Tuesday, April 22, 2025
Homecyber securitySmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

Published on

SIEM as a Service

Follow Us on Google News

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB), utilizing a stealthy malware loader, Emmenhtal, in conjunction with the SmokeLoader malware.

This campaign demonstrates advanced tactics by financially motivated threat actors to distribute infostealers like CryptBot and Lumma Stealer.

The attack chain begins with weaponized 7z archives and culminates in the deployment of SmokeLoader, a modular malware known for its dynamic payload delivery capabilities.

- Advertisement - Google News

The infection process involves a five-stage chain, starting with an email containing a malicious 7z archive named “Платiжна_iнструкция.7z” (translated as “Payment Instruction”).

The archive includes two files: a bait PDF mimicking legitimate banking documents and a URL shortcut that downloads additional payloads.

This approach capitalizes on social engineering to lure victims into executing the files.

SmokeLoader
Infection Chain Flow of SmokeLoader using Emmenhtal Loader

Exploitation Through Living-Off-the-Land Techniques

Once the archive is extracted, the infection chain progresses through several stages.

The URL shortcut file retrieves a malicious LNK file from a remote server, which triggers PowerShell to execute obfuscated commands.

These commands utilize Mshta (Microsoft HTML Application) to run an embedded HTA script, leveraging legitimate Windows utilities in a technique known as Living-Off-the-Land Binaries and Scripts (LOLBAS).

SmokeLoader
Malicious HTA Header

This minimizes detection by security tools and enables fileless execution.

The Emmenhtal loader plays a pivotal role in this campaign, embedding malicious JavaScript within modified Windows binaries like DCCW.exe (Display Color Calibration Wizard).

This script decodes and executes additional payloads while maintaining stealth through obfuscation and anti-analysis measures.

SmokeLoader’s Modular Capabilities

At the final stage, SmokeLoader is deployed. This malware is renowned for its modular design, enabling it to:

  • Download and execute additional malware
  • Steal credentials from browsers and system memory
  • Execute remote commands from command-and-control (C2) servers
  • Evade detection through process injection and anti-debugging techniques

The analyzed SmokeLoader sample revealed extensive use of .NET Reactor for obfuscation and packing, further complicating detection and analysis.

Additionally, the malware exhibited anti-sandboxing measures by checking for virtualization tools like QEMU and VirtualBox.

According to the Report, this campaign underscores the evolving sophistication of malware delivery mechanisms.

By chaining Emmenhtal with SmokeLoader, attackers can dynamically deploy secondary payloads while evading detection through advanced techniques such as LOLBAS exploitation, code obfuscation, and anti-analysis strategies.

The use of weaponized 7z archives reflects an ongoing trend of leveraging archive-based evasion methods in cyberattacks.

Organizations are advised to strengthen their defenses by implementing endpoint detection and response (EDR) solutions, network monitoring tools, and zero-trust security frameworks.

Additionally, awareness of MITRE ATT&CK techniques such as PowerShell scripting (T1059.001) and Mshta execution (T1218.005) can aid in identifying similar threats.

This campaign highlights the importance of proactive cybersecurity measures to mitigate risks posed by increasingly sophisticated malware like SmokeLoader.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...