MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aa05432e0dd1c60d444b4809a8cb0f212cb5b7955ca7042f5af43c011a82a126. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: aa05432e0dd1c60d444b4809a8cb0f212cb5b7955ca7042f5af43c011a82a126
SHA3-384 hash: 672c87c19aa8bf87b8e4f9b33d1765ed3dc7628e19711e92a15c7f3d6882e0de61b050324dbd578dcde8970c5b3a2e3d
SHA1 hash: 1a18696d752e67cb933ee924f4da7088103c90b6
MD5 hash: 9252b967765d6620bbede1b2d5991f14
humanhash: stream-alaska-johnny-mirror
File name:Tax Invoice - INV00016490.xll
Download: download sample
Signature Smoke Loader
File size:580'096 bytes
First seen:2022-03-14 18:55:04 UTC
Last seen:2022-04-20 09:49:07 UTC
File type:Excel file xll
MIME type:application/x-dosexec
imphash f20a8db3e4a8c03c1ab177b2660fdd78 (4 x Smoke Loader, 3 x AgentTesla, 2 x Gozi)
ssdeep 12288:qzLjlZHAt+AZrkOCH8bzbBSre2Oi1uWD242S6+4:qzLhltAdkjcX1VDWeS6Z
Threatray 73 similar samples on MalwareBazaar
TLSH T1C8C4AE57F6D77A65E6AFC2BAC6B1C92C66B3309602B0C3CE774055492D22392483DB1F
Reporter abuse_ch
Tags:Smoke Loader xll

Intelligence


File Origin
# of uploads :
5
# of downloads :
138
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
Office Add-Ins - Suspicious
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win64.Trojan.GenericML
Status:
Malicious
First seen:
2022-03-14 18:56:13 UTC
File Type:
PE+ (Dll)
Extracted files:
3
AV detection:
12 of 27 (44.44%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor suricata trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Program crash
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
SmokeLoader
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments