MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ae23fbc615c3c35ab146b2b6320559dde4e562e2cc513dd20323429c3be9ba0c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: ae23fbc615c3c35ab146b2b6320559dde4e562e2cc513dd20323429c3be9ba0c
SHA3-384 hash: 6ae9dc624eb9752fb8dcd6f7b7b380c797753937ad3873c30ee35ecaa69cd94522c4f578428e7998454b7b3b3a6c0626
SHA1 hash: ee3a4751faaadb38256cebfef6b6ce01b62d1e0d
MD5 hash: 0d3eeecaf927495510c21d651f94f15a
humanhash: zulu-equal-whiskey-nevada
File name:0d3eeecaf927495510c21d651f94f15a.exe
Download: download sample
Signature Smoke Loader
File size:3'939'328 bytes
First seen:2023-01-23 18:40:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7973a61531c93981746e35cc3b7b0ae0 (4 x TeamBot, 3 x Smoke Loader, 2 x CoinMiner)
ssdeep 98304:GikPzV5SA3WBZwon+OUrRTIIdm4OPPJJPczi9Ojs/9H:GvPZwA3WBZwogTvdm/pJPKg
Threatray 4'465 similar samples on MalwareBazaar
TLSH T19C06338269E9BC51E33293314C5A89DC769DF8934E18B6BB5270D92F64707B1C2730BD
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 0c1c1616061485c0 (1 x Smoke Loader)
Reporter abuse_ch
Tags:exe Smoke Loader

Intelligence


File Origin
# of uploads :
1
# of downloads :
168
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
danabot
ID:
1
File name:
0d3eeecaf927495510c21d651f94f15a.exe
Verdict:
Malicious activity
Analysis date:
2023-01-23 18:41:20 UTC
Tags:
danabot stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Creating a window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
Gathering data
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery persistence
Behaviour
Checks processor information in registry
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks installed software on the system
Loads dropped DLL
Blocklisted process makes network request
Sets DLL path for service in the registry
Sets service image path in registry
Unpacked files
SH256 hash:
3d9e35ba29c07e2c2be5fcb67d29f95bd9d4d766916f3d1396ab5ef6a9cef96a
MD5 hash:
12fcc5f45f7e9ae29d2dad9135c45f62
SHA1 hash:
da04435ec43d8ab1053c195845f0b2819fb649ee
SH256 hash:
ceadf7f605aa2903492b1871b9224b7c5c1bea48f324074fd3fbf5101c25b3f0
MD5 hash:
93b7dc67c3c8789552a1d10f3401eb77
SHA1 hash:
70215b533aa35be059d72c1d4c7d70b942cebbc7
SH256 hash:
ae23fbc615c3c35ab146b2b6320559dde4e562e2cc513dd20323429c3be9ba0c
MD5 hash:
0d3eeecaf927495510c21d651f94f15a
SHA1 hash:
ee3a4751faaadb38256cebfef6b6ce01b62d1e0d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments