Distribution of SmokeLoader Targeting Ukrainian Government and Companies

AhnLab SEcurity intelligence Center (ASEC) discovered that multiple SmokeLoader malware strains are being distributed to the Ukrainian Government and companies. It seems that the number of attacks targeting Ukraine has increased recently. The targets confirmed so far include the Ukrainian Department of Justice, public institutions, insurance companies, medical institutions, construction companies, and manufacturing companies.

The distributed email follows the format shown in Figure 1 written in Ukrainian. The body included information related to an invoice, prompting the reader to execute the attached file.

Figure 1. Phishing mail

The attached file is a compressed file (7z) with another compressed file (ZIP) inside. Within this compressed file was an EXE file in an SFX format and SmokeLoader disguised with a PDF extension.

Figure 2. Content within the compressed files Figure 3. Malicious PE disguised as a PDF

SmokeLoader has its extension set as a PDF, so it fails to run properly when the user clicks on the file to execute. The file is executed by the SFX that is also inside the compressed file. The overall process can be seen in Figure 4.

Figure 4. Overall operation process

First, the SFX file creates and executes the PDF and BAT files. The PDF is just a bait file used to deceive the user, and the BAT file uses the command seen below to execute SmokeLoader.

  • BAT command
    start = pax0001782.pdf
Figure 5. Normal PDF

SmokeLoader is a downloader, and it can download additional modules or malware by receiving commands after connecting to the C&C server. When executed, it injects into the explorer.exe, and the malicious activity is carried out through the following process: First, it duplicates itself as “ewuabsi” in the %AppData% path, where it hides itself and grants system file properties. It then attempts to connect with the C&C servers listed below, where Lockbit ransomware and various other malware can be additionally downloaded.

• hxxp://lumangilocino[.]ru/index.php
• hxxp://limanopostserver[.]ru/index.php
• hxxp://numbilonautoparts[.]ru/index.php
• hxxp://specvestniknuk[.]ru/index.php
• hxxp://agropromnubilon[.]ru/index.php
• hxxp://specvigoslik[.]ru/index.php
• hxxp://avicilombio[.]ru/index.php
• hxxp://germagosuplos[.]ru/index.php
• hxxp://niconicalucans[.]ru/index.php
• hxxp://civilomicanko[.]ru/index.php

[File Detection]
Trojan/Win.FakePDF.R626460 (2023.12.03.02)
Dropper/Win.DropperX-gen.R630443 (2024.01.05.01)

[Behavior Detection]
Malware/MDP.Execute.M1567

[IOC Info]
MD5
852ce0cea28e2b7c4deb4e443d38595a
7ccf5bb03e59b8c92ad756862ecb96fd
C&C
hxxp://lumangilocino[.]ru/index.php
hxxp://limanopostserver[.]ru/index.php
hxxp://numbilonautoparts[.]ru/index.php
hxxp://specvestniknuk[.]ru/index.php
hxxp://agropromnubilon[.]ru/index.php
hxxp://specvigoslik[.]ru/index.php
hxxp://avicilombio[.]ru/index.php
hxxp://germagosuplos[.]ru/index.php
hxxp://niconicalucans[.]ru/index.php
hxxp://civilomicanko[.]ru/index.php

Subscribe to AhnLab’s next-generation threat intelligence platform ‘AhnLab TIP’ to check related IOC and detailed analysis information.

The post Distribution of SmokeLoader Targeting Ukrainian Government and Companies appeared first on ASEC BLOG.

Article Link: Distribution of SmokeLoader Targeting Ukrainian Government and Companies - ASEC BLOG