MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ff38415bfa7f2db5ba40f26e64ede0676971c441823d2ec2755d644d8905d809. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 16


Intelligence 16 IOCs YARA 9 File information Comments

SHA256 hash: ff38415bfa7f2db5ba40f26e64ede0676971c441823d2ec2755d644d8905d809
SHA3-384 hash: e527e41b21eefdc19096d41f3b732342ea992ac133c2f185596ffa8322e696b10a347b5f2dbdb0a3520812653b37dc47
SHA1 hash: 1e28242e9862c5b5b040a415e5db619d862a7224
MD5 hash: b5b467e9309cbddb4a9ed34a82a36163
humanhash: saturn-item-solar-helium
File name:b5b467e9309cbddb4a9ed34a82a36163.exe
Download: download sample
Signature Smoke Loader
File size:473'600 bytes
First seen:2023-10-11 19:31:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger)
ssdeep 12288:udcF8KWGUJib0PfIN2AyF5t/AKNxwkvJWaZjs:7F8KWGUcbaAWntTNlv0aB
Threatray 162 similar samples on MalwareBazaar
TLSH T101A412F53EC520B0F3850CB8E6B88BFBDB895DF0BAB56A1F019C128315D9D09A6C5D09
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:exe Smoke Loader

Intelligence


File Origin
# of uploads :
1
# of downloads :
293
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
b5b467e9309cbddb4a9ed34a82a36163.exe
Verdict:
Malicious activity
Analysis date:
2023-10-11 19:58:37 UTC
Tags:
rhadamanthys stealer loader smoke

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Launching a process
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Reading critical registry keys
Creating a process from a recently created file
Unauthorized injection to a recently created process
Unauthorized injection to a system process
Stealing user critical data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DarkTortilla, Phobos, RHADAMANTHYS, Smok
Detection:
malicious
Classification:
rans.spre.phis.troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates autostart registry keys with suspicious names
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates files in the recycle bin to hide itself
Creates multiple autostart registry keys
Deletes itself after installation
Deletes shadow drive data (may be related to ransomware)
Drops PE files to the startup folder
Found evasive API chain (may stop execution after checking locale)
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Found ransom note / readme
Hides that the sample has been downloaded from the Internet (zone.identifier)
Infects executable files (exe, dll, sys, html)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May disable shadow drive data (uses vssadmin)
Modifies the windows firewall
Overwrites Mozilla Firefox settings
Performs DNS queries to domains with low reputation
Sigma detected: Delete shadow copy via WMIC
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Writes many files with high entropy
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected DarkTortilla Crypter
Yara detected Phobos
Yara detected RHADAMANTHYS Stealer
Yara detected SmokeLoader
Yara detected SystemBC
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1324100 Sample: 50GoeHHxhs.exe Startdate: 11/10/2023 Architecture: WINDOWS Score: 100 89 xemtex534.xyz 2->89 91 www.shorturl.at 2->91 93 8 other IPs or domains 2->93 105 Found malware configuration 2->105 107 Malicious sample detected (through community Yara rule) 2->107 109 Antivirus detection for URL or domain 2->109 111 15 other signatures 2->111 15 50GoeHHxhs.exe 3 2->15         started        18 svjwwde 2->18         started        signatures3 process4 signatures5 157 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 15->157 159 Injects a PE file into a foreign processes 15->159 20 50GoeHHxhs.exe 1 15->20         started        23 svjwwde 18->23         started        process6 dnsIp7 95 amxt25.xyz 45.131.66.61, 49712, 49715, 49716 LOVESERVERSGB Germany 20->95 26 certreq.exe 3 20->26         started        141 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 23->141 143 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 23->143 145 Maps a DLL or memory area into another process 23->145 147 2 other signatures 23->147 signatures8 process9 file10 79 C:\Users\user\AppData\Local\...\LP[YV0.exe, PE32 26->79 dropped 81 C:\Users\user\AppData\Local\...\$W8h8.exe, PE32 26->81 dropped 149 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 26->149 151 Tries to steal Mail credentials (via file / registry access) 26->151 153 Tries to harvest and steal browser information (history, passwords, etc) 26->153 155 2 other signatures 26->155 30 $W8h8.exe 3 26->30         started        32 LP[YV0.exe 3 26->32         started        34 conhost.exe 26->34         started        signatures11 process12 process13 36 $W8h8.exe 30->36         started        39 $W8h8.exe 30->39         started        41 LP[YV0.exe 32->41         started        43 LP[YV0.exe 32->43         started        45 LP[YV0.exe 32->45         started        47 7 other processes 32->47 signatures14 121 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 36->121 123 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 36->123 125 Maps a DLL or memory area into another process 36->125 127 2 other signatures 36->127 49 explorer.exe 80 32 36->49 injected process15 dnsIp16 83 servermlogs27.xyz 45.131.66.120, 49719, 49734, 49735 LOVESERVERSGB Germany 49->83 85 xemtex534.xyz 45.131.66.222, 49720, 80 LOVESERVERSGB Germany 49->85 87 3 other IPs or domains 49->87 71 C:\Users\user\AppData\Roaming\svjwwde, PE32 49->71 dropped 73 C:\Users\user\AppData\Local\Temp\6A67.exe, PE32 49->73 dropped 75 C:\Users\user\AppData\Local\Temp\62F4.exe, PE32 49->75 dropped 77 C:\Users\user\AppData\Roaming\vedtjfv, data 49->77 dropped 113 System process connects to network (likely due to code injection or exploit) 49->113 115 Benign windows process drops PE files 49->115 117 Creates files in the recycle bin to hide itself 49->117 119 4 other signatures 49->119 54 62F4.exe 49->54         started        57 6A67.exe 49->57         started        59 62F4.exe 49->59         started        file17 signatures18 process19 signatures20 129 Drops PE files to the startup folder 54->129 131 Writes many files with high entropy 54->131 133 Found evasive API chain (may stop execution after checking locale) 54->133 61 62F4.exe 54->61         started        135 Found evasive API chain (may stop execution after checking mutex) 57->135 137 Hides that the sample has been downloaded from the Internet (zone.identifier) 57->137 139 Injects a PE file into a foreign processes 57->139 63 6A67.exe 57->63         started        process21 dnsIp22 67 62F4.exe 61->67         started        97 mxstex725dm.xyz 193.31.28.246, 4044, 49743, 49746 QUICKPACKETUS United Kingdom 63->97 99 mxstat215dm.xyz 45.131.66.83, 4044 LOVESERVERSGB Germany 63->99 101 Creates autostart registry keys with suspicious values (likely registry only malware) 63->101 103 Creates multiple autostart registry keys 63->103 signatures23 process24 process25 69 62F4.exe 67->69         started       
Threat name:
Win32.Trojan.InjectorX
Status:
Malicious
First seen:
2023-10-11 05:26:01 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
20 of 36 (55.56%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:ammyyadmin family:flawedammyy family:phobos family:rhadamanthys family:smokeloader backdoor bootkit collection evasion persistence ransomware rat spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Interacts with shadow copies
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy service COM API
outlook_office_path
outlook_win_path
Drops file in Program Files directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Drops desktop.ini file(s)
Writes to the Master Boot Record (MBR)
Checks computer location settings
Deletes itself
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Deletes backup catalog
Downloads MZ/PE file
Modifies Windows Firewall
Deletes shadow copies
Modifies boot configuration data using bcdedit
Renames multiple (373) files with added filename extension
Renames multiple (58) files with added filename extension
Ammyy Admin
AmmyyAdmin payload
Detect rhadamanthys stealer shellcode
FlawedAmmyy RAT
Phobos
Rhadamanthys
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
http://servermlogs27.xyz/statweb255/
http://servmblog45.xyz/statweb255/
http://demblog575.xyz/statweb255/
http://admlogs85x.xyz/statweb255/
http://blogmstat389.xyz/statweb255/
http://blogmstat255.xyz/statweb255/
Unpacked files
SH256 hash:
cd373c1b071798e91772597d4c90ccce34f2b9fd60e574f7fff083d40e0e4465
MD5 hash:
43269e7c6cd4cbf6f48aa875ac7f5da7
SHA1 hash:
fda5d0b2d2eed84c32c216c762cb81295b9abdb5
Detections:
RhadamanthysLoader win_brute_ratel_c4_w0
SH256 hash:
bf9056f143d35bdc4261f1f4acc432f8946ca6da20572442c02e8710d79dd907
MD5 hash:
ba406f54addfedd958609a68f11967b6
SHA1 hash:
5aa0372a3225581b7575ea5ac183549103c7739e
SH256 hash:
19efdf03cb94895935225795f68bb9abfded1869687367013b8b4eee3cc99372
MD5 hash:
4e29f75c0c51b9dec76955f0382d9541
SHA1 hash:
4899aa8e3f57339cbaec8faab777897a76fe1c3a
SH256 hash:
8ada7ccccb8cdc789b26c2b1c59c2e34b6f67b0c0168e5ccc66c7b651293dbb1
MD5 hash:
41221fc5899b9de6e2fb8935ce78fd51
SHA1 hash:
2cf0fc36d0045f52a335d8daf37db0a991013581
SH256 hash:
ff38415bfa7f2db5ba40f26e64ede0676971c441823d2ec2755d644d8905d809
MD5 hash:
b5b467e9309cbddb4a9ed34a82a36163
SHA1 hash:
1e28242e9862c5b5b040a415e5db619d862a7224
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BruteSyscallHashes
Author:Embee_Research @ Huntress
Rule name:Check_OutputDebugStringA_iat
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_bruteratel_syscall_hashes_oct_2022
Author:Embee_Research @ Huntress
Description:Detection of Brute Ratel Badger via api hashes of Nt* functions.
Rule name:win_brute_ratel_c4_w0
Author:Embee_Research @ Huntress
Rule name:win_Brute_Syscall_Hashes
Author:Embee_Research @ Huntress
Description:Detection of Brute Ratel Badger via api hashes of Nt* functions.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Smoke Loader

Executable exe ff38415bfa7f2db5ba40f26e64ede0676971c441823d2ec2755d644d8905d809

(this sample)

  
Delivery method
Distributed via web download

Comments