MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ca747dce51bbf9ebd7076df13879ebb2a33bdc2a0d67d00866e5d439b67202e5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments

SHA256 hash: ca747dce51bbf9ebd7076df13879ebb2a33bdc2a0d67d00866e5d439b67202e5
SHA3-384 hash: b30072ef9266ed27ebd2a8dc008ecde2982586c96f0033c454c3f2269dd4bd886187022b285610c6752b50f27381ff9b
SHA1 hash: 9ba10190d11b44f1878a8f841840db01ef89055a
MD5 hash: dea4e115fcde661062b4fad5f9568993
humanhash: william-glucose-tennis-fourteen
File name:dea4e115fcde661062b4fad5f9568993.exe
Download: download sample
Signature Smoke Loader
File size:1'000'960 bytes
First seen:2023-04-04 05:36:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'470 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:fB0C81w64LDq/i5zgHM0BxYCfXN8EQ9s/cdoQ1KMVfRx7pLXzjSYctQ7XpYyJFf9:jKTnwMm4M1Rl5XzliraFf4JiQxfxKFr
TLSH T112256D797B779613C1BDCE31CAF24400A3F1C54B7222EA1B2EDE12C50A13B9E698759D
TrID 60.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.8% (.SCR) Windows screen saver (13097/50/3)
8.7% (.EXE) Win64 Executable (generic) (10523/12/4)
5.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter abuse_ch
Tags:Dofoil exe Smoke Loader

Intelligence


File Origin
# of uploads :
1
# of downloads :
231
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
dea4e115fcde661062b4fad5f9568993.exe
Verdict:
Malicious activity
Analysis date:
2023-04-04 05:38:20 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Unauthorized injection to a recently created process
Creating a file
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
comodo packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Eternity Worm, SmokeLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected Eternity Worm
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 840712 Sample: lMSVoNR44K.exe Startdate: 04/04/2023 Architecture: WINDOWS Score: 100 62 akmedia.in 2->62 70 Malicious sample detected (through community Yara rule) 2->70 72 Antivirus detection for URL or domain 2->72 74 Multi AV Scanner detection for submitted file 2->74 76 8 other signatures 2->76 12 lMSVoNR44K.exe 3 2->12         started        16 tujjveh 3 2->16         started        18 5F24.exe 2->18         started        signatures3 process4 file5 60 C:\Users\user\AppData\...\lMSVoNR44K.exe.log, ASCII 12->60 dropped 98 Injects a PE file into a foreign processes 12->98 20 lMSVoNR44K.exe 12->20         started        100 Multi AV Scanner detection for dropped file 16->100 102 Machine Learning detection for dropped file 16->102 23 tujjveh 16->23         started        signatures6 process7 signatures8 78 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 20->78 80 Maps a DLL or memory area into another process 20->80 82 Checks if the current machine is a virtual machine (disk enumeration) 20->82 25 explorer.exe 1 6 20->25 injected 84 Creates a thread in another existing process (thread injection) 23->84 process9 dnsIp10 64 akmedia.in 192.185.150.20, 49700, 49702, 80 UNIFIEDLAYER-AS-1US United States 25->64 66 167.88.170.23, 49701, 49703, 80 PONYNETUS United States 25->66 54 C:\Users\user\AppData\Roaming\tujjveh, PE32 25->54 dropped 56 C:\Users\user\AppData\Local\Temp\5F24.exe, PE32 25->56 dropped 58 C:\Users\user\...\tujjveh:Zone.Identifier, ASCII 25->58 dropped 90 System process connects to network (likely due to code injection or exploit) 25->90 92 Benign windows process drops PE files 25->92 94 Injects code into the Windows Explorer (explorer.exe) 25->94 96 3 other signatures 25->96 30 5F24.exe 3 25->30         started        33 explorer.exe 24 25->33         started        35 explorer.exe 25->35         started        file11 signatures12 process13 signatures14 104 Multi AV Scanner detection for dropped file 30->104 106 Machine Learning detection for dropped file 30->106 108 Injects a PE file into a foreign processes 30->108 37 5F24.exe 3 30->37         started        110 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 33->110 112 Tries to steal Mail credentials (via file / registry access) 33->112 114 Tries to harvest and steal browser information (history, passwords, etc) 33->114 process15 file16 52 C:\Users\user\AppData\Local\...\5F24.exe, PE32 37->52 dropped 40 cmd.exe 37->40         started        process17 signatures18 86 Uses schtasks.exe or at.exe to add and modify task schedules 40->86 88 Uses ping.exe to check the status of other devices and networks 40->88 43 PING.EXE 40->43         started        46 conhost.exe 40->46         started        48 chcp.com 40->48         started        50 2 other processes 40->50 process19 dnsIp20 68 127.0.0.1 unknown unknown 43->68
Threat name:
ByteCode-MSIL.Trojan.Pwsx
Status:
Malicious
First seen:
2023-04-04 05:37:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader botnet:swo backdoor trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Program crash
Suspicious use of SetThreadContext
SmokeLoader
Malware Config
C2 Extraction:
http://akmedia.in/js/k/index.php
http://bethesdaserukam.org/setting/k/index.php
http://stemschools.in/js/k/index.php
http://dejarestaurant.com/wp-admin/js/k/index.php
http://moabscript.ir/wp-admin/js/k/index.php
http://nicehybridseeds.com/image/catalog/k/index.php
http://imaker.io/picktail/js/k/index.php
http://nanavatisworld.com/assets/js/k/index.php
http://smartbubox.com/img/k/index.php
http://krigenpharmaceuticals.com/js/k/index.php
Unpacked files
SH256 hash:
ea8d4c91ec5bba5e1db6c17730d7ba5cdbb5ff3c1a777f70c90e91ce599d9b5d
MD5 hash:
27f5124bf8f451bca8d8a15c73c4f521
SHA1 hash:
5fd557e109b8fd1c3b362b64f0ba9f1600c07211
SH256 hash:
6b44d0487a782400a24e3f10bdcb36768444f78dc09a4b741fd7d9d7ab044844
MD5 hash:
e042ceb31cdf29551dd1fcde62b60aac
SHA1 hash:
2b7023e4ea1faec13a3a23e1947703dd64a0d791
SH256 hash:
583e70a21cddbef30ca9ac7ca3a6dfde6d26a132a0ac1590c33f31e5abbf739d
MD5 hash:
fd8deb1de1046de23a2ea702a6198643
SHA1 hash:
0e780b5e776c0150a84b947ba558654b560d9c6a
SH256 hash:
ca747dce51bbf9ebd7076df13879ebb2a33bdc2a0d67d00866e5d439b67202e5
MD5 hash:
dea4e115fcde661062b4fad5f9568993
SHA1 hash:
9ba10190d11b44f1878a8f841840db01ef89055a
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Suspicious_Macro_Presence
Author:Mehmet Ali Kerimoglu (CYB3RMX)
Description:This rule detects common malicious/suspicious implementations.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe ca747dce51bbf9ebd7076df13879ebb2a33bdc2a0d67d00866e5d439b67202e5

(this sample)

  
Delivery method
Distributed via web download

Comments