{"id":5947,"date":"2012-02-03T17:07:31","date_gmt":"2012-02-04T00:07:31","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=5947"},"modified":"2018-10-05T16:13:17","modified_gmt":"2018-10-05T22:13:17","slug":"a-peek-inside-the-smoke-malware-loader","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/02\/03\/a-peek-inside-the-smoke-malware-loader\/","title":{"rendered":"A peek inside the Smoke Malware Loader"},"content":{"rendered":"<p>The competitive arms race between security vendors and malicious cybercriminals constantly produces new defensive\u00a0mechanisms, next to new attack platforms and malicious tools aiming to efficiently exploit and infect as many people as possible.<\/p>\n<p>Continuing the &#8220;A peek inside&#8230;&#8221; series, in this post I will profile yet another malware loader. This time it&#8217;s the Smoke Malware Loader.<\/p>\n<p><!--more--><\/p>\n<p>The Smoke Malware Loader is \u00a0a modular malware loader, that comes with several different modules based on how much is the customer willing to spend.<\/p>\n<p>Some of its features include:<\/p>\n<blockquote><p>&#8211; Progressive download different EXE and run *<\/p>\n<p>&#8211; Geo-targeting (download only for specific countries)<\/p>\n<p>&#8211; The ability to download files via a URL<\/p>\n<p>&#8211; Startup and invisible work (Masked by a trusted process) **<\/p>\n<p>&#8211; Detailed statistics on jobs- Self-renewal through the bot&#8217;s admin panel (locally or remotely) **<\/p>\n<p>&#8211; Protection against loss by blocking bots domain **<\/p>\n<p>&#8211; The small size of the loader ~ 12.6 kb ***<\/p>\n<p>&#8211; Ability to use Builder for &#8220;sellers&#8221; (more accurate statistics)<\/p>\n<p>&#8211; Statistics on re-launching (useful for assessing the quality of downloads, or traffic) **<\/p>\n<p>&#8211; &#8220;Guest&#8221; access to the statistics- Easy kriptovka (does not contain any additional dll, overlays, etc.)<\/p><\/blockquote>\n<p>Screenshots of the command and control interface:<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/smoke_malware_loader_01.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-5958\" title=\"Smoke_Malware_Loader_01\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/smoke_malware_loader_01.png\" alt=\"\" width=\"614\" height=\"425\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/smoke_malware_loader_02.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-5959\" title=\"Smoke_Malware_Loader_02\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/smoke_malware_loader_02.png\" alt=\"\" width=\"614\" height=\"428\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/smoke_malware_loader_03.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-5960\" title=\"Smoke_Malware_Loader_03\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/smoke_malware_loader_03.png\" alt=\"\" width=\"614\" height=\"442\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/smoke_malware_loader_04.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-5961\" title=\"Smoke_Malware_Loader_04\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/smoke_malware_loader_04.png\" alt=\"\" width=\"614\" height=\"448\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/smoke_malware_loader_05.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-5962\" title=\"Smoke_Malware_Loader_05\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/smoke_malware_loader_05.png\" alt=\"\" width=\"614\" height=\"430\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/smoke_malware_loader_06.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-5963\" title=\"Smoke_Malware_Loader_06\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/smoke_malware_loader_06.png\" alt=\"\" width=\"614\" height=\"443\" \/><\/a><\/p>\n<p>The modular Smoke Malware loader comes with two additional modules. The first module steals passwords from popular applications, and sends them back to the malicious attackers. The second module is a <strong><a href=\"http:\/\/ddanchev.blogspot.com\/2008\/10\/cost-of-anonymizing-cybercriminals.html\">SOCKS-connection module<\/a><\/strong>, turning malware-infected hosts into <strong><a href=\"http:\/\/ddanchev.blogspot.com\/2009\/02\/cost-of-anonymizing-cybercriminals.html\">stepping stones for anonymizing a cybercriminal&#8217;s online activities<\/a><\/strong>.<\/p>\n<p>The first module successfully steals passwords from the following applications:<\/p>\n<blockquote><p>32bit FTP<br \/>\nBitKinex<br \/>\nBulletProof FTP Client<br \/>\nClassic FTP<br \/>\nCoffeeCup FTP<br \/>\nCore FTP<br \/>\nCuteFTP<br \/>\nDirectory Opus<br \/>\nExpanDrive<br \/>\nFAR Manager FTP<br \/>\nFFFTP<br \/>\nFileZilla<br \/>\nFlashFXP<br \/>\nFling<br \/>\nFreeFTP\/DirectFTP<br \/>\nFrigate3 FTP<br \/>\nFTP Commander<br \/>\nFTP Control<br \/>\nFTP Explorer<br \/>\nFTP Navigator<br \/>\nFTP Uploader<br \/>\nFTPRush<br \/>\nLeapFTP<br \/>\nNetDrive<br \/>\nSecureFX<br \/>\nSmartFTP<br \/>\nSoftX FTP Client<br \/>\nTurboFTP<br \/>\nUltraFXP<br \/>\nWebDrive<br \/>\nWebSitePublisher<br \/>\nWindows\/Total Commander<br \/>\nWinSCP<br \/>\nWS_FTP<\/p><\/blockquote>\n<p>And from the following browsers:<\/p>\n<blockquote><p>Apple Safari<br \/>\nFlock<br \/>\nGoogle Chrome<br \/>\nInternet Explorer<br \/>\nMozilla Browser<br \/>\nMozilla Firefox<br \/>\nMozilla Thunderbird<br \/>\nOpera<br \/>\nSeaMonkey<\/p><\/blockquote>\n<p>The full version of the passwords grabber also works on the following IM applications:<\/p>\n<blockquote><p>&amp;RQ<br \/>\nAIM Pro<br \/>\nDigsby<br \/>\nExcite Private Messenger<br \/>\nFaim<br \/>\nGAIM<br \/>\nGizmo Project<br \/>\nGoogle Talk<br \/>\nICQ\/AIM<br \/>\nICQ2003\/Lite<br \/>\nICQ99b-2002<br \/>\nIM2 (Messenger 2)<br \/>\nJAJC<br \/>\nMiranda<br \/>\nMSN Messenger<br \/>\nMySpaceIM<br \/>\nOdigo<br \/>\nPaltalk<br \/>\nPandion<br \/>\nPidgin<br \/>\nPSI<br \/>\nQIP<br \/>\nQIP.Online<br \/>\nSIM<br \/>\nTrillian<br \/>\nTrillian Astra<br \/>\nWindows Live Messenger<br \/>\nYahoo! Messenger<\/p><\/blockquote>\n<p>And how about the price? The price for the Smoke Malware Loader, including and excluding various modules is as follows:<\/p>\n<blockquote><p>&#8211; Only the loader (the non-resident version) &#8211; 150 WMZ<br \/>\n&#8211; Only the loader (TSR version) &#8211; 250 WMZ<br \/>\n&#8211; Grabber LITE &#8211; 100 WMZ **<br \/>\n&#8211; Grabber FULL &#8211; 150 WMZ **<br \/>\n&#8211; SOCKS-module &#8211; 50 WMZ (version without bekkonekta) **<br \/>\n&#8211; HOSTS-module &#8211; 25 WMZ **<br \/>\n&#8211; Rebild loader &#8211; 10 WMZ<br \/>\n&#8211; Update: minor fixes &#8211; for free, the rest is discussed separately<br \/>\n&#8211; Can build to suit your needs grabber<\/p><\/blockquote>\n<p>The modular nature of the Smoke Malware Loader allows the seller of the bot to come up with flexible pricing plans, potentially lowering down the entry barriers into this market segment. The bot&#8217;s password grabbing functionality is a great reminder of how you shouldn&#8217;t save your passwords in the browser, as they become susceptible to\u00a0extraction techniques like the ones used by the Smoke Malware Loader.<\/p>\n<p>Use a third-party password managing tool, like <strong><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\">Webroot&#8217;s Password Manager<\/a><\/strong> for instance.<\/p>\n<p>Related posts:<\/p>\n<p><a href=\"http:\/\/blog.webroot.com\/2012\/01\/26\/a-peek-inside-the-ubot-malware-bot\/\">A peek inside the uBot malware bot<\/a><\/p>\n<p><a href=\"http:\/\/blog.webroot.com\/2012\/01\/06\/a-peek-inside-the-pickpocket-botnet\/\">A peek inside the PickPocket Botnet<\/a><\/p>\n<p><a href=\"http:\/\/blog.webroot.com\/2012\/01\/09\/a-peek-inside-the-cythosia-v2-ddos-bot\/\">A peek inside the Cythosia v2 DDoS Bot<\/a><\/p>\n<p><a href=\"http:\/\/blog.webroot.com\/2012\/01\/20\/a-peek-inside-the-umbra-malware-loader\/\">A peek inside the Umbra malware loader<\/a><\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<strong><a href=\"http:\/\/nl.linkedin.com\/in\/danchodanchev\">LinkedIn Profile<\/a><\/strong>. You can also\u00a0<strong><a href=\"http:\/\/www.twitter.com\/danchodanchev\">follow him on \u00a0Twitter<\/a><\/strong>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The competitive arms race between security vendors and malicious cybercriminals constantly produces new defensive\u00a0mechanisms, next to new attack platforms and malicious tools aiming to efficiently exploit and infect as many people as possible. Continuing the &#8220;A peek inside&#8230;&#8221; series, in this post I will profile yet another malware loader. This time it&#8217;s the Smoke Malware [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[9759,9755,9765,7027,9751,9545,9621,3477,9615,8281,12587,5323,9543,9527,9761,9745,9743,9749,9763,9747],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/5947"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=5947"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/5947\/revisions"}],"predecessor-version":[{"id":26123,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/5947\/revisions\/26123"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=5947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=5947"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=5947"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=5947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}