MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ae93b377aa4aeb6d1c1dd333d951b62febb1e7717f43a4d6a6a33352c01f186f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 16


Intelligence 16 IOCs YARA 1 File information Comments

SHA256 hash: ae93b377aa4aeb6d1c1dd333d951b62febb1e7717f43a4d6a6a33352c01f186f
SHA3-384 hash: 41e4c9b42e5f7b512755f44b830d831afebf22d2706611c99013126f44e83a55dc7de82bf4441e4b638eb5fe56e561ee
SHA1 hash: e4b1ec9a5f65771c82311dee0902cef934bb7e3f
MD5 hash: c5ba83f3b662560019f464ff43773b68
humanhash: november-virginia-mango-social
File name:ae93b377aa4aeb6d1c1dd333d951b62febb1e7717f43a4d6a6a33352c01f186f
Download: download sample
Signature Smoke Loader
File size:1'107'456 bytes
First seen:2023-11-03 14:33:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:jyI4C8bsrl4bQ4+1TBhkU3PHcybRmFqlfUBuZaz7tov:26hl4bQ9dfPHcFCLZad
TLSH T10C352322F6F95033CCF5237058FB02832A353C609E69571F27459E572A72794E532B7A
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter adrian__luca
Tags:exe Smoke Loader

Intelligence


File Origin
# of uploads :
1
# of downloads :
334
Origin country :
HU HU
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Launching a service
Searching for the window
Creating a file
Sending a custom TCP request
Forced shutdown of a system process
Blocking the Windows Defender launch
Disabling the operating system update service
Unauthorized injection to a system process
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer greyware installer lolbin lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Mystic Stealer, RedLine, SmokeLo
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys stealer DLL
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1336739 Sample: D8Zu6NZ0vF.exe Startdate: 03/11/2023 Architecture: WINDOWS Score: 100 159 www.google.com 2->159 161 time.windows.com 2->161 163 5 other IPs or domains 2->163 215 Snort IDS alert for network traffic 2->215 217 Found malware configuration 2->217 219 Malicious sample detected (through community Yara rule) 2->219 221 20 other signatures 2->221 15 D8Zu6NZ0vF.exe 1 4 2->15         started        18 svchost.exe 2->18         started        21 svchost.exe 1 2->21         started        23 12 other processes 2->23 signatures3 process4 dnsIp5 141 C:\Users\user\AppData\Local\...\qa8OV16.exe, PE32 15->141 dropped 143 C:\Users\user\AppData\Local\...\4tW613JN.exe, PE32 15->143 dropped 26 qa8OV16.exe 1 4 15->26         started        183 Changes security center settings (notifications, updates, antivirus, firewall) 18->183 185 Query firmware table information (likely to detect VMs) 21->185 167 127.0.0.1 unknown unknown 23->167 30 WerFault.exe 2 23->30         started        32 chrome.exe 23->32         started        file6 signatures7 process8 file9 133 C:\Users\user\AppData\Local\...\UJ5tw58.exe, PE32 26->133 dropped 135 C:\Users\user\AppData\Local\...\3Nf04gW.exe, PE32 26->135 dropped 243 Antivirus detection for dropped file 26->243 245 Multi AV Scanner detection for dropped file 26->245 247 Machine Learning detection for dropped file 26->247 34 3Nf04gW.exe 26->34         started        37 UJ5tw58.exe 1 4 26->37         started        signatures10 process11 file12 187 Antivirus detection for dropped file 34->187 189 Multi AV Scanner detection for dropped file 34->189 191 Machine Learning detection for dropped file 34->191 193 5 other signatures 34->193 40 explorer.exe 19 40 34->40 injected 121 C:\Users\user\AppData\Local\...\2Mi1470.exe, PE32 37->121 dropped 123 C:\Users\user\AppData\Local\...\1VU41qR3.exe, PE32 37->123 dropped 45 1VU41qR3.exe 37->45         started        47 2Mi1470.exe 37->47         started        signatures13 process14 dnsIp15 169 5.182.86.30 TRIPLEAES Russian Federation 40->169 171 185.196.9.171 SIMPLECARRIERCH Switzerland 40->171 173 4 other IPs or domains 40->173 125 C:\Users\user\AppData\Local\Temp\FECE.exe, PE32 40->125 dropped 127 C:\Users\user\AppData\Local\Temp\F7C8.exe, PE32 40->127 dropped 129 C:\Users\user\AppData\Local\Temp\F352.exe, PE32 40->129 dropped 131 4 other malicious files 40->131 dropped 229 System process connects to network (likely due to code injection or exploit) 40->229 231 Benign windows process drops PE files 40->231 233 Found many strings related to Crypto-Wallets (likely being stolen) 40->233 49 AA00.exe 40->49         started        53 E121.exe 40->53         started        55 B56D.exe 40->55         started        61 2 other processes 40->61 235 Multi AV Scanner detection for dropped file 45->235 237 Contains functionality to inject code into remote processes 45->237 239 Writes to foreign memory regions 45->239 241 2 other signatures 45->241 57 AppLaunch.exe 9 1 45->57         started        59 WerFault.exe 21 16 47->59         started        file16 signatures17 process18 file19 105 C:\Users\user\AppData\Local\...\Ky2Of3ol.exe, PE32 49->105 dropped 107 C:\Users\user\AppData\Local\...\6dI56TY.exe, PE32 49->107 dropped 195 Antivirus detection for dropped file 49->195 197 Machine Learning detection for dropped file 49->197 63 Ky2Of3ol.exe 49->63         started        109 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 53->109 dropped 111 C:\Users\user\AppData\Local\...\latestX.exe, PE32+ 53->111 dropped 113 C:\Users\user\AppData\Local\Temp\kos4.exe, PE32 53->113 dropped 115 2 other malicious files 53->115 dropped 199 Multi AV Scanner detection for dropped file 53->199 201 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 53->201 203 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 55->203 205 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 55->205 207 Tries to harvest and steal browser information (history, passwords, etc) 55->207 209 Modifies windows update settings 57->209 211 Disable Windows Defender notifications (registry) 57->211 213 Disable Windows Defender real time protection (registry) 57->213 67 chrome.exe 61->67         started        70 chrome.exe 61->70         started        72 chrome.exe 61->72         started        74 6 other processes 61->74 signatures20 process21 dnsIp22 145 C:\Users\user\AppData\Local\...\tN6cm3HX.exe, PE32 63->145 dropped 147 C:\Users\user\AppData\Local\...\5VE57Fb.exe, PE32 63->147 dropped 175 Antivirus detection for dropped file 63->175 177 Machine Learning detection for dropped file 63->177 76 tN6cm3HX.exe 63->76         started        165 239.255.255.250 unknown Reserved 67->165 80 chrome.exe 67->80         started        83 chrome.exe 70->83         started        85 chrome.exe 72->85         started        87 chrome.exe 74->87         started        89 chrome.exe 74->89         started        91 chrome.exe 74->91         started        93 2 other processes 74->93 file23 signatures24 process25 dnsIp26 137 C:\Users\user\AppData\Local\...\XU6WB2Gd.exe, PE32 76->137 dropped 139 C:\Users\user\AppData\Local\...\4sO639VD.exe, PE32 76->139 dropped 249 Antivirus detection for dropped file 76->249 251 Machine Learning detection for dropped file 76->251 95 XU6WB2Gd.exe 76->95         started        153 twitter.com 104.244.42.129 TWITTERUS United States 80->153 155 t.co 104.244.42.197 TWITTERUS United States 80->155 157 49 other IPs or domains 80->157 file27 signatures28 process29 file30 149 C:\Users\user\AppData\Local\...\Sk1hO3Cw.exe, PE32 95->149 dropped 151 C:\Users\user\AppData\Local\...\3ZI2jB46.exe, PE32 95->151 dropped 179 Antivirus detection for dropped file 95->179 181 Machine Learning detection for dropped file 95->181 99 Sk1hO3Cw.exe 95->99         started        signatures31 process32 file33 117 C:\Users\user\AppData\Local\...\2ej341PC.exe, PE32 99->117 dropped 119 C:\Users\user\AppData\Local\...\1DC40Iq6.exe, PE32 99->119 dropped 102 1DC40Iq6.exe 99->102         started        process34 signatures35 223 Writes to foreign memory regions 102->223 225 Allocates memory in foreign processes 102->225 227 Injects a PE file into a foreign processes 102->227
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2023-10-25 04:29:57 UTC
File Type:
PE (Exe)
Extracted files:
111
AV detection:
26 of 38 (68.42%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:dcrat family:glupteba family:redline family:sectoprat family:smokeloader botnet:grome botnet:kedru botnet:pixelnew2.0 botnet:plost botnet:up3 backdoor dropper evasion infostealer loader persistence rat trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Downloads MZ/PE file
DcRat
Glupteba
Glupteba payload
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine payload
SectopRAT
SectopRAT payload
SmokeLoader
Malware Config
C2 Extraction:
http://77.91.68.29/fks/
77.91.124.86:19084
194.49.94.11:80
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1
MD5 hash:
22b50c95b39cbbdb00d5a4cd3d4886bd
SHA1 hash:
db8326c4fad0064ce3020226e8556e7cce8ce04e
SH256 hash:
515e28bd4d76a9e428fe91d23f72063a676658e0fb9959635efc221a26c6a5df
MD5 hash:
1f4fa95bb5f6ef32105bfff9de2ed5c9
SHA1 hash:
b1cf9c09fd757657f748a4c694e3d5ec7b3e84fd
SH256 hash:
a5dbedc24af1a4124ae607e6160783606d0a1b927986afcc8b6e0f33cadc6225
MD5 hash:
d95c9ceb72d617e9996c1b162d48952d
SHA1 hash:
f0ebeb688793e813950e6cd1fb1d8c8174cca663
Detections:
win_smokeloader_a2
SH256 hash:
ae93b377aa4aeb6d1c1dd333d951b62febb1e7717f43a4d6a6a33352c01f186f
MD5 hash:
c5ba83f3b662560019f464ff43773b68
SHA1 hash:
e4b1ec9a5f65771c82311dee0902cef934bb7e3f
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments