βœ”οΈ Crowdsourced Lost & Found – Global Network for Lost Items

✨A decentralized, community-driven platform that helps people recover lost items by connecting them with nearby finders in real-time.

#lostandfound #crowdsourcing #smartrecovery #geolocationtracking #communitydrivensecurity

πŸ” Technical Analysis: Smoke Loader Malware Leveraging Wi-Fi Access Points for Geolocation

πŸ“… Date: August 28, 2023
πŸ–‹οΈ Author: Eswar

πŸ“Œ Tags: #Malware #SmokeLoader #Geolocation #Wi-FiScanning #Cybersecurity

πŸ› οΈ The Smoke Loader malware, recently discovered, employs a novel technique to locate infected systems through Wi-Fi access points and Google's Geolocation API. This technical analysis sheds light on the key mechanisms used by this malware.

πŸ”— System Location Identification:
The malware, also known as "Whiffy Recon," utilizes a custom Wi-Fi scanning tool to identify an infected system's precise coordinates using nearby Wi-Fi access points. This is achieved by leveraging the Windows WLANSVC service and Google's Geolocation API.

πŸ”’ Infection Process:
The malware checks the existence of the WLANSVC service, regardless of its operational status. If the service exists, the malware creates a wlan.lnk shortcut in the Startup folder pointing to the malware's original location. On the other hand, if the service is absent, the malware terminates execution.

πŸ”„ Malware Loops:
There are two loops in the malware's execution flow:

  • The first loop checks for the presence of the file %APPDATA%\wlan\str-12.bin. If valid parameters are found, the malware proceeds to the next loop for Wi-Fi scanning.
  • In the absence of the file, the malware registers the bot with the Command and Control (C2) server, sending a JSON payload in an HTTPS POST request with a hard-coded UUID for bot identification.
  • πŸ“₯ Registration and Communication:
    Upon successful registration, the server responds with a secret UUID, replacing the initial bot ID for future requests. Both UUIDs are stored in the str-12.bin file. The malware then scans for Wi-Fi access points using the Windows WLAN API, sending results to Google's Geolocation API via HTTPS POST requests.

    🌐 Google Geolocation API:
    The Geolocation API provides system coordinates based on Wi-Fi access points and mobile network data. The obtained coordinates are integrated into a JSON structure along with encryption methods of access points. This data is sent to the C2 server through HTTP POST requests with Authorization UUID and specific URLs.

    πŸ”Ž Indicators of Compromise:

    Whiffy Recon sample dropped by Smoke Loader

    • MD5 hash: 009230972491f5f5079e8e86e19d5458
    • SHA256 hash: 935b44784c055a897038b2cb6f492747c0a1487f0ee3d3a39319962317cd4087

    Whiffy Recon sample dropped by Smoke Loader

    • SHA1 hash: 8532e67e1fd8441dc8ef41f5e75ee35b0d12a087

    Whiffy Recon C2 server

    • 194.87.32[.]20

    Whiffy Recon payload URL

    πŸ›‘οΈ Recommendations:
    Cybersecurity professionals are advised to be vigilant against Smoke Loader malware and Whiffy Recon malware. Monitoring for these indicators of compromise can aid in identifying and mitigating potential threats.

    Source: https://cybersecuritynews.com/smoke-loader-malware-locates-using-wi-fi/

    #Cybersecurity #ThreatAnalysis #MalwareDetection #GeolocationTracking #WindowsMalware