A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB), utilizing a stealthy malware loader, Emmenhtal, in conjunction with the SmokeLoader malware.
This campaign demonstrates advanced tactics by financially motivated threat actors to distribute infostealers like CryptBot and Lumma Stealer.
The attack chain begins with weaponized 7z archives and culminates in the deployment of SmokeLoader, a modular malware known for its dynamic payload delivery capabilities.
The infection process involves a five-stage chain, starting with an email containing a malicious 7z archive named “Платiжна_iнструкция.7z” (translated as “Payment Instruction”).
The archive includes two files: a bait PDF mimicking legitimate banking documents and a URL shortcut that downloads additional payloads.
This approach capitalizes on social engineering to lure victims into executing the files.
Once the archive is extracted, the infection chain progresses through several stages.
The URL shortcut file retrieves a malicious LNK file from a remote server, which triggers PowerShell to execute obfuscated commands.
These commands utilize Mshta (Microsoft HTML Application) to run an embedded HTA script, leveraging legitimate Windows utilities in a technique known as Living-Off-the-Land Binaries and Scripts (LOLBAS).
This minimizes detection by security tools and enables fileless execution.
The Emmenhtal loader plays a pivotal role in this campaign, embedding malicious JavaScript within modified Windows binaries like DCCW.exe (Display Color Calibration Wizard).
This script decodes and executes additional payloads while maintaining stealth through obfuscation and anti-analysis measures.
At the final stage, SmokeLoader is deployed. This malware is renowned for its modular design, enabling it to:
The analyzed SmokeLoader sample revealed extensive use of .NET Reactor for obfuscation and packing, further complicating detection and analysis.
Additionally, the malware exhibited anti-sandboxing measures by checking for virtualization tools like QEMU and VirtualBox.
According to the Report, this campaign underscores the evolving sophistication of malware delivery mechanisms.
By chaining Emmenhtal with SmokeLoader, attackers can dynamically deploy secondary payloads while evading detection through advanced techniques such as LOLBAS exploitation, code obfuscation, and anti-analysis strategies.
The use of weaponized 7z archives reflects an ongoing trend of leveraging archive-based evasion methods in cyberattacks.
Organizations are advised to strengthen their defenses by implementing endpoint detection and response (EDR) solutions, network monitoring tools, and zero-trust security frameworks.
Additionally, awareness of MITRE ATT&CK techniques such as PowerShell scripting (T1059.001) and Mshta execution (T1218.005) can aid in identifying similar threats.
This campaign highlights the importance of proactive cybersecurity measures to mitigate risks posed by increasingly sophisticated malware like SmokeLoader.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a premier…
Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by empowering…
The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir Kutleshi,…
Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti Connect…
A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing how…
EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational…