TA516

Description

(Proofpoint) This actor typically distributes instances of the SmokeLoader intermediate downloader, which, in turn, downloads additional malware of the actor’s choice — often banking Trojans. Figure 3 shows a lure document from a November campaign in which TA516 distributed fake resumes with malicious macros that, if enabled, launch a PowerShell script that downloads SmokeLoader. In this instance, we observed SmokeLoader downloading a Monero coinminer. Since the middle of 2017, TA516 has used similar macro-laden documents as well as malicious JavaScript hosted on Google Drive to distribute both Panda Banker and a coinminer executable via SmokeLoader, often in the same campaigns.

Names

NameName-Giver
TA516Proofpoint
SmokingDroProofpoint

Country

Motivation

  • Financial crime
  • Financial gain

First Seen

2016

Observed Countries

Tools

Operations

Information

Other Information

Uuid

24184e42-b04f-4878-8fd3-e53acf7526f2

Last Card Change

2023-01-01