MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ea1b3c17d3d6f443f1b70b9ce37afb5ed8558cde46c1d9f96748c14aa2b141b4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: ea1b3c17d3d6f443f1b70b9ce37afb5ed8558cde46c1d9f96748c14aa2b141b4
SHA3-384 hash: d601682ccc296ee7a0b2190bfa5530264b487a3851b996df8c85cbef80d4ef0ae340f27f4ef1463c9e10af29ab1c34dc
SHA1 hash: 5712244e1de1708289bfabf36c5e3236050f23ca
MD5 hash: de25bda4d1e922f4d45b077d47eb6ecd
humanhash: item-victor-leopard-fanta
File name:setup (2).exe
Download: download sample
Signature Smoke Loader
File size:138'240 bytes
First seen:2020-07-14 08:02:13 UTC
Last seen:2020-07-14 09:07:36 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 90b3c2482e648bda6caf8e35c6aa8e44 (2 x Gozi, 1 x Smoke Loader)
ssdeep 1536:UjBytKEj63AxSutPRw7K0k8B5UV38mTC4CmOsQn+hOK56z1aLtRbSmyI:O4vFgB5Up8mTC4lQnBxaPG
TLSH 81D3AE16BA91C133C49A2574592BC3E0563FFC326FB988877B98172F5F702E15A3931A
Reporter JAMESWT_WT
Tags:Gozi isfb Smoke Loader Ursnif

Intelligence


File Origin
# of uploads :
3
# of downloads :
404
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Connection attempt
Sending an HTTP POST request
Connection attempt to an infection source
Deleting of the original file
Enabling autorun with Startup directory
Sending an HTTP POST request to an infection source
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-07-14 07:06:04 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
28 of 31 (90.32%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Program crash
Loads dropped DLL
Loads dropped DLL
Suspicious use of NtCreateProcessExOtherParentProcess
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe ea1b3c17d3d6f443f1b70b9ce37afb5ed8558cde46c1d9f96748c14aa2b141b4

(this sample)

  
Delivery method
Distributed via web download

Comments