MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ffe21af6accb27ecee7c5fae57211ff9f545e64b680059b4037596288c63920b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Smoke Loader
Vendor detections: 13
| SHA256 hash: | ffe21af6accb27ecee7c5fae57211ff9f545e64b680059b4037596288c63920b |
|---|---|
| SHA3-384 hash: | cf76ee295edb86157418eb8cd68ab7267075fe93dfa400855e198f41af7488e1a48a3f212d8de9117c8824ee0591f662 |
| SHA1 hash: | 198d41dca224a3010589f2ce0a9cac6686dda963 |
| MD5 hash: | 3e9b93cd8a81772cf96b53bca62624b9 |
| humanhash: | high-whiskey-neptune-sad |
| File name: | setup_x86_x64_install.exe |
| Download: | download sample |
| Signature | Smoke Loader |
| File size: | 4'517'747 bytes |
| First seen: | 2021-10-23 17:43:10 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox) |
| ssdeep | 98304:JjzQoMAXPmuTOQVdH/3RLSsKyBlF7AAY4R48OTA2JlwM+CMpgi:JXQoMAf7TzL5mNyJAAYXXwM+Ei |
| Threatray | 643 similar samples on MalwareBazaar |
| TLSH | T158263305644B2563E4215EBC84327FF33F576624289723AF3024C2E6DA5EAC863796F7 |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | Anonymous |
| Tags: | exe Smoke Loader |
Intelligence
File Origin
# of uploads :
1
# of downloads :
595
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
setup_x86_x64_install.exe
Verdict:
Malicious activity
Analysis date:
2021-10-23 16:00:58 UTC
Tags:
trojan rat redline evasion loader stealer vidar opendir
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
DLInjector03
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a window
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Socelars
Verdict:
Malicious
Result
Threat name:
SmokeLoader Socelars
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Creates processes via WMI
Disables Windows Defender (via service or powershell)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected SmokeLoader
Yara detected Socelars
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-10-23 17:44:05 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 633 additional samples on MalwareBazaar
Result
Malware family:
vidar
Score:
10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:933 aspackv2 backdoor infostealer spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Kills process with taskkill
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Socelars
Socelars Payload
Vidar
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Malware Config
C2 Extraction:
http://directorycart.com/upload/
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
https://mas.to/@xeroxxx
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
https://mas.to/@xeroxxx
Unpacked files
SH256 hash:
9649cac5d9f65cb5fc7ee748ed45cfd259ac8d75b370515c2c397775f00b4b91
MD5 hash:
45ecc5685035fcc563e6efe219ef0a78
SHA1 hash:
4df63564e27961e2ea39e817ecc2de305300fbed
SH256 hash:
0cddd277bd0f1f5510538c0bd9b1cff4c5cd01c5caee8eb9d06b9baa88519052
MD5 hash:
6449aa2e023c5931ac91815ca54225ed
SHA1 hash:
65b5f4df2c28472469ddf924e6b0d0a61394c612
SH256 hash:
2010b113bce681120cbdbe50fd2c3393587d723b97d13a5777429570621bb339
MD5 hash:
ae22fdfdaf90dc3174ebe91333125e1e
SHA1 hash:
3a62fed1ee6e36ca58c3ec19d0a4ae9f9eb0e2b8
Parent samples :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 hash:
27a9228747973ae9649e8717a2ff77916346560644e734ef2ed946f2767fb128
MD5 hash:
de1b3c28ea026c0ede620dd78199ddc5
SHA1 hash:
ee402371a36bff44c765323ccd8c7e4a56bc8d12
SH256 hash:
e5609d389cf756d5b3a0371a36d4c473e1746d06128dbdcd8bb192012cfb6f32
MD5 hash:
1465b3317a56f6d121037d8ad12cf6bc
SHA1 hash:
e6bc1b0c123656e555810737854363cb320e5c68
SH256 hash:
5e0a1117d0a70d6e0f3d615d72bbba2662f2125c257c2c2c005677c724599e53
MD5 hash:
6427a6b4c5ac07015390631102e9c605
SHA1 hash:
d1f3e1c40414fd33291801acd569352b1c5a0805
SH256 hash:
41a780cbf232d3ed4912406bdbb084f61c9faf56dcc0a7a81381546689170c64
MD5 hash:
148c3657379750b2fe7237ac1b06f507
SHA1 hash:
c464da9412a32ab71cd62491405296672c7ba3ad
SH256 hash:
82b60a8c25db65bae520e73b7a67d2a6ca1f0fe6926439d0d7f1c0d52aa2f7d4
MD5 hash:
a758705ffd480485776c573bbe7091ca
SHA1 hash:
ae62bd009da6c2bf8e91f06a9a01890f74828d07
SH256 hash:
6bcca33a599532917b446f07952719fa7a70edf6646c14b13e64686ff2c6d44c
MD5 hash:
7af76a6cff6996241b9d85558848e6c8
SHA1 hash:
a8df8a22e003849550c2e6827bf17a5edbec5524
SH256 hash:
9cc278abd4280d41ed3091d4cecb70f7b89daffb8a6fdf2b8bd34f8e9f366219
MD5 hash:
7cbab5481996961189b4fe07a08ef641
SHA1 hash:
a7c9cae8f751bfc2ce6e7c8749fe7057010631ba
SH256 hash:
b8809ec47b54a213be3c954325602359e824010749e8cd52e4ab619b60db2df9
MD5 hash:
43516bf5d8b6454203243e7bbf848775
SHA1 hash:
811f8533f628aea43b1f41b192f2e6243aecad28
SH256 hash:
eca6d5926352a350e3eba916336da24efe967ebab47458d2af92efffcf258db9
MD5 hash:
804d38386f576d895f9daa8cb90ee21c
SHA1 hash:
4b45ad8f6ac9284117da053e54410b1e738568e0
SH256 hash:
8cce53c890821993be85ea5c156f197045f2a4fa435a7750a365270f51a35718
MD5 hash:
0843611e460939b9b2e4e605e9b9b6bf
SHA1 hash:
15aeb2d35a976af2082548161e8db49761acd6b4
SH256 hash:
fb35e940eb07e761704d5c922e77e28d51279088375fef12ed342361e428df66
MD5 hash:
4023b304f7969a24b91be30d76997997
SHA1 hash:
40bf9443df97437df7b695874fefa3e8103d76bc
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
57357e1d304ed1c4db3d22dbbd6a01327237d1fad37437db58f0a7d97a3d7ba3
MD5 hash:
42c09e2ff1923e01e6b465436b1d176f
SHA1 hash:
6fc4b58ff71392865812ba14a6b469ddec5df7d4
SH256 hash:
9ea314e1eb74c61d06c4c7e0180e9e4a14c935a83c4b49591ad946f9034c2406
MD5 hash:
e1d13c21fbd7ba86dbd2b3e0a88e057d
SHA1 hash:
502e83333db008a2f4abfb5a04db9d2d37391ba1
SH256 hash:
ddac5bc9867876f1d3ae40dbac20dcfea15ae130262ff17ac178fb2edb8ad3b2
MD5 hash:
7ec745fb9e0fe6c16eff2928c78ccd63
SHA1 hash:
401a1c4db872a790d11143dedce7f7cfb720d53a
SH256 hash:
37d07a31a590b276d03182a463e5191394f9f94bdf6b29d13f3552f96f80f7ee
MD5 hash:
3f05ab5e1bc9c3daf8c696fca4201454
SHA1 hash:
760409e51d2cfe7f80de42dc866fe0f3e45c4285
SH256 hash:
ffe21af6accb27ecee7c5fae57211ff9f545e64b680059b4037596288c63920b
MD5 hash:
3e9b93cd8a81772cf96b53bca62624b9
SHA1 hash:
198d41dca224a3010589f2ce0a9cac6686dda963
Malware family:
RedNet
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.