MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d49b370f904ed81206f425ffcb258c6e52d2de21cfd43d225506f2236e5f1f44. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: d49b370f904ed81206f425ffcb258c6e52d2de21cfd43d225506f2236e5f1f44
SHA3-384 hash: b0c4d55b86d766912c7e1a36f6696f578ca6e9614c196db401c5c4d23cfaa1ba53c980468a4b52b069098637e4f9e179
SHA1 hash: 38589a61a2cc2bd1894a432e631e6902ee006a3c
MD5 hash: 4c0d4640d3aeca243d6d285a8b17c7e9
humanhash: india-ceiling-lithium-uranus
File name:4c0d4640d3aeca243d6d285a8b17c7e9.exe
Download: download sample
Signature Smoke Loader
File size:504'320 bytes
First seen:2023-11-11 07:43:14 UTC
Last seen:2023-11-11 09:19:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 6144:+SapXYKsIzL/7zfHcvuk7AAG3RO9Hx8H4V1a+lzkbUb0Jaar/xSi9U+WUajXYU7e:+GAb7zf8vuO428YSgz4K0J3TIGaw9pD
TLSH T1C4B4022460BA6519E6F6C73F8FE073D4573A6023B706C656AD82E241BC9D7C78AC50B3
TrID 35.4% (.EXE) Win64 Executable (generic) (10523/12/4)
22.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.1% (.EXE) Win32 Executable (generic) (4505/5/1)
6.9% (.ICL) Windows Icons Library (generic) (2059/9)
6.8% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter abuse_ch
Tags:exe Smoke Loader

Intelligence


File Origin
# of uploads :
2
# of downloads :
283
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a process with a hidden window
Launching a process
Creating a file
DNS request
Sending a custom TCP request
Connecting to a non-recommended domain
Sending an HTTP GET request
Creating a process from a recently created file
Creating a file in the %temp% directory
Creating a window
Creating a file in the %AppData% subdirectories
Blocking the User Account Control
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a recently created process
Adding exclusions to Windows Defender
Adding an exclusion to Microsoft Defender
Unauthorized injection to a system process
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, SmokeLoader, Vidar
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Contains functionality to inject code into remote processes
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables UAC (registry)
Disables Windows Defender (deletes autostart)
Drops script or batch files to the startup folder
Found evasive API chain (may stop execution after checking computer name)
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sigma detected: Drops script at startup location
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected Glupteba
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1341037 Sample: u4WW2apAyA.exe Startdate: 11/11/2023 Architecture: WINDOWS Score: 100 94 Multi AV Scanner detection for domain / URL 2->94 96 Malicious sample detected (through community Yara rule) 2->96 98 Antivirus detection for URL or domain 2->98 100 17 other signatures 2->100 8 u4WW2apAyA.exe 2 4 2->8         started        11 cmd.exe 2->11         started        process3 signatures4 102 Writes to foreign memory regions 8->102 104 Allocates memory in foreign processes 8->104 106 Adds a directory exclusion to Windows Defender 8->106 108 2 other signatures 8->108 13 CasPol.exe 15 350 8->13         started        18 powershell.exe 21 8->18         started        20 conhost.exe 11->20         started        process5 dnsIp6 88 107.167.110.211 OPERASOFTWAREUS United States 13->88 90 107.167.110.216 OPERASOFTWAREUS United States 13->90 92 19 other IPs or domains 13->92 66 C:\Users\...\zyOWth4Y68ZiTb03NaDZ1SCZ.exe, PE32 13->66 dropped 68 C:\Users\...\zIgvAJHkDXFVg5FaKdfi3MHx.exe, PE32 13->68 dropped 70 C:\Users\...\yX71DoRh06ySETXci2YlxoFn.exe, PE32 13->70 dropped 72 291 other malicious files 13->72 dropped 136 Drops script or batch files to the startup folder 13->136 138 Creates HTML files with .exe extension (expired dropper behavior) 13->138 22 1K35bzTnWaMNLawrTEgGqCI2.exe 13->22         started        27 eeLbAY0yKmQbipLCSAJH4Ymb.exe 13->27         started        29 Qh8xRgBdRMgEcgWK6fR4RgEP.exe 13->29         started        33 29 other processes 13->33 31 conhost.exe 18->31         started        file7 signatures8 process9 dnsIp10 74 149.154.167.99 TELEGRAMRU United Kingdom 22->74 76 168.119.173.77 HETZNER-ASDE Germany 22->76 48 C:\Users\user\AppData\...\softokn3[1].dll, PE32 22->48 dropped 50 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 22->50 dropped 52 C:\Users\user\AppData\...\mozglue[1].dll, PE32 22->52 dropped 62 9 other files (5 malicious) 22->62 dropped 110 Detected unpacking (changes PE section rights) 22->110 112 Detected unpacking (overwrites its own PE header) 22->112 114 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 22->114 128 4 other signatures 22->128 84 3 other IPs or domains 27->84 54 C:\Windows\System32behaviorgraphroupPolicy\gpt.ini, ASCII 27->54 dropped 116 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 27->116 118 Query firmware table information (likely to detect VMs) 27->118 120 Tries to detect sandboxes and other dynamic analysis tools (window names) 27->120 130 2 other signatures 27->130 78 94.142.138.113 IHOR-ASRU Russian Federation 29->78 122 Disables Windows Defender (deletes autostart) 29->122 132 2 other signatures 29->132 80 107.167.110.217 OPERASOFTWAREUS United States 33->80 82 107.167.110.218 OPERASOFTWAREUS United States 33->82 86 4 other IPs or domains 33->86 56 Opera_installer_2311110752444057680.dll, PE32 33->56 dropped 58 Opera_installer_2311110752409727416.dll, PE32 33->58 dropped 60 Opera_installer_2311110752340686932.dll, PE32 33->60 dropped 64 15 other malicious files 33->64 dropped 124 Found Tor onion address 33->124 126 Contains functionality to inject code into remote processes 33->126 134 3 other signatures 33->134 35 Lt9vs9AP6uo6U3ldIG6rHHZD.exe 33->35         started        38 Ti3dOiJ8Iu6CAWB8RqtHafMk.exe 33->38         started        40 vtAOnJk7KL3fyh0onwfar47g.exe 33->40         started        file11 signatures12 process13 file14 42 Opera_installer_2311110753092257200.dll, PE32 35->42 dropped 44 Opera_installer_2311110752512657448.dll, PE32 38->44 dropped 46 Opera_installer_2311110752517687456.dll, PE32 40->46 dropped
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-11-10 20:08:18 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
8 of 38 (21.05%)
Threat level:
  2/5
Verdict:
unknown
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:dcrat family:glupteba family:smokeloader botnet:pub1 backdoor discovery dropper evasion infostealer loader persistence rat spyware stealer themida trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Modifies data under HKEY_USERS
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
System policy modification
Uses Task Scheduler COM API
Enumerates physical storage devices
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Enumerates connected drives
Legitimate hosting services abused for malware hosting/C2
Checks BIOS information in registry
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Themida packer
UPX packed file
Windows security modification
Downloads MZ/PE file
Modifies Windows Firewall
Identifies VirtualBox via ACPI registry values (likely anti-VM)
DcRat
Glupteba
Glupteba payload
SmokeLoader
UAC bypass
Windows security bypass
Malware Config
C2 Extraction:
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
d49b370f904ed81206f425ffcb258c6e52d2de21cfd43d225506f2236e5f1f44
MD5 hash:
4c0d4640d3aeca243d6d285a8b17c7e9
SHA1 hash:
38589a61a2cc2bd1894a432e631e6902ee006a3c
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe d49b370f904ed81206f425ffcb258c6e52d2de21cfd43d225506f2236e5f1f44

(this sample)

  
Delivery method
Distributed via web download

Comments