MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9b2fa50d5f4813ac0b77e8573bf66cac02f74ca3a95ae5512013d1f765893942. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Smoke Loader
Vendor detections: 13
| SHA256 hash: | 9b2fa50d5f4813ac0b77e8573bf66cac02f74ca3a95ae5512013d1f765893942 |
|---|---|
| SHA3-384 hash: | 2ae3946b0b9917a5e4303cdd57bd94c874154da74eb3c8f0efca671ead7b1448c3b1cb9324fe29629a8de919ce87e41b |
| SHA1 hash: | a6c33fa5270472b83ae0d1befca27992d9818bed |
| MD5 hash: | 2cf8e266b09bd2f4010b7357616241e4 |
| humanhash: | purple-solar-high-mango |
| File name: | Setup.exe |
| Download: | download sample |
| Signature | Smoke Loader |
| File size: | 1'733'632 bytes |
| First seen: | 2026-04-02 21:28:55 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 4cea7ae85c87ddc7295d39ff9cda31d1 (99 x LummaStealer, 85 x RedLineStealer, 62 x Rhadamanthys) |
| ssdeep | 49152:zawM5dOa4jE3G/5vpRz9cgufOfOCNVjJRz2+J:2JIoWogKcOCNVjLz |
| TLSH | T11985120706D52862E6B11674C1E34396D332FC560F31669B2AC07CB8FD77AC96632B9E |
| TrID | 45.6% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 18.0% (.EXE) Win64 Executable (generic) (6522/11/2) 13.9% (.EXE) Win16 NE executable (generic) (5038/12/1) 5.6% (.ICL) Windows Icons Library (generic) (2059/9) 5.6% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| dhash icon | 3369d0b6b6f07022 (1 x Smoke Loader) |
| Reporter | |
| Tags: | exe Smoke Loader |
Intelligence
File Origin
DEVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE |
|---|---|
| Author: | CYFARE |
| Description: | Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments |
| Reference: | https://cyfare.net/ |
| Rule name: | VECT_Ransomware |
|---|---|
| Author: | Mustafa Bakhit |
| Description: | Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.