MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 efb3c9f650a8178b7a20476b6456707a9c0b3aeead9ef4af7cc12dd0f9d6cee4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: efb3c9f650a8178b7a20476b6456707a9c0b3aeead9ef4af7cc12dd0f9d6cee4
SHA3-384 hash: 921511a2d91681d5ec603466999db7765831701137712e8fddb30a873a33436ae270ccd37dd443ed1d1da0c571074e67
SHA1 hash: 1261c57973f98b23f08843969d1fdb329ee09b34
MD5 hash: 406a9c44a4b2776126d8b5fc78084c4c
humanhash: april-foxtrot-comet-finch
File name:SecuriteInfo.com.Trojan.Win32.Save.a.22290.1185
Download: download sample
Signature Smoke Loader
File size:218'112 bytes
First seen:2021-07-23 22:45:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d09a478840961ad890ac4dc4d59be69d (10 x Smoke Loader, 4 x RaccoonStealer, 2 x RedLineStealer)
ssdeep 3072:9cohY65XzOGbRpzzdARO7I0i17p70BPuxaWC8C:qUt5s8BPAn
Threatray 3'636 similar samples on MalwareBazaar
TLSH T1EB24BE01FAB0C8B2C0A4097048E9C6A067EDBC65BA70DE4777573B6F2E712D125AD25F
dhash icon 08b9b2b0e8c18890 (1 x RedLineStealer, 1 x Smoke Loader, 1 x Stop)
Reporter SecuriteInfoCom
Tags:exe Smoke Loader

Intelligence


File Origin
# of uploads :
1
# of downloads :
168
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Trojan.Win32.Save.a.22290.1185
Verdict:
Suspicious activity
Analysis date:
2021-07-23 22:47:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon RedLine SmokeLoader Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to steal Internet Explorer form passwords
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to resolve many domain names, but no domain seems valid
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file access)
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 453510 Sample: SecuriteInfo.com.Trojan.Win... Startdate: 24/07/2021 Architecture: WINDOWS Score: 100 66 xaiandaran.xyz 212.224.105.106, 49771, 80 DE-FIRSTCOLOwwwfirst-colonetDE Germany 2->66 68 readinglistforjuly10.xyz 2->68 70 2 other IPs or domains 2->70 92 Multi AV Scanner detection for domain / URL 2->92 94 System process connects to network (likely due to code injection or exploit) 2->94 96 Multi AV Scanner detection for submitted file 2->96 98 13 other signatures 2->98 10 SecuriteInfo.com.Trojan.Win32.Save.a.22290.exe 2->10         started        13 giadjub 2->13         started        signatures3 process4 signatures5 128 Detected unpacking (changes PE section rights) 10->128 130 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 10->130 15 SecuriteInfo.com.Trojan.Win32.Save.a.22290.exe 10->15         started        process6 signatures7 132 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 15->132 134 Maps a DLL or memory area into another process 15->134 136 Checks if the current machine is a virtual machine (disk enumeration) 15->136 138 Creates a thread in another existing process (thread injection) 15->138 18 explorer.exe 19 15->18 injected process8 dnsIp9 72 readinglistforjuly9.xyz 18->72 74 readinglistforjuly8.xyz 18->74 76 11 other IPs or domains 18->76 40 C:\Users\user\AppData\Roaming\giadjub, PE32 18->40 dropped 42 C:\Users\user\AppData\Local\Temp34.exe, PE32 18->42 dropped 44 C:\Users\user\AppData\Local\Temp\430.exe, PE32 18->44 dropped 46 7 other files (4 malicious) 18->46 dropped 102 System process connects to network (likely due to code injection or exploit) 18->102 104 Benign windows process drops PE files 18->104 106 Performs DNS queries to domains with low reputation 18->106 110 4 other signatures 18->110 23 1578.exe 80 18->23         started        28 E34.exe 88 18->28         started        30 1B84.exe 18->30         started        32 4 other processes 18->32 file10 108 Tries to resolve many domain names, but no domain seems valid 74->108 signatures11 process12 dnsIp13 82 telete.in 23->82 84 185.234.247.50, 49754, 80 INTERKONEKT-ASPL Russian Federation 23->84 86 telete.in 195.201.225.248, 443, 49753 HETZNER-ASDE Germany 23->86 48 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 23->48 dropped 50 C:\Users\user\AppData\...\vcruntime140.dll, PE32 23->50 dropped 62 57 other files (none is malicious) 23->62 dropped 112 Detected unpacking (changes PE section rights) 23->112 114 Detected unpacking (overwrites its own PE header) 23->114 116 Tries to steal Mail credentials (via file access) 23->116 118 Contains functionality to steal Internet Explorer form passwords 23->118 88 116.202.183.50, 49756, 80 HETZNER-ASDE Germany 28->88 90 shpak125.tumblr.com 74.114.154.22, 443, 49755 AUTOMATTICUS Canada 28->90 52 C:\Users\user\AppData\...\vcruntime140[1].dll, PE32 28->52 dropped 54 C:\Users\user\AppData\...\mozglue[1].dll, PE32 28->54 dropped 56 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 28->56 dropped 64 9 other files (none is malicious) 28->64 dropped 120 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 28->120 122 Tries to harvest and steal browser information (history, passwords, etc) 28->122 124 Tries to steal Crypto Currency Wallets 28->124 58 C:\Users\user\AppData\Local\Temp\555.exe, PE32 32->58 dropped 60 C:\Users\user\AppData\Local\Temp\Hyphal.exe, PE32 32->60 dropped 34 430.exe 32->34         started        38 conhost.exe 32->38         started        file14 126 Tries to resolve many domain names, but no domain seems valid 82->126 signatures15 process16 dnsIp17 78 45.32.235.238, 45555, 49768, 49773 AS-CHOOPAUS United States 34->78 80 api.ip.sb 34->80 100 Tries to harvest and steal browser information (history, passwords, etc) 34->100 signatures18
Threat name:
Win32.Trojan.Pwsx
Status:
Malicious
First seen:
2021-07-23 20:33:20 UTC
AV detection:
21 of 46 (45.65%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:redline family:smokeloader family:vidar botnet:123123123 botnet:408 botnet:555 botnet:newinstallshop backdoor discovery infostealer spyware stealer suricata trojan vmprotect
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry class
Modifies system certificate store
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Looks up external IP address via web service
Deletes itself
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Vidar Stealer
Raccoon
RedLine
RedLine Payload
SmokeLoader
Vidar
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
Malware Config
C2 Extraction:
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
https://shpak125.tumblr.com/
xaiandaran.xyz:80
135.148.139.222:33569
45.32.235.238:45555
Unpacked files
SH256 hash:
8ac5259909dbe5f2072c1806f3438f9740dbb4ba8f8f786925a643e73f58e73a
MD5 hash:
5fd3463632f363a8adcf7105209eb6ec
SHA1 hash:
0a2aa8aea269d9580ba623add2af44fea45c2714
SH256 hash:
efb3c9f650a8178b7a20476b6456707a9c0b3aeead9ef4af7cc12dd0f9d6cee4
MD5 hash:
406a9c44a4b2776126d8b5fc78084c4c
SHA1 hash:
1261c57973f98b23f08843969d1fdb329ee09b34
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe efb3c9f650a8178b7a20476b6456707a9c0b3aeead9ef4af7cc12dd0f9d6cee4

(this sample)

  
Delivery method
Distributed via web download

Comments