MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b99300d00050e4a8b2b0873723a9783b172776ba8cb7500d65e6d93bc3d37147. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Smoke Loader
Vendor detections: 13
| SHA256 hash: | b99300d00050e4a8b2b0873723a9783b172776ba8cb7500d65e6d93bc3d37147 |
|---|---|
| SHA3-384 hash: | ad3eb7541bcafdcb0123f8aa9eb9336b61d08e31d26b68609d3b6587fc1ed491a9c7815b2b5216740fa256b61cc3ffa9 |
| SHA1 hash: | 0d6eb6aa7b3ab0594dbc3f2eaebc03f983f9ef0e |
| MD5 hash: | 195f75348b40e7660961751ed01418bd |
| humanhash: | undress-lithium-nevada-five |
| File name: | 195f75348b40e7660961751ed01418bd.exe |
| Download: | download sample |
| Signature | Smoke Loader |
| File size: | 212'312 bytes |
| First seen: | 2022-08-17 17:30:38 UTC |
| Last seen: | 2022-08-17 18:44:22 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 671aa2c2e04d2049d50437e73dc464f9 (54 x RecordBreaker, 25 x RedLineStealer, 5 x Smoke Loader) |
| ssdeep | 3072:AooF09UytR6ccC4B82wZJcQlLXEnEv+QRgYzbHOAg0FujDLsEknWoSDGamv/CX:AooFqVRfcnB8xTLEQ+AOcnszm3CX |
| TLSH | T14F249D51B4D2C072D473253209E8DAB5AA3DF9300BA289FF77950B7E4F242C1DA35A66 |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe Smoke Loader |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://85.192.63.46/ | https://threatfox.abuse.ch/ioc/843816/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
178.32.215.163:17189
Unpacked files
e3dc41ce8a7e58f579b5b682d536c24fb4348899b6d332bf96a290eb93beac82
7968a4ce56f635c65b0f2bbdc8d72364a58eab71642ec195cb4fd579a134fca7
f1f713eed337b5689345785e07be5d7136f34c0195efdee8ac2230144c57e604
e68eb5c847f58f8a3322208932734601f1c8909f529e5d64aec129e095f02ad3
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.