MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e7c777cc2838334214d3349178f52cd2fdce9138cbd51de1c62bcc73a3478a4f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: e7c777cc2838334214d3349178f52cd2fdce9138cbd51de1c62bcc73a3478a4f
SHA3-384 hash: a788d0548859818e941f7ae7bec491f79fa1bfdf9fb18b829a4441c897fa4fdcd1f8638420964189767230d6791657aa
SHA1 hash: f18d00937420b7067b7aa1a5baa76ab4f9be5eb0
MD5 hash: 8ce6dfad5c809b7233a271368cf23be4
humanhash: wyoming-bakerloo-leopard-kitten
File name:f18d00937420b7067b7aa1a5baa76ab4f9be5eb0
Download: download sample
Signature Smoke Loader
File size:868'864 bytes
First seen:2020-07-17 13:28:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash afcdf79be1557326c854b6e20cb900a7 (1'102 x FormBook, 936 x AgentTesla, 399 x RemcosRAT)
ssdeep 24576:3AHnh+eWsN3skA4RV1Hom2KXMmHaR125:qh+ZkldoPK8YaRO
Threatray 152 similar samples on MalwareBazaar
TLSH C5057B0273D1C036FFABA2739B6AF60556BC79254133852F13981DB9BD701B2263E663
Reporter JAMESWT_WT
Tags:Smoke Loader

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Launching the default Windows debugger (dwwin.exe)
Sending a TCP request to an infection source
Result
Threat name:
SmokeLoader
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
Bypasses PowerShell execution policy
Changes memory attributes in foreign processes to executable or writable
Connects to a pastebin service (likely for C&C)
Creates a thread in another existing process (thread injection)
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hijacks the control flow in another process
Injects code into the Windows Explorer (explorer.exe)
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Very long command line found
Writes to foreign memory regions
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 246730 Sample: 4ahsBOyBIX Startdate: 18/07/2020 Architecture: WINDOWS Score: 100 67 Malicious sample detected (through community Yara rule) 2->67 69 Multi AV Scanner detection for submitted file 2->69 71 Yara detected SmokeLoader 2->71 73 5 other signatures 2->73 11 4ahsBOyBIX.exe 2->11         started        14 grcihahr.exe 2 2->14         started        process3 signatures4 93 Very long command line found 11->93 95 Binary is likely a compiled AutoIt script file 11->95 16 powershell.exe 9 11->16         started        19 conhost.exe 14->19         started        process5 signatures6 65 Very long command line found 16->65 21 powershell.exe 15 16 16->21         started        24 conhost.exe 16->24         started        process7 dnsIp8 59 paste.ee 104.18.48.20, 443, 49735 CLOUDFLARENETUS United States 21->59 26 MSBuild.exe 21->26         started        process9 signatures10 91 Maps a DLL or memory area into another process 26->91 29 explorer.exe 4 26->29 injected process11 dnsIp12 61 logixstreak.com 166.62.10.184, 49737, 80 AS-26496-GO-DADDY-COM-LLCUS United States 29->61 63 www.msftncsi.com 29->63 57 C:\Users\user\AppData\...\grcihahr.exe, PE32 29->57 dropped 97 Benign windows process drops PE files 29->97 99 Injects code into the Windows Explorer (explorer.exe) 29->99 101 Writes to foreign memory regions 29->101 103 Hides that the sample has been downloaded from the Internet (zone.identifier) 29->103 34 explorer.exe 29->34         started        37 explorer.exe 29->37         started        39 explorer.exe 29->39         started        41 9 other processes 29->41 file13 signatures14 process15 signatures16 75 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 34->75 77 Hijacks the control flow in another process 34->77 79 Changes memory attributes in foreign processes to executable or writable 34->79 43 RadgqWZdoYifFhhFoB.exe 34->43 injected 45 RadgqWZdoYifFhhFoB.exe 34->45 injected 47 RadgqWZdoYifFhhFoB.exe 34->47 injected 81 Writes to foreign memory regions 37->81 83 Maps a DLL or memory area into another process 37->83 85 Creates a thread in another existing process (thread injection) 37->85 49 RadgqWZdoYifFhhFoB.exe 37->49 injected 51 sihost.exe 39->51 injected 53 taskhostw.exe 39->53 injected 55 ShellExperienceHost.exe 39->55 injected 87 Tries to steal Mail credentials (via file access) 41->87 89 Tries to harvest and steal browser information (history, passwords, etc) 41->89 process17
Threat name:
Win32.Trojan.Povertel
Status:
Malicious
First seen:
2020-07-16 16:22:56 UTC
File Type:
PE (Exe)
Extracted files:
22
AV detection:
33 of 48 (68.75%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
trojan backdoor family:smokeloader
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
Drops file in System32 directory
Suspicious use of SetThreadContext
Maps connected drives based on registry
Blacklisted process makes network request
SmokeLoader
Malware Config
C2 Extraction:
http://185.35.137.147/mlp/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe e7c777cc2838334214d3349178f52cd2fdce9138cbd51de1c62bcc73a3478a4f

(this sample)

  
Delivery method
Distributed via web download

Comments