MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b8b2ae812b47196a7be9ec41d6186eeaf28f2924b906299995db446be091d5e0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: b8b2ae812b47196a7be9ec41d6186eeaf28f2924b906299995db446be091d5e0
SHA3-384 hash: 956badc134b7cec1b81d4738aa466956cb8c92307d75fd27507d838ff6d5ef1c6a7d292e73bd155165ea16c137824587
SHA1 hash: b9f5bf48d34dfae63e695bfd90efad0a8137ede9
MD5 hash: d0936de24510643fa68b2d3879ad79d9
humanhash: edward-lake-magazine-charlie
File name:d0936de24510643fa68b2d3879ad79d9.exe
Download: download sample
Signature Smoke Loader
File size:208'384 bytes
First seen:2024-01-11 01:59:41 UTC
Last seen:2024-01-11 03:32:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7e32959e1e010773874596cbc1a01e01 (3 x Smoke Loader, 2 x Stop, 1 x GCleaner)
ssdeep 3072:/urEskahJisaBZmTrM1ICSZRKRc5h9QWRT+qBL2A:MEska6mTrEIbRKRc5Q+u
Threatray 3'010 similar samples on MalwareBazaar
TLSH T1FE147C1135F68432F7F75A765670C3B44E7B7CA769719A8E2AC502B90F256E2CE2030B
TrID 46.6% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
25.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
8.5% (.EXE) Win64 Executable (generic) (10523/12/4)
5.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
dhash icon d2b1ecc4ecf9c7f9 (1 x Smoke Loader)
Reporter abuse_ch
Tags:exe Smoke Loader

Intelligence


File Origin
# of uploads :
2
# of downloads :
358
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
b8b2ae812b47196a7be9ec41d6186eeaf28f2924b906299995db446be091d5e0.exe
Verdict:
Malicious activity
Analysis date:
2024-01-11 02:04:37 UTC
Tags:
loader smoke smokeloader stealer redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP GET request
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed smokeloader
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
BazaLoader, SmokeLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to detect sleep reduction / modifications
Creates a thread in another existing process (thread injection)
Delayed program exit found
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Found malware configuration
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sigma detected: Schedule system process
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected BazaLoader
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1372775 Sample: l3fh0T2H1h.exe Startdate: 11/01/2024 Architecture: WINDOWS Score: 100 81 gxutc2c.com 2->81 83 api.msn.com 2->83 95 Snort IDS alert for network traffic 2->95 97 Multi AV Scanner detection for domain / URL 2->97 99 Found malware configuration 2->99 101 12 other signatures 2->101 13 l3fh0T2H1h.exe 2->13         started        16 bfiveea 2->16         started        18 explorer.exe 2->18         started        20 svchost.exe 2->20         started        signatures3 process4 signatures5 133 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 13->133 135 Maps a DLL or memory area into another process 13->135 137 Checks if the current machine is a virtual machine (disk enumeration) 13->137 139 Creates a thread in another existing process (thread injection) 13->139 22 explorer.exe 3 5 13->22 injected 141 Multi AV Scanner detection for dropped file 16->141 143 Detected unpacking (changes PE section rights) 16->143 145 Machine Learning detection for dropped file 16->145 147 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 16->147 149 Query firmware table information (likely to detect VMs) 18->149 process6 dnsIp7 85 gxutc2c.com 187.209.203.173, 49708, 49709, 49710 UninetSAdeCVMX Mexico 22->85 87 45.82.13.158, 49724, 49727, 49728 SIRINFO-ASIT Russian Federation 22->87 71 C:\Users\user\AppData\Roaming\bfiveea, PE32 22->71 dropped 73 C:\Users\user\AppData\Local\Temp\1388.exe, PE32+ 22->73 dropped 75 C:\Users\user\...\bfiveea:Zone.Identifier, ASCII 22->75 dropped 109 System process connects to network (likely due to code injection or exploit) 22->109 111 Benign windows process drops PE files 22->111 113 Deletes itself after installation 22->113 115 Hides that the sample has been downloaded from the Internet (zone.identifier) 22->115 27 1388.exe 18 22->27         started        31 WerFault.exe 22->31         started        file8 signatures9 process10 file11 77 C:\Windows \System32\WINMM.dll, PE32+ 27->77 dropped 79 C:\Windows \System32\winSAT.exe, PE32+ 27->79 dropped 117 Multi AV Scanner detection for dropped file 27->117 119 Detected unpacking (overwrites its own PE header) 27->119 121 Machine Learning detection for dropped file 27->121 123 5 other signatures 27->123 33 winSAT.exe 1 27->33         started        35 winSAT.exe 27->35         started        signatures12 process13 process14 37 1388.exe 16 33->37         started        41 conhost.exe 33->41         started        file15 69 C:\Windows\System\svchost.exe, PE32+ 37->69 dropped 103 Found Tor onion address 37->103 105 Drops executables to the windows directory (C:\Windows) and starts them 37->105 107 Adds a directory exclusion to Windows Defender 37->107 43 svchost.exe 37->43         started        47 powershell.exe 23 37->47         started        49 powershell.exe 23 37->49         started        51 2 other processes 37->51 signatures16 process17 dnsIp18 89 85.49.7.119 UNI2-ASES Spain 43->89 91 88.91.231.137 TELENOR-NEXTELTelenorNorgeASNO Norway 43->91 93 21 other IPs or domains 43->93 125 System process connects to network (likely due to code injection or exploit) 43->125 127 Multi AV Scanner detection for dropped file 43->127 129 Machine Learning detection for dropped file 43->129 131 Adds a directory exclusion to Windows Defender 43->131 53 powershell.exe 43->53         started        55 powershell.exe 43->55         started        57 conhost.exe 47->57         started        59 conhost.exe 49->59         started        61 conhost.exe 51->61         started        63 conhost.exe 51->63         started        signatures19 process20 process21 65 conhost.exe 53->65         started        67 conhost.exe 55->67         started       
Threat name:
Win32.Rootkit.BootkitX
Status:
Malicious
First seen:
2024-01-10 21:38:16 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
13 of 37 (35.14%)
Threat level:
  4/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader botnet:pub1 backdoor trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Drops file in Windows directory
Checks computer location settings
Deletes itself
Executes dropped EXE
Downloads MZ/PE file
SmokeLoader
Malware Config
C2 Extraction:
http://gxutc2c.com/tmp/index.php
http://proekt8.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://pirateking.online/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Unpacked files
SH256 hash:
b8b2ae812b47196a7be9ec41d6186eeaf28f2924b906299995db446be091d5e0
MD5 hash:
d0936de24510643fa68b2d3879ad79d9
SHA1 hash:
b9f5bf48d34dfae63e695bfd90efad0a8137ede9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe b8b2ae812b47196a7be9ec41d6186eeaf28f2924b906299995db446be091d5e0

(this sample)

  
Delivery method
Distributed via web download

Comments