MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c5061cf2961513f91ee1b2c0f50bf8a11928ac068b02ba825b3b0410de507224. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: c5061cf2961513f91ee1b2c0f50bf8a11928ac068b02ba825b3b0410de507224
SHA3-384 hash: 3db1799df0e79c26857179525174b2c9c943ab89c2e3a0876106f508dd0039fc73e2b638b05e62f6bdb7565b28c097cc
SHA1 hash: 6bc2c9ba8eabbe20aa085a98650e650c93cb2d80
MD5 hash: 26d975ba6e82d9065fd57a6167c7529c
humanhash: fillet-colorado-colorado-paris
File name:win_setup__62172037f1144.exe
Download: download sample
Signature Smoke Loader
File size:6'303'502 bytes
First seen:2022-02-24 06:22:58 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 196608:J2Fc4DaxrhVRuRMXJXO1peG4i8hPCDTlFAq:J3VFVRUUG458gq
Threatray 5'999 similar samples on MalwareBazaar
TLSH T1BE5633982728F513C9DB8337AB74C27BB25FA82E2CE9C221A95505FC315B9111DEC6CD
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter adm1n_usa32
Tags:Arkei exe Loader Smoke Loader vidar


Avatar
adm1n_usa32
holy shit! thats one hell of a trojan!

Intelligence


File Origin
# of uploads :
1
# of downloads :
256
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
win_setup__62172037f1144.exe
Verdict:
Malicious activity
Analysis date:
2022-02-24 06:18:25 UTC
Tags:
loader trojan evasion stealer arkei vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
Launching a process
Using the Windows Management Instrumentation requests
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
SmokeLoader gzRat onlyLogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Disables Windows Defender (via service or powershell)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has a writeable .text section
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected gzRat
Yara detected onlyLogger
Yara detected SmokeLoader
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 577867 Sample: win_setup__62172037f1144.exe Startdate: 24/02/2022 Architecture: WINDOWS Score: 100 157 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->157 159 Multi AV Scanner detection for domain / URL 2->159 161 Malicious sample detected (through community Yara rule) 2->161 163 17 other signatures 2->163 11 win_setup__62172037f1144.exe 10 2->11         started        14 WmiPrvSE.exe 2->14         started        process3 file4 107 C:\Users\user\AppData\...\setup_installer.exe, PE32 11->107 dropped 16 setup_installer.exe 20 11->16         started        process5 file6 69 C:\Users\user\AppData\...\setup_install.exe, PE32 16->69 dropped 71 C:\Users\...\6217201c0e85e_Thu065f484f1d4.exe, PE32 16->71 dropped 73 C:\Users\...\6217201b0e9d9_Thu06199180e6.exe, PE32 16->73 dropped 75 15 other files (8 malicious) 16->75 dropped 19 setup_install.exe 1 16->19         started        process7 signatures8 165 Adds a directory exclusion to Windows Defender 19->165 22 cmd.exe 19->22         started        24 cmd.exe 1 19->24         started        26 cmd.exe 19->26         started        28 11 other processes 19->28 process9 signatures10 31 6217201969def_Thu06697308cf.exe 22->31         started        36 6217200e4b17b_Thu06f70b91.exe 1 24->36         started        38 6217203114697_Thu06b1526133.exe 26->38         started        167 Adds a directory exclusion to Windows Defender 28->167 169 Disables Windows Defender (via service or powershell) 28->169 40 6217200f43696_Thu0624a7e6b.exe 28->40         started        42 6217201c0e85e_Thu065f484f1d4.exe 28->42         started        44 62172014ae58b_Thu06114123013a.exe 28->44         started        46 7 other processes 28->46 process11 dnsIp12 119 ip-api.com 208.95.112.1, 49746, 80 TUT-ASUS United States 31->119 121 45.136.151.102 ENZUINC-US Latvia 31->121 77 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 31->77 dropped 127 Antivirus detection for dropped file 31->127 129 May check the online IP address of the machine 31->129 131 Machine Learning detection for dropped file 31->131 48 11111.exe 31->48         started        133 Multi AV Scanner detection for dropped file 36->133 135 Detected unpacking (changes PE section rights) 36->135 137 Disables Windows Defender (via service or powershell) 36->137 52 cmd.exe 36->52         started        123 duoproc.net 185.18.52.211, 49748, 49752, 49755 WORLDSTREAMNL Spain 38->123 79 C:\Users\user\AppData\Local\Temp\7G0CI.exe, PE32 38->79 dropped 81 C:\Users\user\AppData\Local\Temp\6BDAD.exe, PE32 38->81 dropped 83 C:\Users\user\AppData\Local\Temp\3I3MJ.exe, PE32 38->83 dropped 91 4 other files (2 malicious) 38->91 dropped 125 one-wedding-film.com 172.67.217.187, 49747, 80 CLOUDFLARENETUS United States 40->125 85 f74f35b8-f532-4698-8997-5070d3dc160c.exe, PE32 40->85 dropped 87 C:\Users\...\6217201c0e85e_Thu065f484f1d4.tmp, PE32 42->87 dropped 139 Obfuscated command line found 42->139 54 6217201c0e85e_Thu065f484f1d4.tmp 42->54         started        141 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 44->141 143 Checks if the current machine is a virtual machine (disk enumeration) 44->143 57 explorer.exe 44->57 injected 89 C:\Users\...\6217201374cfe_Thu06663dd50e4.tmp, PE32 46->89 dropped 145 Creates processes via WMI 46->145 147 Injects a PE file into a foreign processes 46->147 59 62172010b0ec0_Thu0697a8ef.exe 46->59         started        61 6217201374cfe_Thu06663dd50e4.tmp 46->61         started        63 6217201b0e9d9_Thu06199180e6.exe 46->63         started        65 WerFault.exe 46->65         started        file13 signatures14 process15 dnsIp16 109 192.168.2.1 unknown unknown 48->109 149 Multi AV Scanner detection for dropped file 48->149 151 Machine Learning detection for dropped file 48->151 153 Tries to harvest and steal browser information (history, passwords, etc) 48->153 155 Disables Windows Defender (via service or powershell) 52->155 67 powershell.exe 52->67         started        111 s3.pl-waw.scw.cloud 151.115.10.1, 49753, 80 OnlineSASFR United Kingdom 54->111 113 tamayo.s3.pl-waw.scw.cloud 54->113 93 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 54->93 dropped 95 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 54->95 dropped 97 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 54->97 dropped 99 C:\Users\user\AppData\...\5(6665____.exe, PE32 54->99 dropped 115 v.xyzgamev.com 104.21.40.196, 443, 49751 CLOUDFLARENETUS United States 59->115 117 172.67.188.70, 443, 49754 CLOUDFLARENETUS United States 59->117 101 C:\Users\user\AppData\Local\Temp\db.dll, PE32 59->101 dropped 103 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 61->103 dropped 105 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 61->105 dropped file17 signatures18 process19
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2022-02-24 06:25:24 UTC
File Type:
PE (Exe)
Extracted files:
772
AV detection:
29 of 43 (67.44%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:icedid family:redline family:smokeloader botnet:mediam10 campaign:2715004312 aspackv2 backdoor banker discovery infostealer persistence spyware stealer suricata trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
IcedID, BokBot
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
suricata: ET MALWARE Danabot Key Exchange Request
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Win32/IcedID Request Cookie
Malware Config
C2 Extraction:
http://pjure.at/upload/
http://puffersweiven.com/upload/
http://algrcabel.ru/upload/
http://pelangiqq99.com/upload/
http://elsaunny.com/upload/
http://korphoto.com/upload/
http://hangxachtaythodoan.com/upload/
http://pkodev.net/upload/
http://go-piratia.ru/upload/
http://piratia.su/upload/
92.255.57.154:11841
Unpacked files
SH256 hash:
565cb30a640d5cb469f9d93c969aab083fa14dfdf983411c132927665531795c
MD5 hash:
83b531c1515044f8241cd9627fbfbe86
SHA1 hash:
d2f7096e18531abb963fc9af7ecc543641570ac8
SH256 hash:
e718a2f50e72d94ee2c9455603d98f67e7705aefc283351c182b5e503d59f6d8
MD5 hash:
5264c8567cf762e7cd37971a88b28a45
SHA1 hash:
ffd23a453665086713bbeccf0029c5b026d4c47e
SH256 hash:
ae70a44fb6f41849c1d172cb014f49e051ea0026081b2fe9a1e2435e915a9cb9
MD5 hash:
926a4b8efe315601b475294634fd4abb
SHA1 hash:
e1b0f27502667c88019bd9ffbb35ed998b8d7ab5
SH256 hash:
ea3a7b3ef0d08e1c18a278f0f083ed4775af52c9ce203c160bde49e6602efbba
MD5 hash:
5918f0958c8161f0ee088c5bf8ad6f1d
SHA1 hash:
dc9215b471b143326f2ce70ffd4655ed863f2741
SH256 hash:
4e74cea2ca9812abe91f771fbbb2f37e75dad636db41ba08c085a94c7483aca3
MD5 hash:
17fefd8a88888edaf8fece1983cc8774
SHA1 hash:
a8f0e80f4bc8186bbdc96746bf1f4a3fdb4e0854
SH256 hash:
aa1c11a68754f95c6a85836d36c54e67ae73911b93bb3d636407e6078f2996d6
MD5 hash:
77380617c7b4b568ab0b81e08b5cfb67
SHA1 hash:
7f18e00aff08308086f73ffa81c570291eb56ecf
SH256 hash:
590a2494df4e9e810c2cd363a41358ab9353a446a33cee219f1275a1e2eee465
MD5 hash:
390cb757c0b833feccdda7c0ac7dea37
SHA1 hash:
542854ce4feb59444aecf0fda4ad448b30186b2c
SH256 hash:
1e1b88917caca089c221b345ec96fadd71bedee81ac40f993357ef028256d1a3
MD5 hash:
90fd3a966ecfb505b8d48a159be2f986
SHA1 hash:
5288cf70771ae8b8e41517f640b925b1a0d1fa10
SH256 hash:
abca3ef4971ea9cf196e429902da91fb3f0db2b502ed8dbe33bee639bb4d0b2c
MD5 hash:
e63b0af4990bdfb854b09570164175e1
SHA1 hash:
2363fd653143e88f92e8bc388d7cc5ed28e66ac2
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
2b41b520be53f58a77ef5c233b790c80ba0e706fe89d56f3ddcc0be050f9904d
MD5 hash:
a87945030a7ca3d8a2374102c8f7d7ee
SHA1 hash:
712ce4d68e80d5fa2398078d27097a0b371f67d5
SH256 hash:
245a869dc8a9bcb2190b5da3ea234740d79798385784e8db7aa3f2d2745192aa
MD5 hash:
4f93004835598b36011104e6f25dbdba
SHA1 hash:
6cb45092356c54f68d26f959e4a05ce80ef28483
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
e16f68152fa7be7dd8aff55aeff59ddeae48b4b95e3d3ba33016f65e632a6706
MD5 hash:
a8e7034f8220f722f4aca2edcc9c42eb
SHA1 hash:
656d7d88fffd3820deb1741564807990c3851114
SH256 hash:
2c53c259b3a767125bb41de47a7696b730ad44f4883736486c9d0a83c83ed4e2
MD5 hash:
d8f9bd9156d17c72f56abd79954704ed
SHA1 hash:
12547300510e3ca72cf03e4c4877d6a87762a15a
SH256 hash:
950a04080d516390ae8e950fe39bea431a7af50ce70cc6c29e19f90de1a063fd
MD5 hash:
c1856042565427ee066c090ff4bcfbef
SHA1 hash:
a1cf16f4563f26161314924c1f38cab9823b15ea
SH256 hash:
3424adc44eb980df91d1de4c8f9b4f3cc6194a7d4d1ed61496bc4a46c30ecd63
MD5 hash:
16954e74f8a440a5a860f85dfc5368a0
SHA1 hash:
25e2258a6aa748fe97e4f26cc22fe189da5bbecd
SH256 hash:
bddcffcb3d5ecc478264a0775ad6a2bb9fcdc2bfb087001d6a6bf9179a7244dd
MD5 hash:
9f9b617aea234cb453c352246e9025f7
SHA1 hash:
7529c3306ccab7cd9226fb03223c956665ae4417
SH256 hash:
eae05b3fe28ca9ed10245f0fe631b51d108166460f10431a3512115637078fbc
MD5 hash:
6f5a87625eb57d5b88eb0daac54f8775
SHA1 hash:
f071f3e818fa425d4b57856f8946d24237bece60
SH256 hash:
82a9f4cf54a54f5a970b30e04a5aa92e62d021f2f4fdba1040c3d55953f042b8
MD5 hash:
9167fe496b93c2e08ae452cbf5d10fc8
SHA1 hash:
eea9be3633946f1a9fd87b667c237bdb7a75891e
SH256 hash:
171994f6437a6d195178f48841617665e4fa505b7a9b2525a907756d12a3cfd3
MD5 hash:
a43effe03383c455fb5c58fe0a737eaa
SHA1 hash:
35ab37a9a2e037fee57c1256366158c98bb23cbf
SH256 hash:
c5061cf2961513f91ee1b2c0f50bf8a11928ac068b02ba825b3b0410de507224
MD5 hash:
26d975ba6e82d9065fd57a6167c7529c
SHA1 hash:
6bc2c9ba8eabbe20aa085a98650e650c93cb2d80
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe c5061cf2961513f91ee1b2c0f50bf8a11928ac068b02ba825b3b0410de507224

(this sample)

Comments