Uncommon infection and malware propagation methods
2022-10-5 17:0:14 Author: securelist.com(查看原文) 阅读量:20 收藏

Malware reports

Malware reports

minute read

Introduction

We are often asked how targets are infected with malware. Our answer is nearly always the same: (spear) phishing. There will be exceptions, naturally, as we will encounter RCE vulnerabilities every now and then, or if the attacker is already on the network, they will use tools like PsExec. But that’s it — most of the time, anyway.

Last month, we focused on infection methods used in various malware campaigns: methods that we do not see used very often. In this blog post, we provide excerpts from these reports.

For questions or more information on our crimeware reporting service, please contact [email protected].

BlackBasta: a new propagation method

BlackBasta, the notorious ransomware we have written about before, recently received an update. It now has a second optional command line parameter: “-bomb”.

When that parameter is used, the malware does the following:

  1. сonnect to the AD using the LDAP library and obtain a list of machines on the network,
  2. using the list of machines, copy itself to each machine,
  3. using the Component Object Model (COM), run remotely on each machine.

Code snippet showing the LDAP functionality

Code snippet showing the LDAP functionality

The benefit of using an in-built propagation method is that it leaves fewer traces in the system and it is stealthier than using public tools. For example, one of the attackers’ favorite tools, PsExec, is easily detected on the network. The new method leaves the network defenders with fewer possibilities of detecting the malicious activity.

CLoader: infection through malicious torrents

Cybercriminals seldom use malicious torrents to infect their targets. Nevertheless, it is an infection method that should not be ruled out, as evidenced by CLoader.

CLoader was discovered in April 2022. It used cracked games and software as bait to trick users into installing malware. The downloaded files were NSIS installers, containing malicious code in the installation script.

The malicious script: the parts in red indicate the malware download code

The malicious script: the parts in red indicate the malware download code

In total, we observed six different payloads that were downloaded:

  • Microleaves malicious proxy: works as a proxy on the infected machine,
  • Paybiz malicious proxy: works as a proxy on the infected machine,
  • MediaCapital downloader: may install further malware in the system,
  • CSDI downloader: may install further malware in the system,
  • Hostwin64 downloader: may install further malware in the system,
  • Inlog backdoor: installs the legitimate NetSupport application for remote access to the machine.

When we look at the victimology, we see that users all over the world are infected, but mostly in the US, Brazil, and India.

OnionPoison: infections through a fake TOR Browser

In August 2022, we discovered a campaign that had been running since at least January, focusing on Chinese-speaking users. A popular Chinese-language YouTube channel on online anonymity published a video with instructions for installing the Tor browser. That is hardly odd in itself, as the Tor browser is blocked in China. However, if the user clicks on the link in the description, an infected version of the Tor browser is downloaded.

The infected version is almost identical to the original, so that the user does not notice any difference. The difference from the benign version is:

  • The installer lacks a digital signature;
  • One of the DLLs that comes with the original version (freebl3.dll) is completely different, as it contains backdoored code;
  • A new file is included (freebl.dll), which is the same as the original freebl3.dll;
  • The Firefox binary that comes bundled with TOR differs by one byte from the original, namely one character in the URL used for updates. This way the attackers prevent the browser from updating itself;
  • The browser configuration file is changed to provide less anonymity. For example, browsing history is now stored on disk.

The functionality of the backdoored Freebl3.dll is quite simple. It proxies all the functionality to the original DLL and also downloads an additional DLL from the C2.

The downloaded DLL contains most of the malicious functionality. Among other things, it is capable of:

  • executing commands in the system,
  • sending TOR browsing history to the C2,
  • sending the victim’s WeChat and QQ account IDs to the C2.

Adding malicious code to benign software in order to hide illegal activity and trick the user is a technique we encounter more often. What we do not see that often is the backdoored binary being signed. This is precisely the case with AdvancedIPSpyware, which is a backdoored version of the legitimate Advanced IP Scanner tool used by network admins to control LANs. The certificate used to sign the malware is most likely stolen. The malware was hosted on two sites, whose domains were almost identical to the legitimate Advanced IP Scanner website, differing only by one character in the URL. Furthermore, the websites look the same. The only difference is the “free download” button on the malicious websites.

The legitimate vs malicious signed binary

The legitimate vs malicious signed binary

Another uncommon feature of AdvancedIPSpyware is its architecture which is modular. Typically, a modular architecture is seen with nation state-sponsored, not with criminal malware. We observed the following three modules that communicate with one another via IPC:

  • main module: updates or deletes itself, or spawns another instance,
  • command execution module: typical spyware functionality, such as information gathering, command execution, etc.,
  • network communication module: handles all network-related functionality (heartbeat messages, etc.).

The AdvancedIPSpyware campaign has a broad victimology. We have detected several victims in Latin America, Africa, Western Europe, South Asia, Australia, and the CIS. The overall count of victims infected over the course of the campaign is about 80.

Conclusion

Even though malicious actors rely on email as the primary infection vector, other methods should not be ruled out. Domain typosquatting and cracked software downloadable via torrents are just two of the alternative tricks that criminals use to lure victims into installing the malware on their systems.

Ransomware developers keep updating their malware. This time, BlackBasta added functionality that makes forensics and detection more difficult, as the malware can now propagate through the network itself.

If you want to stay up to date on the latest TTPs used by criminals or have questions about our private reports, please contact [email protected].

  • Reports

    In this report we focus on tactics, techniques, and procedures (TTPs) of the DeftTorero (aka Lebanese Cedar or Volatile Cedar) threat actor, which targets Middle East countries.

    Kimsuky (also known as Thallium, Black Banshee and Velvet Chollima) is a prolific and active threat actor primarily targeting Korea-related entities. In early 2022, we observed this group was attacking the media and a think-tank in South Korea.

    VileRAT is a Python implant, part of an evasive and highly intricate attack campaign against foreign exchange and cryptocurrency trading companies.

    Earlier, the CISA published an alert related to a Stairwell report, “Maui Ransomware.” Our data should openly help solidify the attribution of the Maui ransomware incident to the Korean-speaking APT Andariel, also known as Silent Chollima and Stonefly.


    文章来源: https://securelist.com/uncommon-infection-and-malware-propagation-methods/107640/
    如有侵权请联系:admin#unsafe.sh