MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fbfd99e25fba544cb1c7cc420b11d1048289ae02dcc50eb44566a959c17589cb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 21


Intelligence 21 IOCs YARA 2 File information Comments

SHA256 hash: fbfd99e25fba544cb1c7cc420b11d1048289ae02dcc50eb44566a959c17589cb
SHA3-384 hash: 85ec62c9aaecd501cda01c12e28aab9a7eb2096a03145f3fc6890e65f02813feed2eb5fc77236744837af3304d5327d3
SHA1 hash: 82930fe20587a65c25763c867d3a6b747691187b
MD5 hash: d0afd781ce8872358047a5857f4dcb8a
humanhash: magnesium-earth-alpha-charlie
File name:hpwdv.exe
Download: download sample
Signature Smoke Loader
File size:2'658'724 bytes
First seen:2025-12-07 06:25:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9514ea1f6b76796d84439e43008aa7f1 (3 x Smoke Loader, 1 x LummaStealer, 1 x Rhadamanthys)
ssdeep 3072:TD8qOVO6HzqC1fCwNQrRLwY8xzIbbTDnxG5JU1DAY2L0a5M6:n8qOVOjtwNQrRLwY8x8bbTD0Oa5
Threatray 19 similar samples on MalwareBazaar
TLSH T18FC5F71386E33D54E927CA729E2ED6FC770EB6508E997769121AAB2F04F00B3D163711
TrID 39.5% (.EXE) InstallShield setup (43053/19/16)
28.6% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
9.6% (.EXE) Win64 Executable (generic) (10522/11/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
Reporter amznemu
Tags:exe Smoke Loader SmokeLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
163
Origin country :
ID ID
Vendor Threat Intelligence
Malware configuration found for:
AceCryptor SmokeLoader
Details
AceCryptor
an extracted payload
AceCryptor
an extracted shellcode loader component and a TEA decryption key
AceCryptor
an extracted shellcode loader component and the ms_c_rand-XOR seed
SmokeLoader
an extracted component
SmokeLoader
c2 urls and a version number
Malware family:
ID:
1
File name:
_fbfd99e25fba544cb1c7cc420b11d1048289ae02dcc50eb44566a959c17589cb.exe
Verdict:
Malicious activity
Analysis date:
2025-12-07 06:26:36 UTC
Tags:
loader smokeloader smoke

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
gandcrab phishing mint
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
fingerprint microsoft_visual_cc packed
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-12-05T20:34:00Z UTC
Last seen:
2025-12-07T05:46:00Z UTC
Hits:
~10
Detections:
Backdoor.Win32.Mokes.sb Backdoor.Win32.Mokes.c Trojan-Dropper.Win32.Injector.sb Trojan-Dropper.Win32.Dapato.sb Trojan.Win32.Zenpak.sb Trojan.Win32.Yakes.sb Trojan.Win32.Yakes Trojan.Win32.Strab.sb Packed.Win32.Redpill.sb Trojan-Downloader.Win32.Upatre.sb Trojan.Win32.Zonidel.sb Trojan.Win32.Chapak.sb HEUR:Trojan-Downloader.Win32.Bitmin.gen Trojan.Agent.HTTP.C&C PDM:Trojan.Win32.Generic Trojan.Win32.Packed.sb
Malware family:
Malicious Packer
Verdict:
Malicious
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.Stopcrypt
Status:
Malicious
First seen:
2025-12-06 02:24:29 UTC
File Type:
PE (Exe)
Extracted files:
52
AV detection:
23 of 24 (95.83%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor discovery persistence trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
System Location Discovery: System Language Discovery
Deletes itself
SmokeLoader
Smokeloader family
Malware Config
C2 Extraction:
http://polinamailserverip.ru/
http://lamazone.site/
http://criticalosl.tech/
http://maximprofile.net/
http://zaliphone.com/
http://humanitarydp.ug/
http://zaikaopentra.com.ug/
http://zaikaopentra-com-ug.online/
http://infomalilopera.ru/
http://jskgdhjkdfhjdkjhd844.ru/
http://jkghdj2993jdjjdjd.ru/
http://kjhgdj99fuller.ru/
http://azartnyjboy.com/
http://zalamafiapopcultur.eu/
http://hopentools.site/
http://kismamabeforyougo.com/
http://kissmafiabeforyoudied.eu/
http://gondurasonline.ug/
http://nabufixservice.name/
http://filterfullproperty.ru/
http://alegoomaster.com/
http://freesitucionap.com/
http://droopily.eu/
http://prostotaknet.net/
http://zakolibal.online/
http://verycheap.store/
Verdict:
Malicious
Tags:
Win.Packer.pkr_ce1a-9980177-0
YARA:
n/a
Unpacked files
SH256 hash:
fbfd99e25fba544cb1c7cc420b11d1048289ae02dcc50eb44566a959c17589cb
MD5 hash:
d0afd781ce8872358047a5857f4dcb8a
SHA1 hash:
82930fe20587a65c25763c867d3a6b747691187b
SH256 hash:
d3fe939abc37519cf9968874270d356abd8b10887ce7e78a5fb1624d288f14b8
MD5 hash:
42ab13a5f832f542d18083839671b340
SHA1 hash:
891e8820dd0e4d1b9d47bc34ed92538f5081bca2
Detections:
win_smokeloader_a2 SmokeLoaderStage2
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments