SmokeLoader Malware Deployed in Stealthy Campaign Targeting Major Banks

SmokeLoader campaign

In a recent campaign targeting First Ukrainian International Bank (pumb[.]ua), G DATA security researchers uncovered a deeply layered and technically advanced malware chain. At the center of this operation is SmokeLoader, a well-known and powerful modular loader that’s been enhanced with stealthy execution tactics and a lesser-known but increasingly popular intermediary—Emmenhtal Loader (aka EmmenHTAl or Peaklight).

This analysis exposes a refined infection strategy—one that combines social engineering, Living off the Land Binaries and Scripts (LOLBAS), and anti-analysis tactics to quietly deploy multiple malware stages without raising alarms.

The attack begins with a phishing email masquerading as a payment confirmation, containing an attachment named Платiжна_iнструкция.7z (translated: “Payment_instruction”). Inside the archive:

  • A bait PDF mimicking financial documents
  • A PDF shortcut (.lnk) designed to download additional payloads from a remote server

The report highlights the attackers’ continued use of archive-based evasion techniques, noting that “In previous SmokeLoader campaigns, the threat actors exploited a 7-Zip zero-day vulnerability to bypass security checks using double-archived files, allowing malware execution.” Although this campaign does not use the same exploit, it demonstrates the attackers’ persistence in using archive-based evasion.

The .lnk file activates a PowerShell script that leverages Mshta, a legitimate Windows binary for executing HTML Applications. It downloads a malicious .hta file, blending into native system behavior to remain undetected.

This is a common LOLBAS technique… allowing fileless execution and minimal visibility,” the researchers note.

To further conceal the operation, the attackers use a modified DCCW.exe (Windows Display Color Calibration Wizard) as a loader, embedding JavaScript within the binary to execute malicious payloads with minimal footprint.

Emmenhtal, the loader stage, is cloaked in a crafted HTA file with a minimized window state and no taskbar presence. JavaScript embedded within the loader uses eval(erc) to execute additional obfuscated code.

The executed variable contains another charCode-encoded script… which will be executed via wscript shell.”

The script decodes and launches a PowerShell downloader, which checks for two files—invoice1202.pdf and putty1202.exe—and either executes them or retrieves fresh copies if missing.

The final stage drops SmokeLoader, a versatile malware platform known for:

  • Delivering secondary payloads
  • Stealing browser and system credentials
  • Injecting into legitimate processes
  • Executing commands from remote C2 servers
  • Employing anti-debugging and anti-analysis defenses

This file is a SmokeLoader malware… using .NET Reactor for obfuscation and packing,” G DATA confirms.

The use of .NET Reactor—more common in modern stealers—reflects a shift in malware tooling preferences, as attackers seek stronger evasion through commercial protectors.

G DATA also noted overlap in infrastructure and TTPs with other malware families, including Blustealer and Lumma, suggesting potential collaboration or shared platforms among cybercriminal operators.

A Wireshark packet capture confirms outbound connection attempts to 88[.]151[.]192[.]165, further indicating command-and-control activity tied to SmokeLoader’s deployment.

The availability of these feature-rich new loaders that are offered through Malware-as-a-Service (MaaS) enables threat actors to be more creative in customizing their attack chain,” the researchers conclude.

Related Posts:

Rate this post