home.social

#smokeloader — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #smokeloader, aggregated by home.social.

  1. 🚨#IcedID, #Smokeloader, #SystemBC, #Pikabot and #Bumblebee botnets have been disrupted by Operation Endgame!! This is the largest operation EVER against botnets involved with ransomware, with gargantuan thanks to a coordinated effort led by international agencies 👏👏

    As with the #Qakbot and #Emotet takedowns, Spamhaus are again providing remediation support - those affected will be contacted from today with steps to take.

    👉 For more information, read our write-up here: spamhaus.org/resource-hub/malw

    #OperationENDGAME

  2. 🔍 Technical Analysis: Smoke Loader Malware Leveraging Wi-Fi Access Points for Geolocation

    📅 Date: August 28, 2023
    🖋️ Author: Eswar

    📌 Tags: #Malware #SmokeLoader #Geolocation #Wi-FiScanning #Cybersecurity

    🛠️ The Smoke Loader malware, recently discovered, employs a novel technique to locate infected systems through Wi-Fi access points and Google's Geolocation API. This technical analysis sheds light on the key mechanisms used by this malware.

    🔗 System Location Identification:
    The malware, also known as "Whiffy Recon," utilizes a custom Wi-Fi scanning tool to identify an infected system's precise coordinates using nearby Wi-Fi access points. This is achieved by leveraging the Windows WLANSVC service and Google's Geolocation API.

    🔒 Infection Process:
    The malware checks the existence of the WLANSVC service, regardless of its operational status. If the service exists, the malware creates a wlan.lnk shortcut in the Startup folder pointing to the malware's original location. On the other hand, if the service is absent, the malware terminates execution.

    🔄 Malware Loops:
    There are two loops in the malware's execution flow:

    1. The first loop checks for the presence of the file %APPDATA%\wlan\str-12.bin. If valid parameters are found, the malware proceeds to the next loop for Wi-Fi scanning.
    2. In the absence of the file, the malware registers the bot with the Command and Control (C2) server, sending a JSON payload in an HTTPS POST request with a hard-coded UUID for bot identification.

    📥 Registration and Communication:
    Upon successful registration, the server responds with a secret UUID, replacing the initial bot ID for future requests. Both UUIDs are stored in the str-12.bin file. The malware then scans for Wi-Fi access points using the Windows WLAN API, sending results to Google's Geolocation API via HTTPS POST requests.

    🌐 Google Geolocation API:
    The Geolocation API provides system coordinates based on Wi-Fi access points and mobile network data. The obtained coordinates are integrated into a JSON structure along with encryption methods of access points. This data is sent to the C2 server through HTTP POST requests with Authorization UUID and specific URLs.

    🔎 Indicators of Compromise:

    Whiffy Recon sample dropped by Smoke Loader

    • MD5 hash: 009230972491f5f5079e8e86e19d5458
    • SHA256 hash: 935b44784c055a897038b2cb6f492747c0a1487f0ee3d3a39319962317cd4087

    Whiffy Recon sample dropped by Smoke Loader

    • SHA1 hash: 8532e67e1fd8441dc8ef41f5e75ee35b0d12a087

    Whiffy Recon C2 server

    • 194.87.32[.]20

    Whiffy Recon payload URL

    🛡️ Recommendations:
    Cybersecurity professionals are advised to be vigilant against Smoke Loader malware and Whiffy Recon malware. Monitoring for these indicators of compromise can aid in identifying and mitigating potential threats.

    Source: cybersecuritynews.com/smoke-lo

    #Cybersecurity #ThreatAnalysis #MalwareDetection #GeolocationTracking #WindowsMalware