Skip to main content
Mallory

SmokeLoader Campaigns Exposed Through Remus Plugin and Shared C2 Infrastructure

threat-infrastructure-trackingcommand-and-control-methodcredential-stealer-activityloader-delivery-mechanismcybercrime-service-ecosystem
Updated April 25, 2026 at 01:12 AM3 sources
Share:
SmokeLoader Campaigns Exposed Through Remus Plugin and Shared C2 Infrastructure

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Researchers traced multiple SmokeLoader operations to live command-and-control infrastructure that supported credential theft, screenshot capture, clipboard theft, host profiling, and data exfiltration. One March 2026 campaign used a ClickFix social-engineering lure, an MSI installer, and a Go-based loader to deploy the Remus plugin, with exfiltration sent to baxe[.]pics:48261; investigators extracted configuration data including the C2 URL, campaign ID, plugin markers, and a ChaCha20 key that allowed captured traffic to be decrypted. Cross-sample analysis linked the same builder output to SmokeLoader deliveries via Amadey, Phorpiex, and the ClickFix/GOLoader chain, pointing to a shared malware-as-a-service or affiliate ecosystem.

Separate analysis tied SmokeLoader to a broader dual-family operation involving Fuery, likely run by an operator using the alias "ingermany", who used a Flask-based panel disguised as "InsureFlow Pro" and a second "Monkey" panel for Fuery management. Investigators documented repeated OPSEC failures across the infrastructure, including reused certificates, exposed registration data, same-day domain registrations, and a C2 domain that shared a VPS with a legitimate Arabic-language learning platform, qimmaedu[.]com, while malware traffic beaconed to coox[.]live and baxe[.]pics. The reports also highlighted unusual technical overlaps, including Go 1.20.1 builds, Raft protocol type-name obfuscation, split C2 services on high ports, and hosting links to providers and subnets previously associated with Phorpiex, reinforcing the assessment that financially motivated operators were reusing infrastructure across malware families and legitimate services.

Timeline

  1. Mar 12, 2026

    Cross-sample analysis links Remus delivery to broader MaaS ecosystem

    Researchers found the same builder output across SmokeLoader samples delivered via Amadey, Phorpiex, and the ClickFix/GOLoader chain, indicating a shared malware-as-a-service or affiliate distribution ecosystem. The activity was assessed as financially motivated cybercrime, with Vietnamese and Eastern European infrastructure indicators but no definitive attribution.

  2. Mar 12, 2026

    Researchers trace live Remus C2 and decrypt campaign configuration

    Breakglass Intelligence traced the March 2026 campaign to a live command-and-control server at baxe[.]pics:48261 on an OVH Singapore VPS and extracted the Remus plugin configuration, including the C2 URL, campaign ID, plugin markers, and a ChaCha20 key. These findings enabled decryption of captured traffic and exposed multiple operator OPSEC failures, including certificate reuse and same-day domain registrations.

  3. Mar 12, 2026

    ClickFix lure campaign delivers SmokeLoader and Remus plugin

    In March 2026, researchers analyzed a SmokeLoader campaign that used a ClickFix social-engineering lure, an MSI installer, and a Go-based loader to deploy the Remus plugin. The infection chain included credential theft, wallet targeting, and deployment of a plugin capable of screenshot capture, clipboard theft, and host profiling.

  4. Mar 5, 2026

    Breakglass links SmokeLoader and Fuery to single operator "ingermany"

    Breakglass Intelligence published findings that linked SmokeLoader and Fuery infrastructure, domains, certificates, and hosting history to a likely single operator distinct from CERT-UA's UAC-0006. The report also highlighted OPSEC failures and overlap with infrastructure associated with Phorpiex-hosting environments.

  5. Mar 5, 2026

    Researchers expose shared VPS hosting malware C2 and Arabic LMS

    Breakglass Intelligence reported that baxe[.]pics shared infrastructure with qimmaedu[.]com on the same Hetzner VPS, and that a public source map for the LMS leaked developer artifacts linked to the handle sasa4452. The report assessed that the same operator likely reused the VPS for both legitimate projects and SmokeLoader infrastructure.

  6. Mar 5, 2026

    SmokeLoader sample observed exfiltrating data to baxe[.]pics and coox[.]live

    On March 5, 2026, sandbox analysis of a SmokeLoader sample showed active beaconing to coox[.]live and exfiltration to baxe[.]pics on port 48261, with more than 1 MB of stolen data sent during a single run. Researchers tied baxe[.]pics to a Hetzner VPS that also hosted the legitimate Arabic LMS site qimmaedu[.]com.

  7. Mar 5, 2026

    Operator deploys dual SmokeLoader and Fuery C2 infrastructure

    A threat actor using the alias "ingermany" stood up a live botnet operation that ran SmokeLoader and Fuery through separate but linked command-and-control panels, including a Flask-based panel disguised as "InsureFlow Pro" and Fuery infrastructure branded as the "Monkey" panel. The infrastructure and malware families shared hosting, build traits, and a Raft-protocol-themed obfuscation method.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Signed Malware Installers and Live C2 Infrastructure Fuel Multiple Loader Campaigns

Signed Malware Installers and Live C2 Infrastructure Fuel Multiple Loader Campaigns

Breakglass Intelligence identified several active malware delivery operations using signed installers, compromised websites, and live command-and-control infrastructure to distribute loaders, stealers, and remote access tools. One campaign used the newly registered domain `maybedontbanplease[.]com` as CastleLoader C2 on 3NT Solutions LLP infrastructure, with a large NSIS installer embedding Python 3.14, AES-encrypted payloads, and in-memory shellcode execution via `pythonw.exe`; the installer was signed with an EV certificate issued to the likely fictitious entity **SERPENTINE SOLAR LIMITED**. The activity was attributed with medium-high confidence to **GrayBravo** and linked to delivery of **LummaC2, StealC, RedLine, Rhadamanthys, DeerStealer, NetSupport RAT,** and **SectopRAT**, with targeting that included U.S. government, critical infrastructure, IT, and logistics organizations. A separate operation distributed a trojanized `MSTeamsSetup.exe` that installed a weaponized **RustDesk** client and communicated with `mon.systemautoupdater[.]com` on EvoXT infrastructure, while presenting a TLS certificate for `calipology[.]com`, tying the activity to the **GeorgeGinx/Striker** operator. In another live campaign, attackers used the compromised Syrian web development site `allsydevs[.]com` to host an obfuscated .NET loader masquerading as a WordPress image and connected victims to `172[.]93[.]167[.]12:4263` over HTTPS using a self-signed certificate with the fake common name **Mesh Data**; at least six related samples were linked to the same C2, with lure names suggesting targeting of Middle Eastern construction and export firms. Together, the investigations show financially motivated actors expanding malware distribution through fraudulent code-signing, trojanized business software, and hijacked web infrastructure.

1 weeks ago
ResolverRAT, LummaStealer, and Amadey Linked in Multi-Tool Cybercrime Campaign

ResolverRAT, LummaStealer, and Amadey Linked in Multi-Tool Cybercrime Campaign

Researchers tied **ResolverRAT**, **LummaStealer**, and an **Amadey** botnet cluster to an active financially motivated campaign that has operated since at least late 2025 and uses fake browser update lures, staged loaders, and legitimate remote management tools for persistence. One analyzed chain used a Donut-decrypted, triple-protected `.NET` loader to deliver both ResolverRAT and LummaStealer at once, combining persistent remote access with credential and cryptocurrency wallet theft. The malware used layered obfuscation including .NET Reactor, custom transformations, AES-256-CBC, GZip, process hollowing, fragmented WinAPI reconstruction, forged compile timestamps, encrypted resource blobs, and certificate pinning, while operators rotated infrastructure across dozens of IPs, multiple domains, and hosting providers in Russia, the Netherlands, Germany, Poland, and elsewhere. Investigators also identified a fake Microsoft-themed domain, **pat[.]microsoft-telemetry[.]at**, and newly activated infrastructure such as **kampf[.]huehnchenfarm[.]ru** tied to the same ecosystem. A parallel March 2026 investigation linked the **fbf543** Amadey campaign to more than 50 payloads spanning at least 13 malware families, including Vidar, QuasarRAT, XWorm, AsyncRAT, Smoke Loader, and LummaStealer, with delivery through fake installers and hosting on infrastructure centered on **Omegatech LTD (AS202412)** and related abusive networks. Analysts found that the operators also abused nine legitimate, signed RMM tools from **ConnectWise, DattoRMM, Atera, GoToResolve, and N-able**, configuring them to beacon to attacker-controlled relays rather than compromising the vendors themselves. A separate Go-based loader unpacked LummaStealer with AES, RC4, and QuickLZ before hollowing **AppLaunch.exe**, reinforcing a playbook built around stealthy loaders, infostealer deployment, redundant access channels, and monetization consistent with an initial access broker or ransomware affiliate operation.

1 weeks ago
Chinese-Language Malware Operations Exposed Through GoLoader, ValleyRAT, and FUD Crypt

Chinese-Language Malware Operations Exposed Through GoLoader, ValleyRAT, and FUD Crypt

Researchers uncovered multiple malware operations using scalable builder and crypting infrastructure to deliver remote-access trojans and evade detection. Breakglass Intelligence found two unauthenticated **GoLoader** builder panels that had produced **468,349** polymorphic samples across 71 active tasks, while leaking Alibaba Cloud OSS credentials tied to a public bucket containing LNK droppers, polymorphic VBS scripts, steganographic PNG carriers, .NET loaders, and RAT payloads. The reconstructed infection chain ended with **njRAT**, and reversing its custom AES-256-ECB configuration revealed the C2 `laohe1[.]myvnc[.]com:5000`, overlapping with infrastructure previously associated with **XWorm**. The campaign was assessed with moderate confidence as operated by a Chinese-speaking actor using Simplified Chinese cryptocurrency lures. A separate Breakglass report linked **ValleyRAT** samples targeting Chinese-speaking users to a campaign that blended long-lived Hong Kong infrastructure with a likely compromised UK academic relay. One sample connected to `103.215.77[.]17:4488`, a Hong Kong-hosted server linked to dozens of related malware submissions, while another Rust loader masquerading as **Microsoft OneDrive Sync Engine** decrypted and loaded a ValleyRAT core DLL after sandbox checks; its stage-two C2 used a `govroam.cf.ac[.]uk` hostname resolving into Cardiff University space, suggesting temporary relay use through a compromised GovRoam-connected endpoint. In parallel, researchers analyzing the **FUD Crypt** malware-as-a-service platform found it packaged Windows malware with persistence, C2, and evasion features, tracked **200** registered users and **334** confirmed builds, and documented abuse of Microsoft **Azure Trusted Signing** to produce Microsoft-rooted Authenticode signatures for malicious binaries.

1 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.