MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c2204454facf5a10af80ecbdfd133ab7625fb82bd7ec49ee4d1ee095314b375b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: c2204454facf5a10af80ecbdfd133ab7625fb82bd7ec49ee4d1ee095314b375b
SHA3-384 hash: ec013203c28b60b668b8f7ed2983e60e3496c40ce1041a73154a6960c9da9c63a6e8be21b3bc48ab5c0623ac6d52580b
SHA1 hash: dd50e91a4c8573620b43aea80723d84ae6d4d59b
MD5 hash: f11af7244e4f71c21afb36cbdb86cc2e
humanhash: mississippi-butter-delta-december
File name:SecuriteInfo.com.Win32.PWSX-gen.15339.15901
Download: download sample
Signature Smoke Loader
File size:183'808 bytes
First seen:2023-11-08 22:20:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'663 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 3072:Dp4YHGaNN44QoOh58HxhTxGnVZ23hVkR2izJCVGGBdcOd80avN1HVYNI9:CYma/4XRUd4omJkGQbd30PHVY
Threatray 15 similar samples on MalwareBazaar
TLSH T18304AE50A0F04259E2D9DAB24D70A6A0B6FF75225603D279CC51B5C63CEDEE3BDC09D2
TrID 30.2% (.EXE) Win64 Executable (generic) (10523/12/4)
18.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
14.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
12.9% (.EXE) Win32 Executable (generic) (4505/5/1)
5.9% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter SecuriteInfoCom
Tags:exe Smoke Loader

Intelligence


File Origin
# of uploads :
1
# of downloads :
322
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Launching a process
Creating a file
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Connecting to a non-recommended domain
Creating a process from a recently created file
Creating a file in the %temp% directory
Searching for synchronization primitives
Running batch commands
Blocking the User Account Control
Forced shutdown of a system process
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Adding exclusions to Windows Defender
Adding an exclusion to Microsoft Defender
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, SmokeLoader, Vidar, onlyLogger
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains process injector
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disables UAC (registry)
Drops script or batch files to the startup folder
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Sample uses process hollowing technique
Sigma detected: Drops script at startup location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected Generic Downloader
Yara detected Glupteba
Yara detected onlyLogger
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1339377 Sample: SecuriteInfo.com.Win32.PWSX... Startdate: 08/11/2023 Architecture: WINDOWS Score: 100 100 Found malware configuration 2->100 102 Malicious sample detected (through community Yara rule) 2->102 104 Antivirus detection for URL or domain 2->104 106 19 other signatures 2->106 8 SecuriteInfo.com.Win32.PWSX-gen.15339.15901.exe 2 4 2->8         started        process3 signatures4 126 Adds a directory exclusion to Windows Defender 8->126 128 Disables UAC (registry) 8->128 11 CasPol.exe 15 502 8->11         started        16 powershell.exe 21 8->16         started        process5 dnsIp6 94 85.209.11.204 SYNGB Russian Federation 11->94 96 107.167.110.211 OPERASOFTWAREUS United States 11->96 98 21 other IPs or domains 11->98 70 C:\Users\...\ytCNw6zdpALCJbaiL0L4vuTF.exe, PE32 11->70 dropped 72 C:\Users\...\ylgTPABX6Mk3kMLeyjoZakxl.exe, PE32 11->72 dropped 74 C:\Users\...\xBycuBqR9CsJlWY4rYoNQQE0.exe, PE32 11->74 dropped 76 289 other malicious files 11->76 dropped 130 Drops script or batch files to the startup folder 11->130 132 Creates HTML files with .exe extension (expired dropper behavior) 11->132 18 jmnRlYcCXBPS43oCI9F6SGI8.exe 11->18         started        23 L8JZXCGCNvhNCftRYiucM5in.exe 11->23         started        25 UaHthFBEOOkRSOTa10g9q3B0.exe 11->25         started        29 27 other processes 11->29 27 conhost.exe 16->27         started        file7 signatures8 process9 dnsIp10 78 5.182.38.138 VMAGE-ASRU Russian Federation 18->78 80 149.154.167.99 TELEGRAMRU United Kingdom 18->80 82 116.203.165.60 HETZNER-ASDE Germany 18->82 46 C:\Users\user\AppData\...\softokn3[1].dll, PE32 18->46 dropped 48 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 18->48 dropped 50 C:\Users\user\AppData\...\mozglue[1].dll, PE32 18->50 dropped 58 9 other files (5 malicious) 18->58 dropped 108 Detected unpacking (changes PE section rights) 18->108 110 Detected unpacking (overwrites its own PE header) 18->110 112 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->112 124 3 other signatures 18->124 114 Contains functionality to inject code into remote processes 23->114 116 Injects a PE file into a foreign processes 23->116 31 L8JZXCGCNvhNCftRYiucM5in.exe 23->31         started        34 UaHthFBEOOkRSOTa10g9q3B0.exe 25->34         started        84 107.167.110.217 OPERASOFTWAREUS United States 29->84 86 107.167.125.189 OPERASOFTWAREUS United States 29->86 88 3 other IPs or domains 29->88 52 Opera_installer_2311082222502797604.dll, PE32 29->52 dropped 54 Opera_installer_2311082222267982820.dll, PE32 29->54 dropped 56 Opera_installer_2311082222094571476.dll, PE32 29->56 dropped 60 12 other malicious files 29->60 dropped 118 Found Tor onion address 29->118 120 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 29->120 122 Sample uses process hollowing technique 29->122 38 Broom.exe 29->38         started        40 GIbctA8Pit7D5Rglp3gMKBx1.exe 29->40         started        42 Broom.exe 29->42         started        44 Broom.exe 29->44         started        file11 signatures12 process13 dnsIp14 134 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 31->134 136 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 31->136 138 Maps a DLL or memory area into another process 31->138 142 2 other signatures 31->142 90 142.250.217.110 GOOGLEUS United States 34->90 92 172.217.14.225 GOOGLEUS United States 34->92 62 C:\Users\user\AppData\...\3386052073.exe, PE32 34->62 dropped 64 C:\Users\user\AppData\Local\...\s51[1], PE32 34->64 dropped 66 C:\Users\user\AppData\Local\...\s51[1], PE32 34->66 dropped 140 Multi AV Scanner detection for dropped file 38->140 68 Opera_installer_2311082222203657424.dll, PE32 40->68 dropped file15 signatures16
Threat name:
Win32.Trojan.Nekark
Status:
Malicious
First seen:
2023-11-08 22:21:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
2
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:glupteba family:smokeloader family:xmrig botnet:pub1 backdoor dropper evasion loader miner themida trojan upx
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
Program crash
Launches sc.exe
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Drops startup file
Themida packer
UPX packed file
Windows security modification
Downloads MZ/PE file
Modifies Windows Firewall
Possible attempt to disable PatchGuard
Stops running service(s)
Modifies boot configuration data using bcdedit
XMRig Miner payload
Amadey
Glupteba
Glupteba payload
SmokeLoader
UAC bypass
Windows security bypass
xmrig
Malware Config
C2 Extraction:
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
6b7cf162d96a184fafb15863beaeacd03bc61e764076fb87f5c2380d74440f00
MD5 hash:
e1ba6a22448989150f8312340ffef2f1
SHA1 hash:
16550ffb3d9f0d977c6d6b0bea4f885497495462
SH256 hash:
c2204454facf5a10af80ecbdfd133ab7625fb82bd7ec49ee4d1ee095314b375b
MD5 hash:
f11af7244e4f71c21afb36cbdb86cc2e
SHA1 hash:
dd50e91a4c8573620b43aea80723d84ae6d4d59b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe c2204454facf5a10af80ecbdfd133ab7625fb82bd7ec49ee4d1ee095314b375b

(this sample)

  
Delivery method
Distributed via web download

Comments