SmokeLoader Rises From the Ashes

SmokeLoader has resurfaced with two updated variants — version 2025 alpha and version 2025 — that fix long-standing bugs (notably a recurring injection/mutex issue), add evasion and obfuscation changes, and modify network protocol details. ThreatLabz observed these versions in the wild, provided detection/cleanup tooling (SmokeBuster), and published IOCs including file hashes and C2 domains/IPs. #SmokeLoader #SmokeBuster

Keypoints

  • SmokeLoader is a modular loader active since 2011 that delivers second-stage payloads and optional plugins for credential theft, DDoS, and crypto mining.
  • Two new variants were identified: version 2025 alpha (reports as 2022 to C2) and version 2025 (reports 2025 and introduces protocol changes).
  • Major bug fixes in 2025 alpha prevent repeated injections into explorer.exe by adding a mutex check and moving anti-analysis thread creation after the mutex check.
  • Version 2025 introduces additional stager changes (new decryption step, dynamic RVA calculation, 64-bit shellcode) and protocol changes (CRC32 in request, obfuscated response length).
  • Main-module updates include altered constant obfuscation, a redundant Russian keyboard layout kill-check in 2025, changed file-mapping naming (MD5(botID) in 2025), and a modified scheduled task name.
  • ThreatLabz released and updated SmokeBuster to detect and clean infections for both new variants and published IOCs (hashes, domains, IPs).
  • Despite the 2024 Operation Endgame takedown, SmokeLoader continues to be developed and used by multiple threat actors; 2025 alpha is currently most active.

MITRE Techniques

  • [T1059] Command and Scripting Interpreter – SmokeLoader uses injected shellcode and dynamic code decryption to execute payloads (‘implemented a new function to decrypt code blocks by adding a hardcoded value to each byte before execution’).
  • [T1055] Process Injection – The stager injects the main module into explorer.exe and uses 64-bit shellcode for injection (‘inject the main module into explorer.exe’).
  • [T1547.001] Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder – SmokeLoader establishes persistence via a scheduled task with names like “MicrosoftEdgeUpdateTaskMachine%hs” (‘the scheduled task that established persistence’).
  • [T1112] Modify Registry (persistence-related changes) – (implied) persistence mechanisms and scheduled task naming changes used to maintain execution (‘Scheduled task name … MicrosoftEdgeUpdateTaskMachine%hs’).
  • [T1497] Virtualization/Sandbox Evasion – The stager detects virtual environments and terminates if present to hinder analysis (‘stager has two main purposes: hinder analysis, detect virtual environments (and terminate if present)’).
  • [T1105] Ingress Tool Transfer – Primary function is to download and execute second-stage payloads from C2 servers (‘Smoke’s primary function is to download and execute second stage malware’).
  • [T1027] Obfuscated Files or Information – Constants and protocol fields are obfuscated (XOR with hardcoded values, RC4, CRC32 additions) to hinder static detections (‘various constants are obfuscated using a simple function that performs an XOR operation with a hardcoded value’).
  • [T1608] Stage Capabilities (modular plugins) – Uses optional plugin framework for credential harvesting, browser hijacking, crypto mining, and DDoS tasks (‘modular plugin framework that is capable of credential harvesting, browser hijacking, cryptocurrency mining, and more’).

Indicators of Compromise

  • [File Hash ] SmokeLoader version 2025 alpha samples – fe18dba2d72ccf4a907d07674b18d1bc23e3ea10f66cbf2a79e73000df43b358, d5e20fc37dd77dd0360fd32446799978048a2c60e036dbfbf5e671333ebd81f1
  • [File Hash ] Additional 2025/2025 alpha sample hashes – 413325dfeddf2287f86ca9998c1f6be2942145a647a14f1bfe1390e738adae61, d38f9ab81a054203e5b5940e6d34f3c8766f4f4104b14840e4695df511feaa30 (and 2 more hashes)
  • [Domain ] Command-and-control endpoints used for payloads and beacons – ardt[.]info/tmp, disciply[.]nl/tmp, e-bonds[.]ru/tmp (examples from observed C2 list)
  • [Domain ] Additional C2 domains and paths – cobyrose[.]com/tmp, ownmbaego[.]com/index.php (HTTP and HTTPS variants observed)
  • [IP Address ] C2 IP addresses – 176.46.152[.]46, 178.16.53[.]7 (observed serving SmokeLoader C2 content)


Read more: https://www.zscaler.com/blogs/security-research/smokeloader-rises-ashes