MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c5061cf2961513f91ee1b2c0f50bf8a11928ac068b02ba825b3b0410de507224. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Smoke Loader
Vendor detections: 13
| SHA256 hash: | c5061cf2961513f91ee1b2c0f50bf8a11928ac068b02ba825b3b0410de507224 |
|---|---|
| SHA3-384 hash: | 3db1799df0e79c26857179525174b2c9c943ab89c2e3a0876106f508dd0039fc73e2b638b05e62f6bdb7565b28c097cc |
| SHA1 hash: | 6bc2c9ba8eabbe20aa085a98650e650c93cb2d80 |
| MD5 hash: | 26d975ba6e82d9065fd57a6167c7529c |
| humanhash: | fillet-colorado-colorado-paris |
| File name: | win_setup__62172037f1144.exe |
| Download: | download sample |
| Signature | Smoke Loader |
| File size: | 6'303'502 bytes |
| First seen: | 2022-02-24 06:22:58 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox) |
| ssdeep | 196608:J2Fc4DaxrhVRuRMXJXO1peG4i8hPCDTlFAq:J3VFVRUUG458gq |
| Threatray | 5'999 similar samples on MalwareBazaar |
| TLSH | T1BE5633982728F513C9DB8337AB74C27BB25FA82E2CE9C221A95505FC315B9111DEC6CD |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | Arkei exe Loader Smoke Loader vidar |
Intelligence
File Origin
# of uploads :
1
# of downloads :
256
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
win_setup__62172037f1144.exe
Verdict:
Malicious activity
Analysis date:
2022-02-24 06:18:25 UTC
Tags:
loader trojan evasion stealer arkei vidar
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
DLInjector03
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
Launching a process
Using the Windows Management Instrumentation requests
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
MassLogger
Verdict:
Malicious
Result
Threat name:
SmokeLoader gzRat onlyLogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Disables Windows Defender (via service or powershell)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has a writeable .text section
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected gzRat
Yara detected onlyLogger
Yara detected SmokeLoader
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2022-02-24 06:25:24 UTC
File Type:
PE (Exe)
Extracted files:
772
AV detection:
29 of 43 (67.44%)
Threat level:
5/5
Verdict:
malicious
Similar samples:
+ 5'989 additional samples on MalwareBazaar
Result
Malware family:
smokeloader
Score:
10/10
Tags:
family:icedid family:redline family:smokeloader botnet:mediam10 campaign:2715004312 aspackv2 backdoor banker discovery infostealer persistence spyware stealer suricata trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
IcedID, BokBot
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
suricata: ET MALWARE Danabot Key Exchange Request
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Win32/IcedID Request Cookie
Malware Config
C2 Extraction:
http://pjure.at/upload/
http://puffersweiven.com/upload/
http://algrcabel.ru/upload/
http://pelangiqq99.com/upload/
http://elsaunny.com/upload/
http://korphoto.com/upload/
http://hangxachtaythodoan.com/upload/
http://pkodev.net/upload/
http://go-piratia.ru/upload/
http://piratia.su/upload/
92.255.57.154:11841
http://puffersweiven.com/upload/
http://algrcabel.ru/upload/
http://pelangiqq99.com/upload/
http://elsaunny.com/upload/
http://korphoto.com/upload/
http://hangxachtaythodoan.com/upload/
http://pkodev.net/upload/
http://go-piratia.ru/upload/
http://piratia.su/upload/
92.255.57.154:11841
Unpacked files
SH256 hash:
565cb30a640d5cb469f9d93c969aab083fa14dfdf983411c132927665531795c
MD5 hash:
83b531c1515044f8241cd9627fbfbe86
SHA1 hash:
d2f7096e18531abb963fc9af7ecc543641570ac8
SH256 hash:
e718a2f50e72d94ee2c9455603d98f67e7705aefc283351c182b5e503d59f6d8
MD5 hash:
5264c8567cf762e7cd37971a88b28a45
SHA1 hash:
ffd23a453665086713bbeccf0029c5b026d4c47e
SH256 hash:
ae70a44fb6f41849c1d172cb014f49e051ea0026081b2fe9a1e2435e915a9cb9
MD5 hash:
926a4b8efe315601b475294634fd4abb
SHA1 hash:
e1b0f27502667c88019bd9ffbb35ed998b8d7ab5
SH256 hash:
ea3a7b3ef0d08e1c18a278f0f083ed4775af52c9ce203c160bde49e6602efbba
MD5 hash:
5918f0958c8161f0ee088c5bf8ad6f1d
SHA1 hash:
dc9215b471b143326f2ce70ffd4655ed863f2741
SH256 hash:
4e74cea2ca9812abe91f771fbbb2f37e75dad636db41ba08c085a94c7483aca3
MD5 hash:
17fefd8a88888edaf8fece1983cc8774
SHA1 hash:
a8f0e80f4bc8186bbdc96746bf1f4a3fdb4e0854
SH256 hash:
aa1c11a68754f95c6a85836d36c54e67ae73911b93bb3d636407e6078f2996d6
MD5 hash:
77380617c7b4b568ab0b81e08b5cfb67
SHA1 hash:
7f18e00aff08308086f73ffa81c570291eb56ecf
SH256 hash:
590a2494df4e9e810c2cd363a41358ab9353a446a33cee219f1275a1e2eee465
MD5 hash:
390cb757c0b833feccdda7c0ac7dea37
SHA1 hash:
542854ce4feb59444aecf0fda4ad448b30186b2c
SH256 hash:
1e1b88917caca089c221b345ec96fadd71bedee81ac40f993357ef028256d1a3
MD5 hash:
90fd3a966ecfb505b8d48a159be2f986
SHA1 hash:
5288cf70771ae8b8e41517f640b925b1a0d1fa10
SH256 hash:
abca3ef4971ea9cf196e429902da91fb3f0db2b502ed8dbe33bee639bb4d0b2c
MD5 hash:
e63b0af4990bdfb854b09570164175e1
SHA1 hash:
2363fd653143e88f92e8bc388d7cc5ed28e66ac2
SH256 hash:
721d393191597d49d856baef2fbde75e48f52d0465e2cfabf1a41848b0e05589
MD5 hash:
b984a027c8a2abf874f3eb306a831613
SHA1 hash:
d3b3f8890adc840b0bd411cf304eef15d415ed48
Parent samples :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 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
2b41b520be53f58a77ef5c233b790c80ba0e706fe89d56f3ddcc0be050f9904d
MD5 hash:
a87945030a7ca3d8a2374102c8f7d7ee
SHA1 hash:
712ce4d68e80d5fa2398078d27097a0b371f67d5
SH256 hash:
245a869dc8a9bcb2190b5da3ea234740d79798385784e8db7aa3f2d2745192aa
MD5 hash:
4f93004835598b36011104e6f25dbdba
SHA1 hash:
6cb45092356c54f68d26f959e4a05ce80ef28483
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
e16f68152fa7be7dd8aff55aeff59ddeae48b4b95e3d3ba33016f65e632a6706
MD5 hash:
a8e7034f8220f722f4aca2edcc9c42eb
SHA1 hash:
656d7d88fffd3820deb1741564807990c3851114
SH256 hash:
2c53c259b3a767125bb41de47a7696b730ad44f4883736486c9d0a83c83ed4e2
MD5 hash:
d8f9bd9156d17c72f56abd79954704ed
SHA1 hash:
12547300510e3ca72cf03e4c4877d6a87762a15a
SH256 hash:
950a04080d516390ae8e950fe39bea431a7af50ce70cc6c29e19f90de1a063fd
MD5 hash:
c1856042565427ee066c090ff4bcfbef
SHA1 hash:
a1cf16f4563f26161314924c1f38cab9823b15ea
SH256 hash:
3424adc44eb980df91d1de4c8f9b4f3cc6194a7d4d1ed61496bc4a46c30ecd63
MD5 hash:
16954e74f8a440a5a860f85dfc5368a0
SHA1 hash:
25e2258a6aa748fe97e4f26cc22fe189da5bbecd
SH256 hash:
bddcffcb3d5ecc478264a0775ad6a2bb9fcdc2bfb087001d6a6bf9179a7244dd
MD5 hash:
9f9b617aea234cb453c352246e9025f7
SHA1 hash:
7529c3306ccab7cd9226fb03223c956665ae4417
SH256 hash:
eae05b3fe28ca9ed10245f0fe631b51d108166460f10431a3512115637078fbc
MD5 hash:
6f5a87625eb57d5b88eb0daac54f8775
SHA1 hash:
f071f3e818fa425d4b57856f8946d24237bece60
SH256 hash:
82a9f4cf54a54f5a970b30e04a5aa92e62d021f2f4fdba1040c3d55953f042b8
MD5 hash:
9167fe496b93c2e08ae452cbf5d10fc8
SHA1 hash:
eea9be3633946f1a9fd87b667c237bdb7a75891e
SH256 hash:
171994f6437a6d195178f48841617665e4fa505b7a9b2525a907756d12a3cfd3
MD5 hash:
a43effe03383c455fb5c58fe0a737eaa
SHA1 hash:
35ab37a9a2e037fee57c1256366158c98bb23cbf
SH256 hash:
c5061cf2961513f91ee1b2c0f50bf8a11928ac068b02ba825b3b0410de507224
MD5 hash:
26d975ba6e82d9065fd57a6167c7529c
SHA1 hash:
6bc2c9ba8eabbe20aa085a98650e650c93cb2d80
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.