39 WerFault.exe 35->39         started        signatures16 process17 dnsIp18 46 192.168.2.1 unknown unknown 39->46
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2022-11-10 03:42:14 UTC
File Type:
PE (Exe)
Extracted files:
67
AV detection:
19 of 41 (46.34%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor collection trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Detects Smokeloader packer
SmokeLoader
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
28e8de70b32064d02120957a7234ec7b6205ca5dcc03532599f6c414000876f5
MD5 hash:
625c4bc12e5d1670b5e6bbe27c13efb2
SHA1 hash:
0329f0ef6edea6c349fbcb07c868f8d6e165b108
SH256 hash:
95dfee83748679197df8cb6f4a060b88b8c97d1472b3eac2b0d23e8413c97eaf
MD5 hash:
b44fae0dd120ac9ca3885d5e7c656cd3
SHA1 hash:
816d595d2b029caec8261b7add578bf0ee1eedbb
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments