Severity
Medium
Analysis Summary
Smoke Loader – a malicious bot application – can be used to load additional malware. Smoke Loader has been spotted in the wild since 2011, carrying a variety of payloads. This malware is mostly used to load additional malicious software, often obtained from a third-party source. Smoke Loader can load its modules allowing it to do several activities without additional components. To date, the supplier of Smokeloader, who goes by the alias SmokeLdr, still delivers this malware as a service. It is well-known for using deception and self-defense. This malware can be spread in several ways and is widely linked to criminal activity. To hide its C2 activity, this malware sends queries to popular websites like microsoft.com, bing.com, adobe.com, and others.
Impact
- Information Theft
- Unauthorized Access
Indicators of Compromise
MD5
b2c17e4aaa1ab07e2be2c6e08120c7fe
6c8e0b575f1a144d7338604b7f0c433d
1b62d8c0e8d0eb18d7804a2322aa7533
SHA-256
d6427e58dfa1a8bfb69f510d4c3806c36cbb7fcfac82984cafcd2ff539631f0d
7f11c4396fa77e175d38b42db81ee72ea732f5174667c6f7a2c885ff8b7553de
8ba0b30450c0c8e065f665ef3a8c1181b5d669480964211a89a20c42e87af1d0
SHA1
67eb0fbafb9d75d7e95dc8429c09a99e73ed5c74
3281369b5b2e4c72c0491d503dafbfb4ccafb43e
27e6a71fc46a75b6ab313f24b42400c18b3b78a4
Remediation
- Exercise caution when receiving messages from unknown senders.
- Block all threat indicators at your respective controls.
- Keep your software updated to the latest patches.
- Search for IOCs in your environment.

