GetSmoked: UAC-0006 Returns With SmokeLoader Targeting Ukraine's Largest State-Owned Bank

UAC-0006, a financially motivated cyber threat group, has resurfaced with a sophisticated phishing campaign targeting customers of Ukraine’s largest state-owned bank, PrivatBank. This campaign exploits password-protected archives containing malicious JavaScript, VBScript, and LNK files to bypass detection and deploy the SmokeLoader malware via process injection and PowerShell execution. With strong overlaps in tactics, techniques, and procedures (TTPs) with the notorious FIN7 and other Russian APTs, UAC-0006 aims to steal credentials and financial data while maintaining persistent access to compromised systems. Organizations must stay vigilant, enhance security awareness, and implement robust threat intelligence to counteract this growing cyber threat.

Koushik Pal
February 5, 2025
Green Alert
Last Update posted on
February 5, 2025
Proactive Monitoring of the Dark Web for your organization.

Proactively monitor and defend your organization against threats from the dark web with CloudSEK XVigil.

Schedule a Demo
Table of Contents
Author(s)
No items found.

Executive Summary

The ongoing phishing campaigns by UAC-0006, a financially motivated threat actor, are targeting the customers of Ukraine’s largest bank, PrivatBank. This campaign uses password-protected archives containing malicious JavaScript, VBScript, or LNK files to evade detection. The payloads include SmokeLoader, delivered using process injection, PowerShell, and legitimate system binaries, leading to C2 communication and payload execution. UAC-0006’s tactics, techniques, and procedures (TTPs) overlap with those of FIN7, indicating ties to Russian APT activity. 

Analysis 

Based on the sample attributes, we were able to find an active campaign being carried out by the threat actor. It’s a payment-themed phishing campaign targeting customers of Ukraine’s largest state-owned bank.

Payment-themed phishing campaign(Targeting Ukraine’s Largest State-Owned Bank)

The threat actors have been targeting PrivatBank’s customers since at least November 2024, with over two dozen distinct samples seen in the wild since then.

1. Phishing lure(SHA256): 5a0b48ccc1a353c4ace5e9626f17622611432a016577797d4c891ca945ffa7f8 (Privatbank_invoce_payment_20_12_2024.zip) drops 80c450570cd338a594546f9e6c189ffc2a849d3bac3759c53592af30840ffb90 (Платiжна iнструкция №187-ФГ вiд 19.12.2024p.pdf.js - translates to Payment instruction No. 187-FY dated 19.12.2024p.pdf.js)

Translated text:

The account is valid for three banking days. In case of non-payment within three banking days, the amount will be changed.

Information for the Customer:

1. Reserve for components (materials) is kept for 5 days. Extension of the reserve period is possible

2. Electronic units, instrument panels and spare parts that were ordered individually, exchanged and returned

WARNING! Powers of attorney must be issued in accordance with Instruction No. 99 of May 15, 1996. In the case of the purchase of spare parts, including valuables. In the case of maintenance or repair of the car, it is not accepted to indicate the car model and registration number written on the amount.

2. Phishing lure(SHA256): e0c57518aeef787bcf7cc13484486cfa48458bdf6b0baee02598e777a3ef83f2 (invoce2.pdf) drops ca90047f4c8b5c6628e38f11c1b3411ac8f0040a2d72e35c1a37de1d9a127131( Скан-копiя Власника.pdf.js - translates to Scan copy of the Owner.pdf.js) and dada50182ca98f75e0055f9b4a47d8ef3a6dda5c126cac309467c02257f3c1c0 (Скан-копiя Паспорт.vbs) - translates to Scanned copy of Passport.vbs)

Attack Flow

GetSmoked - Execution Flows - Oct 2024 to early Jan 2025

GetSmoked - Execution Flows - Late Jan 2025

  1. The threat actor sends a phishing email with a password-protected zip/rar attachment. Archives are more likely to be password protected to evade email security checks.
  2. A malicious javascript file, and a malicious VBScript are extracted from the archive. The 
  3. The javascript performs process injection to wscript.exe, which in turn, runs an encoded powershell command.
  4. The powershell command is meant to complete 2 tasks: 
    1. Firstly, it opens the PDF that was meant to be opened when the user downloaded and executed the attachment. 
    2. Secondly, it contacts SmokeLoader’s C2 servers to download and execute the final payload of the threat actor’s choice. 
  5. More recently, we are starting to see UAC-0006 use an LNK lure in their phishing baits. When the .lnk file is executed, it runs powershell.exe with the specified command line arguments. This launches mshta.exe to retrieve and execute the file hosted on the C2 servers.

Attribution

We have observed the following about the threat actors:

  • They are fond of phishing lures with malicious capabilities.
  • They just LOVE powershell.
  • They have been persistently targeting the largest bank in Ukraine (Example - multiple phishing emails sent to Privatbank, Ukraine)

These attributes closely overlap with the profile of UAC-0006, a financially motivated threat actor group. Between 2023 and 2025, the threat actor group has started using LNKs and VBScripts in their phishing attack chain, in addition to what was publicly known according to the previous report. This highlights a TTP overlap with EmpireMonkey, a threat actor group that seems to be directly related to Carbanak, Anunak and/or FIN7. It is important to note that FIN7 is a Russian APT group with known ties to Black Basta ransomware group.

Diamond Model:  UAC-0006

Impact

  • Compromise of Sensitive Data: Victims of the phishing campaign risk disclosing sensitive personal or corporate data, including credentials, financial information, and organizational secrets, which can be exploited for further attacks or sold on underground markets.
  • Credential Harvesting and Espionage: These phishing campaigns target individuals in key industries, potentially enabling espionage activities, unauthorized access to critical systems, and operational disruptions.
  • Brand Damage and Mistrust: Companies impersonated in the phishing lures, such as CMIT Solutions, Soho Square Solutions, and Templar Protective Associates, face reputational harm, eroding trust among their clients and stakeholders.
  • Supply Chain Risks: The impersonation of service providers and consultants increases the risk of downstream supply chain attacks, potentially impacting associated organizations and industries.

Mitigation

  • Monitoring and Blocking: Proactively monitor and block malicious indicators using threat intelligence feeds to prevent access at the disk, DNS or network level.
  • Incident Response and Reporting: Implement given yara rules based on internal thresholds. Establish robust incident response procedures to identify and contain phishing attempts quickly, and encourage employees and the community to report suspicious activities to facilitate takedown actions.
  • Security Awareness Training: Educate employees, particularly those involved in hiring or HR roles, to recognize phishing attempts, such as unsolicited job-related emails from suspicious domains or unfamiliar contacts.

References

Appendix

MITRE Mapping

Tactics and Techniques Table
Tactic Technique ID Technique Name Procedure Details
Initial Access T1566.001 Spear-phishing Attachment Threat actor delivers malicious archive files via AWS Titan Email containing JS/VBS or LNK files
Initial Access T1547.001 Shortcut Modification Uses .LNK files in newer variant of the campaign
Defense Evasion T1027.002 Software Packing Use of password-protected archives to evade email security controls
Defense Evasion T1027 Obfuscated Files or Information Use of encoded PowerShell commands to hide malicious activity
Execution T1204.002 User Execution: Malicious File Requires user to open the malicious attachment
Execution T1059.007 JavaScript Executes malicious JavaScript code
Execution T1059.005 Visual Basic Executes malicious VBScript code
Execution T1059.001 PowerShell Uses PowerShell to execute encoded commands
Execution T1218.005 Mshta Uses mshta.exe to retrieve and execute files (in LNK variant)
Privilege Escalation T1055 Process Injection JavaScript performs injection into wscript.exe
Command and Control T1105 Ingress Tool Transfer Downloads SmokeLoader malware from C2 server
Command and Control T1571 Non-Standard Port SmokeLoader communicates with C2 server
Defense Evasion T1036 Masquerading Opens legitimate PDF to mask malicious activity

Indicators of Compromise

Indicators of Compromise
IOC(s) Comments
Phishing Lures - October 2024 to January 2025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 (Paxy_419_08_01_2025p_privat_bank_invoce.CHM)
5a0b48ccc1a353c4ace5e9626f17622611432a016577797d4c891ca945ffa7f8 (Privatbank_invoce_payment_20_12_2024.zip)
476a8e2d8eae4d2315e719bf67be312c5e88476509bdbac2dffee48986ad54c1 (paxynok_privatbank_06_01_2025p.zip)
SHA256 (PDFs, CHMs, zip, rar)
http://89.23.107[.]219/privat.exe
http://3-zak-media[.]de/temp/paxynok_privatbank_06_01_2025p.zip
http://3-zak-media[.]de/temp/gate.php
http://89.23.107[.]219/invoce.pdf
http://89.23.107[.]219/final.mp4
http://spotcarservice[.]ru/fdjskf88cvt/invoce.pdf
http://spotcarservice[.]ru/fdjskf88cvt/invoce2.pdf
http://spotcarservice[.]ru/fdjskf88cvt/putty1.exe
http://spotcarservice[.]ru/fdjskf88cvt/yumba/putty.exe
http://3-zak-media[.]de/krayer-buergerschaft/Web/bilder/putty1.exe
http://cityutl[.]ru/download/pax.pdf
http://cityutl[.]ru/download/putty.exe
Contacted URLs
connecticutproperty[.]ru
constractionscity1991[.]lat
restructurisationservice[.]ru
spotcarservice[.]ru
3-zak-media[.]de
cityutl[.]ru
SmokeLoader Command and Control servers
94.156.177[.]51
89.23.107[.]219
109.70.26[.]37
Contacted IPs

YARA Rules Showcase

YARA Rules

rule Detect_Obfuscated_PowerShell_AES_Decryption {
    meta:
        author = "CloudSEK TRIAD"
        description = "Detects obfuscated PowerShell execution with AES decryption techniques"
        date = "2025-01-28"
        threat_actor = "Unknown"
        ttp = "Obfuscated PowerShell with AES decryption"

    strings:
        $powershell_flags = "-w 1 -ep Unrestricted -nop"
        $split_obfuscation = "return -split"
        $aes_create = "[Security.Cryptography.Aes]::Create()"
        $decryptor = ".CreateDecryptor("
        $transform_final_block = ".TransformFinalBlock("
        $char_array_join = "-join [char[]]"
        $custom_function_start = "function "
        $hex_processing = "-replace '..', '0x$& '"

    condition:
        uint16(0) == 0x5a4d and
        (
            all of ($powershell_flags, $split_obfuscation) or
            all of ($aes_create, $decryptor, $transform_final_block) or
            all of ($custom_function_start, $hex_processing)
        )
}

rule Detect_PowerShell_TTP_JS_PDF_Lure {
    meta:
        description = "Detects malicious PowerShell TTP triggered from .js in phishing PDF lures"
        author = "CloudSEK TRIAD"
        date = "2025-01-28"
        reference = "Threat intelligence analysis"
        tags = ["PowerShell", "phishing", "TTP", "malware", "PDF", "JS"]

    strings:
        $powershell_flags = "-w 1 -ep Unrestricted -nop"
        $function_def_bdhOG = "function bdhOG"
        $function_def_ujddZ = "function ujddZ"
        $aes_create = "([Security.Cryptography.Aes]::Create()).CreateDecryptor"
        $wscript_call = /"WScript\.exe" called "CreateProcessW" with parameter/i
        $embedded_js = /.*<\/script>/is

    condition:
        1 of ($powershell_flags, $function_def_bdhOG, $function_def_ujddZ, $aes_create) and
        $wscript_call and
        $embedded_js
}

Predict Cyber threats against your organization

Related Posts
No items found.

Join 10,000+ subscribers

Keep up with the latest news about strains of Malware, Phishing Lures,
Indicators of Compromise, and Data Leaks.

Take action now

Secure your organisation with our Award winning Products

CloudSEK Platform is a no-code platform that powers our products with predictive threat analytic capabilities.

Malware Intelligence

7

min read

GetSmoked: UAC-0006 Returns With SmokeLoader Targeting Ukraine's Largest State-Owned Bank

UAC-0006, a financially motivated cyber threat group, has resurfaced with a sophisticated phishing campaign targeting customers of Ukraine’s largest state-owned bank, PrivatBank. This campaign exploits password-protected archives containing malicious JavaScript, VBScript, and LNK files to bypass detection and deploy the SmokeLoader malware via process injection and PowerShell execution. With strong overlaps in tactics, techniques, and procedures (TTPs) with the notorious FIN7 and other Russian APTs, UAC-0006 aims to steal credentials and financial data while maintaining persistent access to compromised systems. Organizations must stay vigilant, enhance security awareness, and implement robust threat intelligence to counteract this growing cyber threat.

Authors
Koushik Pal
Co-Authors
No items found.

Executive Summary

The ongoing phishing campaigns by UAC-0006, a financially motivated threat actor, are targeting the customers of Ukraine’s largest bank, PrivatBank. This campaign uses password-protected archives containing malicious JavaScript, VBScript, or LNK files to evade detection. The payloads include SmokeLoader, delivered using process injection, PowerShell, and legitimate system binaries, leading to C2 communication and payload execution. UAC-0006’s tactics, techniques, and procedures (TTPs) overlap with those of FIN7, indicating ties to Russian APT activity. 

Analysis 

Based on the sample attributes, we were able to find an active campaign being carried out by the threat actor. It’s a payment-themed phishing campaign targeting customers of Ukraine’s largest state-owned bank.

Payment-themed phishing campaign(Targeting Ukraine’s Largest State-Owned Bank)

The threat actors have been targeting PrivatBank’s customers since at least November 2024, with over two dozen distinct samples seen in the wild since then.

1. Phishing lure(SHA256): 5a0b48ccc1a353c4ace5e9626f17622611432a016577797d4c891ca945ffa7f8 (Privatbank_invoce_payment_20_12_2024.zip) drops 80c450570cd338a594546f9e6c189ffc2a849d3bac3759c53592af30840ffb90 (Платiжна iнструкция №187-ФГ вiд 19.12.2024p.pdf.js - translates to Payment instruction No. 187-FY dated 19.12.2024p.pdf.js)

Translated text:

The account is valid for three banking days. In case of non-payment within three banking days, the amount will be changed.

Information for the Customer:

1. Reserve for components (materials) is kept for 5 days. Extension of the reserve period is possible

2. Electronic units, instrument panels and spare parts that were ordered individually, exchanged and returned

WARNING! Powers of attorney must be issued in accordance with Instruction No. 99 of May 15, 1996. In the case of the purchase of spare parts, including valuables. In the case of maintenance or repair of the car, it is not accepted to indicate the car model and registration number written on the amount.

2. Phishing lure(SHA256): e0c57518aeef787bcf7cc13484486cfa48458bdf6b0baee02598e777a3ef83f2 (invoce2.pdf) drops ca90047f4c8b5c6628e38f11c1b3411ac8f0040a2d72e35c1a37de1d9a127131( Скан-копiя Власника.pdf.js - translates to Scan copy of the Owner.pdf.js) and dada50182ca98f75e0055f9b4a47d8ef3a6dda5c126cac309467c02257f3c1c0 (Скан-копiя Паспорт.vbs) - translates to Scanned copy of Passport.vbs)

Attack Flow

GetSmoked - Execution Flows - Oct 2024 to early Jan 2025

GetSmoked - Execution Flows - Late Jan 2025

  1. The threat actor sends a phishing email with a password-protected zip/rar attachment. Archives are more likely to be password protected to evade email security checks.
  2. A malicious javascript file, and a malicious VBScript are extracted from the archive. The 
  3. The javascript performs process injection to wscript.exe, which in turn, runs an encoded powershell command.
  4. The powershell command is meant to complete 2 tasks: 
    1. Firstly, it opens the PDF that was meant to be opened when the user downloaded and executed the attachment. 
    2. Secondly, it contacts SmokeLoader’s C2 servers to download and execute the final payload of the threat actor’s choice. 
  5. More recently, we are starting to see UAC-0006 use an LNK lure in their phishing baits. When the .lnk file is executed, it runs powershell.exe with the specified command line arguments. This launches mshta.exe to retrieve and execute the file hosted on the C2 servers.

Attribution

We have observed the following about the threat actors:

  • They are fond of phishing lures with malicious capabilities.
  • They just LOVE powershell.
  • They have been persistently targeting the largest bank in Ukraine (Example - multiple phishing emails sent to Privatbank, Ukraine)

These attributes closely overlap with the profile of UAC-0006, a financially motivated threat actor group. Between 2023 and 2025, the threat actor group has started using LNKs and VBScripts in their phishing attack chain, in addition to what was publicly known according to the previous report. This highlights a TTP overlap with EmpireMonkey, a threat actor group that seems to be directly related to Carbanak, Anunak and/or FIN7. It is important to note that FIN7 is a Russian APT group with known ties to Black Basta ransomware group.

Diamond Model:  UAC-0006

Impact

  • Compromise of Sensitive Data: Victims of the phishing campaign risk disclosing sensitive personal or corporate data, including credentials, financial information, and organizational secrets, which can be exploited for further attacks or sold on underground markets.
  • Credential Harvesting and Espionage: These phishing campaigns target individuals in key industries, potentially enabling espionage activities, unauthorized access to critical systems, and operational disruptions.
  • Brand Damage and Mistrust: Companies impersonated in the phishing lures, such as CMIT Solutions, Soho Square Solutions, and Templar Protective Associates, face reputational harm, eroding trust among their clients and stakeholders.
  • Supply Chain Risks: The impersonation of service providers and consultants increases the risk of downstream supply chain attacks, potentially impacting associated organizations and industries.

Mitigation

  • Monitoring and Blocking: Proactively monitor and block malicious indicators using threat intelligence feeds to prevent access at the disk, DNS or network level.
  • Incident Response and Reporting: Implement given yara rules based on internal thresholds. Establish robust incident response procedures to identify and contain phishing attempts quickly, and encourage employees and the community to report suspicious activities to facilitate takedown actions.
  • Security Awareness Training: Educate employees, particularly those involved in hiring or HR roles, to recognize phishing attempts, such as unsolicited job-related emails from suspicious domains or unfamiliar contacts.

References

Appendix

MITRE Mapping

Tactics and Techniques Table
Tactic Technique ID Technique Name Procedure Details
Initial Access T1566.001 Spear-phishing Attachment Threat actor delivers malicious archive files via AWS Titan Email containing JS/VBS or LNK files
Initial Access T1547.001 Shortcut Modification Uses .LNK files in newer variant of the campaign
Defense Evasion T1027.002 Software Packing Use of password-protected archives to evade email security controls
Defense Evasion T1027 Obfuscated Files or Information Use of encoded PowerShell commands to hide malicious activity
Execution T1204.002 User Execution: Malicious File Requires user to open the malicious attachment
Execution T1059.007 JavaScript Executes malicious JavaScript code
Execution T1059.005 Visual Basic Executes malicious VBScript code
Execution T1059.001 PowerShell Uses PowerShell to execute encoded commands
Execution T1218.005 Mshta Uses mshta.exe to retrieve and execute files (in LNK variant)
Privilege Escalation T1055 Process Injection JavaScript performs injection into wscript.exe
Command and Control T1105 Ingress Tool Transfer Downloads SmokeLoader malware from C2 server
Command and Control T1571 Non-Standard Port SmokeLoader communicates with C2 server
Defense Evasion T1036 Masquerading Opens legitimate PDF to mask malicious activity

Indicators of Compromise

Indicators of Compromise
IOC(s) Comments
Phishing Lures - October 2024 to January 2025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 (Paxy_419_08_01_2025p_privat_bank_invoce.CHM)
5a0b48ccc1a353c4ace5e9626f17622611432a016577797d4c891ca945ffa7f8 (Privatbank_invoce_payment_20_12_2024.zip)
476a8e2d8eae4d2315e719bf67be312c5e88476509bdbac2dffee48986ad54c1 (paxynok_privatbank_06_01_2025p.zip)
SHA256 (PDFs, CHMs, zip, rar)
http://89.23.107[.]219/privat.exe
http://3-zak-media[.]de/temp/paxynok_privatbank_06_01_2025p.zip
http://3-zak-media[.]de/temp/gate.php
http://89.23.107[.]219/invoce.pdf
http://89.23.107[.]219/final.mp4
http://spotcarservice[.]ru/fdjskf88cvt/invoce.pdf
http://spotcarservice[.]ru/fdjskf88cvt/invoce2.pdf
http://spotcarservice[.]ru/fdjskf88cvt/putty1.exe
http://spotcarservice[.]ru/fdjskf88cvt/yumba/putty.exe
http://3-zak-media[.]de/krayer-buergerschaft/Web/bilder/putty1.exe
http://cityutl[.]ru/download/pax.pdf
http://cityutl[.]ru/download/putty.exe
Contacted URLs
connecticutproperty[.]ru
constractionscity1991[.]lat
restructurisationservice[.]ru
spotcarservice[.]ru
3-zak-media[.]de
cityutl[.]ru
SmokeLoader Command and Control servers
94.156.177[.]51
89.23.107[.]219
109.70.26[.]37
Contacted IPs

YARA Rules Showcase

YARA Rules

rule Detect_Obfuscated_PowerShell_AES_Decryption {
    meta:
        author = "CloudSEK TRIAD"
        description = "Detects obfuscated PowerShell execution with AES decryption techniques"
        date = "2025-01-28"
        threat_actor = "Unknown"
        ttp = "Obfuscated PowerShell with AES decryption"

    strings:
        $powershell_flags = "-w 1 -ep Unrestricted -nop"
        $split_obfuscation = "return -split"
        $aes_create = "[Security.Cryptography.Aes]::Create()"
        $decryptor = ".CreateDecryptor("
        $transform_final_block = ".TransformFinalBlock("
        $char_array_join = "-join [char[]]"
        $custom_function_start = "function "
        $hex_processing = "-replace '..', '0x$& '"

    condition:
        uint16(0) == 0x5a4d and
        (
            all of ($powershell_flags, $split_obfuscation) or
            all of ($aes_create, $decryptor, $transform_final_block) or
            all of ($custom_function_start, $hex_processing)
        )
}

rule Detect_PowerShell_TTP_JS_PDF_Lure {
    meta:
        description = "Detects malicious PowerShell TTP triggered from .js in phishing PDF lures"
        author = "CloudSEK TRIAD"
        date = "2025-01-28"
        reference = "Threat intelligence analysis"
        tags = ["PowerShell", "phishing", "TTP", "malware", "PDF", "JS"]

    strings:
        $powershell_flags = "-w 1 -ep Unrestricted -nop"
        $function_def_bdhOG = "function bdhOG"
        $function_def_ujddZ = "function ujddZ"
        $aes_create = "([Security.Cryptography.Aes]::Create()).CreateDecryptor"
        $wscript_call = /"WScript\.exe" called "CreateProcessW" with parameter/i
        $embedded_js = /.*<\/script>/is

    condition:
        1 of ($powershell_flags, $function_def_bdhOG, $function_def_ujddZ, $aes_create) and
        $wscript_call and
        $embedded_js
}