| Void O |
| Rabisu O |
| ’s O |
| Use O |
| of O |
| RomCom O |
| Backdoor O |
| Shows O |
| a O |
|
|
| O |
| Growing O |
| Shift O |
| in O |
| Threat O |
| Actors O |
| ’ O |
| Goals O |
|
|
| O |
| trendmicro.com/en_us/research/23/e/void-rabisu-s-use-of-romcom-backdoor-shows-a-growing-shift-in-th.html O |
|
|
| O |
| May O |
| 30 O |
| , O |
| 2023 O |
|
|
|
|
| O |
| Cyber O |
| Threats O |
|
|
| O |
| Void O |
| Rabisu O |
| , O |
| a O |
| malicious O |
| actor O |
| believed O |
| to O |
| be O |
| associated O |
| with O |
| the O |
| RomCom O |
| backdoor O |
| , O |
| was O |
|
|
| O |
| thought O |
| to O |
| be O |
| driven O |
| by O |
| financial O |
| gain O |
| because O |
| of O |
| its O |
| ransomware O |
| attacks O |
| . O |
| But O |
| in O |
| this O |
| blog O |
|
|
| O |
| entry O |
| , O |
| we O |
| discuss O |
| how O |
| the O |
| use O |
| of O |
| the O |
| RomCom O |
| backdoor O |
| in O |
| recent O |
| attacks O |
| shows O |
| how O |
| Void O |
|
|
| O |
| Rabisu O |
| 's O |
| motives O |
| seem O |
| to O |
| have O |
| changed O |
| since O |
| at O |
| least O |
| October O |
| 2022 O |
| . O |
|
|
| O |
| By O |
| : O |
| Feike O |
| Hacquebord O |
| , O |
| Stephen O |
| Hilt O |
| , O |
| Fernando O |
| Merces O |
| , O |
| Lord O |
| Alfred O |
| Remorin O |
| May O |
| 30 O |
| , O |
| 2023 O |
|
|
| O |
| Read O |
| time O |
| : O |
| ( O |
| words O |
| ) O |
|
|
|
|
| O |
| With O |
| contributions O |
| from O |
| Veronica O |
| Chierzi O |
| and O |
| Jayvee O |
| Mark O |
| Villaroman O |
|
|
| O |
| Since O |
| the O |
| start O |
| of O |
| the O |
| war O |
| in O |
| Ukraine O |
| in O |
| February O |
| 2022 O |
| , O |
| the O |
| number O |
| of O |
| cyber O |
| campaigns O |
|
|
| O |
| against O |
| Ukraine O |
| and O |
| North O |
| Atlantic O |
| Treaty O |
| Organization O |
| ( O |
| NATO O |
| ) O |
| countries O |
| has O |
| increased O |
|
|
| O |
| significantly O |
| . O |
| These O |
| campaigns O |
| come O |
| from O |
| many O |
| different O |
| angles O |
| : O |
| known O |
| advanced O |
| persistent O |
|
|
| O |
| threat O |
| ( O |
| APT O |
| ) O |
| actors O |
| , O |
| APT O |
| actors O |
| that O |
| were O |
| not O |
| publicly O |
| reported O |
| on O |
| before O |
| , O |
| and O |
| cyber O |
|
|
| O |
| mercenaries O |
| , O |
| hacktivists O |
| , O |
| and O |
| criminal O |
| actors O |
| who O |
| appear O |
| to O |
| have O |
| shifted O |
| from O |
| purely O |
| financial O |
|
|
| O |
| motives O |
| to O |
| geopolitical O |
| goals O |
| . O |
| In O |
| the O |
| past O |
| , O |
| these O |
| actors O |
| had O |
| different O |
| motivations O |
| , O |
| mode O |
| of O |
|
|
| O |
| operations O |
| , O |
| and O |
| targets O |
| , O |
| but O |
| the O |
| line O |
| between O |
| their O |
| campaigns O |
| has O |
| started O |
| to O |
| blur O |
| : O |
| Not O |
| only O |
| is O |
|
|
| O |
| an O |
| overlap O |
| in O |
| their O |
| targeting O |
| becoming O |
| apparent O |
| , O |
| but O |
| the O |
| distinction O |
| between O |
| their O |
| modes O |
| of O |
|
|
| O |
| operation O |
| is O |
| less O |
| clear O |
| . O |
| For O |
| instance O |
| , O |
| in O |
| 2022 O |
| , O |
| one O |
| of O |
| Conti O |
| ’s O |
| affiliates O |
| was O |
| found O |
| to O |
| be O |
| using O |
|
|
| O |
| its O |
| initial O |
| access O |
| techniques O |
| against O |
| Ukraine O |
| instead O |
| of O |
| using O |
| them O |
| to O |
| spread O |
| ransomware O |
| . O |
|
|
| O |
| Another O |
| example O |
| of O |
| this O |
| is O |
| Void O |
| Rabisu O |
| , O |
| also O |
| known O |
| as O |
| Tropical O |
| Scorpius O |
| , O |
| an O |
| actor O |
| believed O |
|
|
| O |
| to O |
| be O |
| associated O |
| with O |
| Cuba O |
| ransomware O |
| and O |
| the O |
| RomCom O |
| backdoor O |
| . O |
| Because O |
| of O |
| its O |
| many O |
|
|
| O |
| ransomware O |
| attacks O |
| , O |
| Void O |
| Rabisu O |
| was O |
| believed O |
| to O |
| be O |
| financially O |
| motivated O |
| , O |
| even O |
| though O |
| its O |
|
|
| O |
| associated O |
| Cuba O |
| ransomware O |
| allegedly O |
| attacked O |
| the O |
| parliament O |
| of O |
| Montenegro O |
| in O |
| August O |
|
|
| O |
| 2022 O |
| , O |
| which O |
| could O |
| be O |
| considered O |
| part O |
| of O |
| a O |
| geopolitical O |
| agenda O |
| . O |
| The O |
| motives O |
| of O |
| Void O |
| Rabisu O |
|
|
| O |
| seem O |
| to O |
| have O |
| changed O |
| since O |
| at O |
| least O |
| October O |
| 2022 O |
| , O |
| when O |
| Void O |
| Rabisu O |
| ’s O |
| associated O |
|
|
| O |
| RomCom O |
| backdoor O |
| was O |
| reported O |
| to O |
| have O |
| been O |
| used O |
| in O |
| attacks O |
| against O |
| the O |
| Ukrainian O |
|
|
| O |
| government O |
| and O |
| military O |
| : O |
| In O |
| a O |
| campaign O |
| in O |
| December O |
| 2022 O |
| , O |
| a O |
| fake O |
| version O |
| of O |
| the O |
| Ukrainian O |
|
|
| O |
| army O |
| ’s O |
| DELTA O |
| situational O |
| awareness O |
| website O |
| was O |
| used O |
| to O |
| lure O |
| targets O |
| into O |
| installing O |
| the O |
|
|
| O |
| RomCom O |
| backdoor O |
| . O |
| Normally O |
| , O |
| this O |
| kind O |
| of O |
| brazen O |
| attack O |
| would O |
| be O |
| thought O |
| to O |
| be O |
| the O |
| work O |
| of O |
| a O |
|
|
|
|
| O |
| 1/27 O |
|
|
|
|
| O |
| nation O |
| state O |
| - O |
| sponsored O |
| actor O |
| , O |
| but O |
| in O |
| this O |
| case O |
| , O |
| the O |
| indicators O |
| clearly O |
| pointed O |
| towards O |
| Void O |
|
|
| O |
| Rabisu O |
| , O |
| and O |
| some O |
| of O |
| the O |
| tactics O |
| , O |
| techniques O |
| , O |
| and O |
| procedures O |
| ( O |
| TTPs O |
| ) O |
| used O |
| were O |
| typically O |
|
|
| O |
| associated O |
| with O |
| cybercrime O |
| . O |
|
|
| O |
| Trend O |
| Micro O |
| ’s O |
| telemetry O |
| and O |
| research O |
| corroborates O |
| that O |
| the O |
| RomCom O |
| backdoor O |
| has O |
| been O |
|
|
| O |
| used O |
| in O |
| geopolitically O |
| motivated O |
| attacks O |
| since O |
| at O |
| least O |
| October O |
| 2022 O |
| , O |
| with O |
| targets O |
| that O |
|
|
| O |
| included O |
| organizations O |
| in O |
| Ukraine O |
| ’s O |
| energy O |
| and O |
| water O |
| utility O |
| sectors O |
| . O |
| Targets O |
| outside O |
| of O |
|
|
| O |
| Ukraine O |
| were O |
| observed O |
| as O |
| well O |
| , O |
| such O |
| as O |
| a O |
| provincial O |
| local O |
| government O |
| that O |
| provides O |
| help O |
| to O |
|
|
| O |
| Ukrainian O |
| refugees O |
| , O |
| a O |
| parliament O |
| member O |
| of O |
| a O |
| European O |
| country O |
| , O |
| a O |
| European O |
| defense O |
|
|
| O |
| company O |
| , O |
| and O |
| various O |
| IT O |
| service O |
| providers O |
| in O |
| Europe O |
| and O |
| the O |
| US O |
| . O |
| Independent O |
| research O |
| from O |
|
|
| O |
| Google O |
| showed O |
| that O |
| RomCom O |
| was O |
| being O |
| used O |
| in O |
| campaigns O |
| against O |
| attendees O |
| of O |
| the O |
|
|
| O |
| Masters O |
| of O |
| Digital O |
| conference O |
| , O |
| a O |
| conference O |
| organized O |
| by O |
| DIGITALEUROPE O |
| , O |
| and O |
| the O |
| Munich O |
|
|
| O |
| Security O |
| Conference O |
| . O |
|
|
| O |
| In O |
| this O |
| blog O |
| entry O |
| , O |
| we O |
| will O |
| discuss O |
| how O |
| the O |
| use O |
| of O |
| the O |
| RomCom O |
| backdoor O |
| fits O |
| into O |
| the O |
| current O |
|
|
| O |
| landscape O |
| , O |
| where O |
| politically O |
| motivated O |
| attacks O |
| are O |
| not O |
| committed O |
| by O |
| nation O |
| - O |
| state O |
| actors O |
|
|
| O |
| alone O |
| . O |
| Even O |
| though O |
| we O |
| can O |
| not O |
| confirm O |
| coordination O |
| between O |
| the O |
| different O |
| attacks O |
| , O |
| Ukraine O |
|
|
| O |
| and O |
| countries O |
| who O |
| support O |
| Ukraine O |
| are O |
| being O |
| targeted O |
| by O |
| various O |
| actors O |
| , O |
| like O |
| APT O |
| actors O |
| , O |
|
|
| O |
| hacktivists O |
| , O |
| cyber O |
| mercenaries O |
| , O |
| and O |
| cybercriminals O |
| like O |
| Void O |
| Rabisu O |
| . O |
| We O |
| will O |
| also O |
| delve O |
| into O |
|
|
| O |
| how O |
| RomCom O |
| has O |
| evolved O |
| over O |
| time O |
| and O |
| how O |
| the O |
| backdoor O |
| is O |
| spread O |
| both O |
| by O |
| methods O |
| that O |
|
|
| O |
| look O |
| like O |
| APT O |
| , O |
| as O |
| well O |
| as O |
| methods O |
| used O |
| by O |
| prominent O |
| cybercriminal O |
| campaigns O |
| taking O |
| place O |
|
|
| O |
| currently O |
| , O |
| to O |
| show O |
| that O |
| RomCom O |
| is O |
| using O |
| more O |
| detection O |
| evasion O |
| techniques O |
| that O |
| are O |
| popular O |
|
|
| O |
| among O |
| the O |
| most O |
| impactful O |
| cybercriminals O |
| . O |
|
|
| O |
| We O |
| assess O |
| that O |
| RomCom O |
| makes O |
| use O |
| of O |
| the O |
| same O |
| third O |
| - O |
| party O |
| services O |
| that O |
| are O |
| being O |
| utilized O |
|
|
| O |
| by O |
| other O |
| criminal O |
| actors O |
| as O |
| well O |
| , O |
| like O |
| malware O |
| signing O |
| and O |
| binary O |
| encryption O |
| . O |
| RomCom O |
| has O |
|
|
| O |
| been O |
| spread O |
| through O |
| numerous O |
| lure O |
| sites O |
| that O |
| are O |
| sometimes O |
| set O |
| up O |
| in O |
| rapid O |
| bursts O |
| . O |
| These O |
|
|
| O |
| lure O |
| sites O |
| are O |
| most O |
| likely O |
| only O |
| meant O |
| for O |
| a O |
| small O |
| number O |
| of O |
| targets O |
| , O |
| thus O |
| making O |
| discovery O |
|
|
| O |
| and O |
| analysis O |
| more O |
| difficult O |
| . O |
| Void O |
| Rabisu O |
| is O |
| one O |
| of O |
| the O |
| most O |
| evident O |
| examples O |
| of O |
| financially O |
|
|
| O |
| motivated O |
| threat O |
| actors O |
| whose O |
| goals O |
| and O |
| motivations O |
| are O |
| becoming O |
| more O |
| aligned O |
| under O |
|
|
| O |
| extraordinary O |
| geopolitical O |
| circumstances O |
| , O |
| and O |
| we O |
| anticipate O |
| that O |
| this O |
| will O |
| happen O |
| more O |
| in O |
| the O |
|
|
| O |
| future O |
| . O |
|
|
| O |
| RomCom O |
| campaigns O |
|
|
| O |
| We O |
| have O |
| been O |
| tracking O |
| RomCom O |
| campaigns O |
| since O |
| the O |
| summer O |
| of O |
| 2022 O |
| , O |
| and O |
| since O |
| then O |
| , O |
|
|
| O |
| have O |
| seen O |
| an O |
| escalation O |
| in O |
| its O |
| detection O |
| evasion O |
| methods O |
| : O |
| Not O |
| only O |
| do O |
| the O |
| malware O |
| samples O |
|
|
| O |
| routinely O |
| use O |
| VMProtect O |
| to O |
| make O |
| both O |
| manual O |
| and O |
| automated O |
| sandbox O |
| analysis O |
| more O |
|
|
| O |
| difficult O |
| , O |
| they O |
| also O |
| utilize O |
| binary O |
| padding O |
| techniques O |
| on O |
| the O |
| payload O |
| files O |
| . O |
| This O |
| adds O |
| a O |
|
|
| O |
| significant O |
| amount O |
| of O |
| overlay O |
| bytes O |
| to O |
| the O |
| files O |
| , O |
| increasing O |
| the O |
| size O |
| of O |
| the O |
| malicious O |
| payload O |
|
|
| O |
| ( O |
| we O |
| 've O |
| seen O |
| a O |
| file O |
| with O |
| 1.7 O |
| gigabytes O |
| ) O |
| . O |
| Additionally O |
| , O |
| a O |
| new O |
| routine O |
| has O |
| been O |
| recently O |
| added O |
|
|
| O |
| that O |
| involves O |
| the O |
| encryption O |
| of O |
| the O |
| payload O |
| files O |
| , O |
| which O |
| can O |
| only O |
| be O |
| decrypted O |
| if O |
| a O |
| certain O |
| key O |
|
|
| O |
| is O |
| downloaded O |
| to O |
| activate O |
| the O |
| payload O |
| . O |
|
|
|
|
| O |
| 2/27 O |
|
|
|
|
| O |
| In O |
| addition O |
| to O |
| these O |
| technical O |
| evasion O |
| techniques O |
| , O |
| RomCom O |
| is O |
| being O |
| distributed O |
| using O |
| lure O |
|
|
| O |
| sites O |
| that O |
| often O |
| appear O |
| legitimate O |
| and O |
| are O |
| being O |
| utilized O |
| in O |
| narrow O |
| targeting O |
| . O |
| This O |
| makes O |
|
|
| O |
| automated O |
| blocking O |
| of O |
| these O |
| lure O |
| websites O |
| through O |
| web O |
| reputation O |
| systems O |
| harder O |
| . O |
| Void O |
|
|
| O |
| Rabisu O |
| has O |
| been O |
| using O |
| Google O |
| Ads O |
| to O |
| entice O |
| their O |
| targets O |
| to O |
| visit O |
| the O |
| lure O |
| sites O |
| , O |
| similar O |
| to O |
| a O |
|
|
| O |
| campaign O |
| that O |
| distributed O |
| IcedID O |
| botnet O |
| in O |
| December O |
| 2022 O |
| . O |
| A O |
| key O |
| difference O |
| is O |
| that O |
| while O |
|
|
| O |
| IcedID O |
| ’s O |
| targeting O |
| was O |
| wider O |
| , O |
| Void O |
| Rabisu O |
| probably O |
| opted O |
| for O |
| narrower O |
| targeting O |
| that O |
| Google O |
|
|
| O |
| Ads O |
| offers O |
| to O |
| its O |
| advertisers O |
| . O |
| RomCom O |
| campaigns O |
| also O |
| make O |
| use O |
| of O |
| highly O |
| targeted O |
| spear O |
|
|
| O |
| phishing O |
| emails O |
| . O |
|
|
| O |
| On O |
| the O |
| RomCom O |
| lure O |
| sites O |
| , O |
| targets O |
| are O |
| offered O |
| trojanized O |
| versions O |
| of O |
| legitimate O |
| applications O |
| , O |
|
|
| O |
| like O |
| chat O |
| apps O |
| such O |
| as O |
| AstraChat O |
| and O |
| Signal O |
| , O |
| PDF O |
| readers O |
| , O |
| remote O |
| desktop O |
| apps O |
| , O |
| password O |
|
|
| O |
| managers O |
| , O |
| and O |
| other O |
| tools O |
| , O |
| that O |
| are O |
| typically O |
| used O |
| by O |
| system O |
| administrators O |
| . O |
|
|
| O |
| dirwinstat.com O |
|
|
| O |
| ( O |
| as O |
| of O |
| April O |
| 4 O |
| , O |
| 2023 O |
| ) O |
|
|
|
|
| O |
| 3/27 O |
|
|
|
|
| O |
| devolrdm.com O |
|
|
| O |
| ( O |
| as O |
| of O |
| March O |
| 23 O |
| , O |
| 2023 O |
| ) O |
|
|
|
|
| O |
| vectordmanagesoft.com O |
|
|
| O |
| ( O |
| as O |
| of O |
| March O |
| 22 O |
| , O |
| 2023 O |
| ) O |
|
|
|
|
| O |
| 4/27 O |
|
|
|
|
| O |
| cozy-sofware.com O |
|
|
| O |
| ( O |
| as O |
| of O |
| March O |
| 13 O |
| , O |
| 2023 O |
| ) O |
|
|
|
|
| O |
| devolutionrdp.com O |
|
|
| O |
| ( O |
| as O |
| of O |
| March O |
| 6 O |
| , O |
| 2023 O |
| ) O |
|
|
|
|
| O |
| 5/27 O |
|
|
|
|
| O |
| astrachats.com O |
|
|
| O |
| ( O |
| as O |
| of O |
| February O |
| 27 O |
| , O |
|
|
| O |
| 2023 O |
| ) O |
|
|
|
|
| O |
| chatgpt4beta.com O |
|
|
| O |
| ( O |
| as O |
| of O |
| February O |
| 23 O |
| , O |
|
|
| O |
| 2023 O |
| ) O |
|
|
|
|
| O |
| 6/27 O |
|
|
|
|
| O |
| singularlabs.org O |
|
|
| O |
| ( O |
| as O |
| of O |
| January O |
| 30 O |
| , O |
|
|
| O |
| 2023 O |
| ) O |
|
|
|
|
| O |
| gotomeet.us O |
|
|
| O |
| ( O |
| as O |
| of O |
| December O |
| 14 O |
| , O |
|
|
| O |
| 2022 O |
| ) O |
|
|
|
|
| O |
| 7/27 O |
|
|
|
|
| O |
| gllmp.com O |
|
|
| O |
| ( O |
| as O |
| of O |
| December O |
| 8 O |
| , O |
|
|
| O |
| 2022 O |
| ) O |
|
|
|
|
| O |
| lnfo-messengers.com O |
|
|
| O |
| ( O |
| as O |
| of O |
| November O |
| 3 O |
| , O |
|
|
| O |
| 2022 O |
| ) O |
|
|
|
|
| O |
| 8/27 O |
|
|
|
|
| O |
| pass-shield.com O |
|
|
| O |
| ( O |
| as O |
| of O |
| October O |
| 15 O |
| , O |
|
|
| O |
| 2022 O |
| ) O |
|
|
|
|
| O |
| pdffreader.com O |
|
|
| O |
| ( O |
| as O |
| of O |
| October O |
| 12 O |
| , O |
|
|
| O |
| 2022 O |
| ) O |
|
|
|
|
| O |
| 9/27 O |
|
|
|
|
| O |
| 10/27 O |
|
|
|
|
| O |
| veeame.com O |
|
|
| O |
| ( O |
| as O |
| of O |
| September O |
| , O |
| 9 O |
|
|
| O |
| 2022 O |
| ) O |
|
|
|
|
| O |
| npm-solar.com O |
|
|
| O |
| ( O |
| as O |
| of O |
| July O |
| 31 O |
| , O |
| 2022 O |
| ) O |
|
|
|
|
| O |
| 11/27 O |
|
|
|
|
| O |
| advanced-ipscanners.com O |
|
|
| O |
| ( O |
| as O |
| of O |
| July O |
| 20 O |
| , O |
| 2022 O |
| ) O |
|
|
|
|
| O |
| Table O |
| 1 O |
| . O |
| RomCom O |
| lure O |
| sites O |
|
|
| O |
| Image O |
| credit O |
| : O |
| DomainTools O |
|
|
| O |
| As O |
| reported O |
| by O |
| the O |
| Ukrainian O |
| Computer O |
| Emergency O |
| Response O |
| Team O |
| ( O |
| CERT O |
| - O |
| UA O |
| ) O |
| in O |
| the O |
| fall O |
| of O |
|
|
| O |
| 2022 O |
| , O |
| RomCom O |
| was O |
| used O |
| in O |
| specific O |
| campaigns O |
| against O |
| Ukrainian O |
| targets O |
| , O |
| including O |
| the O |
|
|
| O |
| Ukrainian O |
| government O |
| and O |
| the O |
| Ukrainian O |
| military O |
| . O |
| Trend O |
| Micro O |
| ’s O |
| telemetry O |
| confirms O |
| this O |
|
|
| O |
| targeting O |
| , O |
| and O |
| , O |
| as O |
| shown O |
| in O |
| a O |
| selection O |
| of O |
| the O |
| numerous O |
| RomCom O |
| campaigns O |
| over O |
| time O |
|
|
| O |
| ( O |
| Table O |
| 1 O |
| ) O |
| , O |
| it O |
| is O |
| immediately O |
| clear O |
| that O |
| RomCom O |
| already O |
| had O |
| Ukrainian O |
| - O |
| language O |
| social O |
|
|
| O |
| engineering O |
| lures O |
| back O |
| in O |
| October O |
| and O |
| November O |
| 2022 O |
| . O |
|
|
| O |
| We O |
| count O |
| a O |
| few O |
| dozen O |
| lure O |
| websites O |
| that O |
| have O |
| been O |
| set O |
| up O |
| since O |
| July O |
| 2022 O |
| . O |
| RomCom O |
| shows O |
|
|
| O |
| a O |
| mix O |
| in O |
| their O |
| targeting O |
| methodologies O |
| , O |
| mixing O |
| typical O |
| cybercriminal O |
| TTPs O |
| with O |
| TTPs O |
| that O |
| are O |
|
|
| O |
| more O |
| common O |
| for O |
| APT O |
| actors O |
| . O |
| For O |
| example O |
| , O |
| RomCom O |
| used O |
| spear O |
| phishing O |
| against O |
| a O |
|
|
| O |
| member O |
| of O |
| a O |
| European O |
| parliament O |
| in O |
| March O |
| 2022 O |
| , O |
| but O |
| targeted O |
| a O |
| European O |
| defense O |
|
|
| O |
| company O |
| in O |
| October O |
| 2022 O |
| with O |
| a O |
| Google O |
| Ads O |
| advertisement O |
| that O |
| led O |
| to O |
| an O |
| intermediary O |
|
|
| O |
| landing O |
| site O |
| that O |
| would O |
| redirect O |
| to O |
| a O |
| RomCom O |
| lure O |
| site O |
| . O |
| That O |
| intermediary O |
| landing O |
| site O |
| used O |
|
|
| O |
| the O |
| domain O |
| name O |
| “ O |
| kagomadb[.]com O |
| , O |
| ” O |
| which O |
| was O |
| later O |
| used O |
| for O |
| Qakbot O |
| and O |
| Gozi O |
| payloads O |
| in O |
|
|
| O |
| December O |
| 2022 O |
| . O |
|
|
|
|
| O |
| 12/27 O |
|
|
|
|
| O |
| Among O |
| the O |
| targets O |
| we O |
| have O |
| seen O |
| based O |
| on O |
| Trend O |
| Micro O |
| ’s O |
| telemetry O |
| were O |
| a O |
| water O |
| utility O |
|
|
| O |
| company O |
| , O |
| entities O |
| in O |
| the O |
| financial O |
| and O |
| energy O |
| sectors O |
| , O |
| and O |
| an O |
| IT O |
| company O |
| in O |
| Ukraine O |
| . O |
| Outside O |
|
|
| O |
| Ukraine O |
| , O |
| other O |
| targets O |
| included O |
| a O |
| local O |
| government O |
| agency O |
| that O |
| supports O |
| Ukrainian O |
| refugees O |
| , O |
|
|
| O |
| a O |
| defense O |
| company O |
| in O |
| Europe O |
| , O |
| a O |
| high O |
| - O |
| profile O |
| European O |
| politician O |
| , O |
| several O |
| IT O |
| service O |
|
|
| O |
| providers O |
| in O |
| Europe O |
| and O |
| the O |
| US O |
| , O |
| a O |
| bank O |
| in O |
| South O |
| America O |
| , O |
| and O |
| a O |
| couple O |
| of O |
| targets O |
| located O |
| in O |
|
|
| O |
| Asia O |
| . O |
| Combined O |
| with O |
| the O |
| targets O |
| that O |
| were O |
| published O |
| by O |
| CERT O |
| - O |
| UA O |
| and O |
| Google O |
| , O |
| a O |
| clear O |
|
|
| O |
| picture O |
| emerges O |
| of O |
| the O |
| RomCom O |
| backdoor O |
| ’s O |
| targets O |
| : O |
| select O |
| Ukrainian O |
| targets O |
| and O |
| allies O |
| of O |
|
|
| O |
| Ukraine O |
| . O |
|
|
| O |
| RomCom O |
| 3.0 O |
| : O |
| The O |
| AstraChat O |
| Campaign O |
|
|
| O |
| In O |
| this O |
| section O |
| , O |
| we O |
| will O |
| analyze O |
| one O |
| of O |
| the O |
| RomCom O |
| backdoor O |
| samples O |
| that O |
| was O |
| used O |
| in O |
|
|
| O |
| February O |
| 2023 O |
| against O |
| targets O |
| in O |
| Eastern O |
| Europe O |
| . O |
| Previous O |
| RomCom O |
| versions O |
| analyzed O |
| by O |
|
|
| O |
| Palo O |
| Alto O |
| 's O |
| Unit O |
| 42 O |
| use O |
| a O |
| modular O |
| architecture O |
| and O |
| support O |
| up O |
| to O |
| 20 O |
| different O |
| commands O |
| . O |
|
|
| O |
| Since O |
| then O |
| , O |
| the O |
| malware O |
| evolved O |
| significantly O |
| in O |
| terms O |
| of O |
| the O |
| number O |
| of O |
| supported O |
|
|
| O |
| commands O |
| , O |
| but O |
| its O |
| modular O |
| architecture O |
| remains O |
| almost O |
| unchanged O |
| . O |
| The O |
| threat O |
| actor O |
| behind O |
|
|
| O |
| RomCom O |
| 3.0 O |
| also O |
| makes O |
| use O |
| of O |
| different O |
| techniques O |
| to O |
| drop O |
| and O |
| execute O |
| the O |
| malware O |
| . O |
| This O |
|
|
| O |
| analysis O |
| is O |
| based O |
| on O |
| a O |
| campaign O |
| that O |
| embedded O |
| RomCom O |
| 3.0 O |
| in O |
| an O |
| AstraChat O |
| instant O |
|
|
| O |
| messaging O |
| software O |
| installation O |
| package O |
| . O |
|
|
| O |
| Dropper O |
|
|
| O |
| The O |
| file O |
| astrachat.msi O |
| is O |
| a O |
| Microsoft O |
| Installer O |
| ( O |
| MSI O |
| ) O |
| archive O |
| . O |
| Despite O |
| installing O |
| files O |
| related O |
| to O |
|
|
| O |
| legitimate O |
| AstraChat O |
| software O |
| , O |
| it O |
| unpacks O |
| a O |
| malicious O |
| InstallA.dll O |
| file O |
| and O |
| calls O |
| its O |
| Main O |
| ( O |
| ) O |
|
|
| O |
| function O |
| ( O |
| Figure O |
| 1 O |
| ) O |
| . O |
|
|
|
|
| O |
| Figure O |
| 1 O |
| . O |
| CustomAction O |
| table O |
| from O |
| a O |
| RomCom O |
| MSI O |
| dropper O |
|
|
| O |
| The O |
| InstallA.dll O |
| file O |
| extracts O |
| three O |
| Dynamic O |
| Link O |
| Libraries O |
| ( O |
| DLLs O |
| ) O |
| files O |
| under O |
| the O |
|
|
| O |
| % O |
| PUBLIC%\Libraries O |
| folder O |
| : O |
|
|
| O |
| prxyms O |
| < O |
| number>.dll O |
|
|
| O |
| 13/27 O |
|
|
|
|
| O |
| winipfile O |
| < O |
| number>.dll0 O |
|
|
| O |
| netid O |
| < O |
| number>.dll0 O |
|
|
| O |
| The O |
| number O |
| in O |
| these O |
| DLL O |
| files O |
| is O |
| an O |
| integer O |
| number O |
| based O |
| on O |
| the O |
| Machine O |
| GUID O |
| read O |
| from O |
|
|
| O |
| Windows O |
| Registry O |
| at O |
| HKLM\SOFTWARE\Microsoft\Cryptography\MachineGuid O |
| . O |
|
|
| O |
| Persistence O |
|
|
| O |
| For O |
| persistence O |
| , O |
| RomCom O |
| uses O |
| COM O |
| hijacking O |
| , O |
| hence O |
| its O |
| name O |
| . O |
| InstallA.dll O |
| writes O |
| the O |
|
|
| O |
| following O |
| registry O |
| value O |
| in O |
| Windows O |
| Registry O |
| : O |
|
|
| O |
| [ O |
| HKEY_CURRENT_USER\SOFTWARE\Classes\CLSID\{C90250F3 O |
| - O |
| 4D7D-4991 O |
| - O |
| 9B69A5C5BC1C2AE6}\InProcServer32 O |
| ] O |
|
|
| O |
| @="%PUBLIC%\\Libraries\\prxyms O |
| < O |
| number>.dll O |
| " O |
|
|
| O |
| This O |
| overwrites O |
| the O |
| same O |
| key O |
| under O |
| the O |
| HKEY_LOCAL_MACHINE O |
| hive O |
| , O |
| causing O |
| processes O |
|
|
| O |
| that O |
| request O |
| this O |
| Class O |
| ID O |
| ( O |
| CLSID O |
| ) O |
| to O |
| load O |
| the O |
| RomCom O |
| loader O |
| DLL O |
| at O |
|
|
| O |
| % O |
| PUBLIC%\Libraries\prxyms O |
| < O |
| number>.dll O |
| . O |
| One O |
| such O |
| process O |
| is O |
| explorer.exe O |
| , O |
| which O |
| is O |
|
|
| O |
| restarted O |
| by O |
| RomCom O |
| dropper O |
| , O |
| so O |
| the O |
| loader O |
| DLL O |
| is O |
| called O |
| . O |
|
|
| O |
| The O |
| RomCom O |
| loader O |
| also O |
| redirects O |
| calls O |
| to O |
| its O |
| exported O |
| functions O |
| to O |
| the O |
| legit O |
| actxprxy.dll O |
| by O |
|
|
| O |
| making O |
| use O |
| of O |
| forwarded O |
| exports O |
| ( O |
| Figure O |
| 2 O |
| ) O |
| . O |
|
|
|
|
| O |
| Figure O |
| 2 O |
| . O |
| Forwarded O |
| exports O |
| from O |
| the O |
| RomCom O |
| 3.0 O |
| loader O |
| ( O |
| prxyms O |
| < O |
| number>.dll O |
| ) O |
|
|
| O |
| However O |
| , O |
| before O |
| a O |
| call O |
| is O |
| forwarded O |
| , O |
| the O |
| malicious O |
| code O |
| at O |
| the O |
| DLL O |
| entry O |
| point O |
| of O |
| RomCom O |
|
|
| O |
| loader O |
| runs O |
| . O |
| This O |
| code O |
| uses O |
| rundll32.exe O |
| to O |
| execute O |
| the O |
| exported O |
| Main O |
| ( O |
| ) O |
| function O |
| from O |
| both O |
|
|
| O |
| winipfile O |
| < O |
| number>.dll0 O |
| and O |
| netid O |
| < O |
| number>.dll0 O |
| . O |
|
|
| O |
| Architecture O |
|
|
| O |
| RomCom O |
| 3.0 O |
| is O |
| divided O |
| into O |
| three O |
| components O |
| : O |
| a O |
| loader O |
| , O |
| a O |
| network O |
| component O |
| that O |
| interacts O |
|
|
| O |
| with O |
| the O |
| command O |
| - O |
| and O |
| - O |
| control O |
| ( O |
| C&C O |
| ) O |
| server O |
| , O |
| and O |
| a O |
| worker O |
| component O |
| that O |
| performs O |
| the O |
|
|
| O |
| actions O |
| on O |
| the O |
| victim O |
| ’s O |
| machine O |
| . O |
| The O |
| network O |
| component O |
| is O |
| handled O |
| by O |
| netid O |
| < O |
| number>.dll0 O |
| , O |
|
|
| O |
| which O |
| is O |
| responsible O |
| for O |
| receiving O |
| commands O |
| from O |
| the O |
| C&C O |
| server O |
| and O |
| sending O |
| back O |
| their O |
|
|
| O |
| results O |
| . O |
| When O |
| this O |
| component O |
| receives O |
| a O |
| command O |
| , O |
| the O |
| command O |
| is O |
| sent O |
| through O |
| a O |
|
|
|
|
| O |
| 14/27 O |
|
|
|
|
| O |
| localhost O |
| socket O |
| to O |
| winipfile O |
| < O |
| number>.dll0 O |
| , O |
| which O |
| handles O |
| the O |
| worker O |
| component O |
| , O |
| as O |
| shown O |
|
|
| O |
| in O |
| Figure O |
| 3 O |
| . O |
| If O |
| initial O |
| loopback O |
| addresses O |
| or O |
| ports O |
| are O |
| in O |
| use O |
| , O |
| both O |
| components O |
| try O |
| to O |
| find O |
| other O |
|
|
| O |
| available O |
| combinations O |
| . O |
|
|
|
|
| O |
| Figure O |
| 3 O |
| . O |
| Overall O |
| RomCom O |
| 3.0 O |
| architecture O |
|
|
| O |
| Bot O |
| Commands O |
|
|
| O |
| RomCom O |
| 3.0 O |
| commands O |
| are O |
| received O |
| as O |
| responses O |
| to O |
| HTTP O |
| POST O |
| requests O |
| made O |
| by O |
| the O |
|
|
| O |
| malware O |
| network O |
| component O |
| . O |
|
|
|
|
| O |
| Figure O |
| 4 O |
| . O |
| RomCom O |
| 3.0 O |
| command O |
| structure O |
|
|
| O |
| 15/27 O |
|
|
|
|
| O |
| Figure O |
| 4 O |
| shows O |
| an O |
| example O |
| of O |
| command O |
| 5 O |
| – O |
| a O |
| command O |
| to O |
| download O |
| a O |
| file O |
| to O |
| the O |
| victim O |
| 's O |
|
|
| O |
| machine O |
| – O |
| being O |
| received O |
| . O |
| The O |
| ID O |
| used O |
| for O |
| communication O |
| is O |
| 0x950 O |
| , O |
| and O |
| command O |
| 0x05 O |
| is O |
|
|
| O |
| received O |
| with O |
| additional O |
| data O |
| . O |
| In O |
| this O |
| case O |
| , O |
| the O |
| additional O |
| data O |
| tells O |
| the O |
| malware O |
| running O |
| on O |
|
|
| O |
| the O |
| infected O |
| machine O |
| that O |
| the O |
| downloaded O |
| file O |
| should O |
| occupy O |
| 939 O |
| ( O |
| 0x3ac O |
| – O |
| 1 O |
| ) O |
| 4 O |
| KB O |
| blocks O |
| . O |
|
|
| O |
| The O |
| file O |
| itself O |
| is O |
| downloaded O |
| in O |
| a O |
| separate O |
| response O |
| , O |
| so O |
| in O |
| this O |
| instance O |
| , O |
| the O |
| final O |
| file O |
| size O |
| on O |
|
|
| O |
| the O |
| victim O |
| ’s O |
| side O |
| will O |
| be O |
| 3,846,144 O |
| bytes O |
| . O |
| As O |
| an O |
| evasion O |
| technique O |
| , O |
| null O |
| bytes O |
| are O |
| appended O |
|
|
| O |
| to O |
| the O |
| file O |
| to O |
| achieve O |
| this O |
| result O |
| . O |
| The O |
| contents O |
| of O |
| the O |
| additional O |
| data O |
| field O |
| may O |
| vary O |
| according O |
|
|
| O |
| to O |
| the O |
| command O |
| . O |
|
|
| O |
| In O |
| RomCom O |
| 3.0 O |
| , O |
| we O |
| could O |
| enumerate O |
| 42 O |
| valid O |
| commands O |
| , O |
| as O |
| shown O |
| in O |
| Table O |
| 2 O |
| . O |
| This O |
| is O |
| a O |
|
|
| O |
| high O |
| number O |
| of O |
| commands O |
| for O |
| a O |
| regular O |
| backdoor O |
| , O |
| but O |
| a O |
| few O |
| commands O |
| are O |
| simply O |
| variations O |
|
|
| O |
| of O |
| others O |
| . O |
|
|
| O |
| Command O |
|
|
|
|
| O |
| Purpose O |
| ( O |
| from O |
| the O |
| victim O |
| ’s O |
| perspective O |
| ) O |
|
|
|
|
| O |
| 1 O |
|
|
|
|
| O |
| Send O |
| information O |
| about O |
| connected O |
| drives O |
|
|
|
|
| O |
| 2 O |
|
|
|
|
| O |
| Send O |
| a O |
| list O |
| of O |
| file O |
| names O |
| under O |
| a O |
| specified O |
| directory O |
|
|
|
|
| O |
| 3 O |
|
|
|
|
| O |
| Start O |
| cmd.exe O |
| to O |
| run O |
| an O |
| existing O |
| program O |
|
|
|
|
| O |
| 4 O |
|
|
|
|
| O |
| Upload O |
| a O |
| specified O |
| file O |
| to O |
| the O |
| C&C O |
| server O |
|
|
|
|
| O |
| 5 O |
|
|
|
|
| O |
| Download O |
| a O |
| file O |
| to O |
| the O |
| victim O |
| 's O |
| machine O |
|
|
|
|
| O |
| 6 O |
|
|
|
|
| O |
| Delete O |
| a O |
| specified O |
| file O |
| in O |
| the O |
| victim O |
| 's O |
| machine O |
|
|
|
|
| O |
| 7 O |
|
|
|
|
| O |
| Delete O |
| a O |
| specified O |
| directory O |
| in O |
| the O |
| victim O |
| 's O |
| machine O |
|
|
|
|
| O |
| 8 O |
|
|
|
|
| O |
| Spawn O |
| a O |
| given O |
| process O |
| with O |
| PID O |
| spoofing O |
| ( O |
| the O |
| PID O |
| is O |
| also O |
| given O |
| as O |
| part O |
| of O |
|
|
| O |
| the O |
| command O |
| data O |
| ) O |
|
|
|
|
| O |
| 12 O |
|
|
|
|
| O |
| Call O |
| startWorker O |
| ( O |
| ) O |
| from O |
| % O |
| PUBLIC%\Libraries\PhotoDirector.dll O |
| , O |
| then O |
| send O |
|
|
| O |
| % O |
| PUBLIC%\Libraries\PhotoDirector.zip O |
| to O |
| the O |
| C&C O |
| server O |
| and O |
| delete O |
| it O |
|
|
|
|
| O |
| 13 O |
|
|
|
|
| O |
| Call O |
| startWorker O |
| ( O |
| ) O |
| from O |
| % O |
| PUBLIC%\Libraries\PhotoDirector.dll O |
| and O |
| write O |
|
|
| O |
| screen O |
| information O |
| to O |
| % O |
| PUBLIC%\Libraries\update.conf O |
|
|
|
|
| O |
| 14 O |
|
|
|
|
| O |
| Upload O |
| % O |
| PUBLIC%\Libraries\PhotoDirector.zip O |
| to O |
| the O |
| C&C O |
| server O |
| and O |
| delete O |
|
|
| O |
| it O |
|
|
|
|
| O |
| 15 O |
|
|
|
|
| O |
| Send O |
| a O |
| list O |
| of O |
| running O |
| process O |
| with O |
| its O |
| PIDs O |
|
|
|
|
| O |
| 16 O |
|
|
|
|
| O |
| Send O |
| a O |
| list O |
| of O |
| installed O |
| software O |
|
|
|
|
| O |
| 17 O |
|
|
|
|
| O |
| Delete O |
| the O |
| worker O |
| component O |
| ( O |
| winipfile O |
| < O |
| number>.dll0 O |
| ) O |
|
|
|
|
| O |
| 18 O |
|
|
|
|
| O |
| Download O |
| a O |
| file O |
| and O |
| save O |
| it O |
| to O |
| % O |
| PUBLIC%\Libraries\PhotoDirector.dll O |
|
|
|
|
| O |
| 16/27 O |
|
|
|
|
| O |
| 19 O |
|
|
|
|
| O |
| Download O |
| a O |
| file O |
| , O |
| save O |
| it O |
| to O |
| % O |
| PUBLIC%\Libraries\BrowserData\procsys.dll O |
| , O |
|
|
| O |
| and O |
| call O |
| its O |
| stub O |
| ( O |
| ) O |
| exported O |
| function O |
|
|
|
|
| O |
| 20 O |
|
|
|
|
| O |
| Download O |
| a O |
| ZIP O |
| archive O |
| likely O |
| containing O |
| 3proxy O |
| and O |
| plink O |
| ( O |
| see O |
| command O |
| 21 O |
| ) O |
|
|
|
|
| O |
| 21 O |
|
|
|
|
| O |
| Use O |
| 3proxy O |
| and O |
| plink O |
| to O |
| set O |
| up O |
| a O |
| proxy O |
| via O |
| SSH O |
| . O |
| The O |
| IP O |
| address O |
| , O |
| password O |
| , O |
|
|
| O |
| local O |
| , O |
| and O |
| remote O |
| ports O |
| are O |
| received O |
| as O |
| command O |
| parameters O |
| . O |
| SSH O |
| server O |
|
|
| O |
| username O |
| is O |
| fixed O |
| as O |
| “ O |
| john O |
| . O |
| ” O |
|
|
|
|
| O |
| 22 O |
|
|
|
|
| O |
| Kill O |
| the O |
| 3proxy.exe O |
| and O |
| plink.exe O |
| processes O |
|
|
|
|
| O |
| 23 O |
|
|
|
|
| O |
| Download O |
| a O |
| file O |
| and O |
| save O |
| it O |
| to O |
| % O |
| PUBLIC%\Libraries\upd O |
| - O |
| fil O |
| < O |
| number>.dll0 O |
| to O |
|
|
| O |
| update O |
| the O |
| worker O |
|
|
|
|
| O |
| 24 O |
|
|
|
|
| O |
| Send O |
| the O |
| contents O |
| of O |
| % O |
| PUBLIC%\Libraries\BrowserData\Result O |
|
|
|
|
| O |
| 25 O |
|
|
|
|
| O |
| Duplicate O |
| the O |
| worker O |
|
|
|
|
| O |
| 26 O |
|
|
|
|
| O |
| Send O |
| the O |
| Windows O |
| version O |
|
|
|
|
| O |
| 29 O |
|
|
|
|
| O |
| Download O |
| freeSSHd O |
| from O |
| the O |
| C&C O |
| server O |
|
|
|
|
| O |
| 30 O |
|
|
|
|
| O |
| Run O |
| freeSSHd O |
| and O |
| use O |
| plink O |
| to O |
| create O |
| a O |
| reverse O |
| connection O |
| with O |
|
|
| O |
| 51.195.49.215 O |
| using O |
| “ O |
| john O |
| ” O |
| as O |
| the O |
| username O |
| and O |
|
|
| O |
| “ O |
| eK6czNHWCT569L1xK9ZH O |
| ” O |
| as O |
| the O |
| password O |
|
|
|
|
| O |
| 31 O |
|
|
|
|
| O |
| Kill O |
| the O |
| freeSSHd O |
| process O |
|
|
|
|
| O |
| 32 O |
|
|
|
|
| O |
| Send O |
| .txt O |
| , O |
| .rtf O |
| , O |
| .xls O |
| , O |
| .xlsx O |
| , O |
| .ods O |
| , O |
| .cmd O |
| , O |
| .pdf O |
| , O |
| .vbs O |
| , O |
| .ps1 O |
| , O |
| .one O |
| , O |
| .kdb O |
| , O |
| .kdb O |
| , O |
| .doc O |
| , O |
|
|
| O |
| .doc O |
| , O |
| .odt O |
| , O |
| .eml O |
| , O |
| .msg O |
| , O |
| and O |
| .email O |
| files O |
| in O |
| Downloads O |
| , O |
| Documents O |
| , O |
| and O |
|
|
| O |
| Desktop O |
| folders O |
| under O |
| % O |
| USERPROFILE% O |
|
|
|
|
| O |
| 34 O |
|
|
|
|
| O |
| Run O |
| AnyDesk O |
| on O |
| the O |
| victim O |
| ’s O |
| machine O |
| on O |
| a O |
| hidden O |
| window O |
| and O |
| send O |
| the O |
|
|
| O |
| AnyDesk O |
| ID O |
| to O |
| the O |
| C&C O |
| server O |
|
|
|
|
| O |
| 35 O |
|
|
|
|
| O |
| Kill O |
| the O |
| AnyDesk O |
| process O |
| and O |
| delete O |
| its O |
| executable O |
|
|
|
|
| O |
| 36 O |
|
|
|
|
| O |
| Download O |
| the O |
| AnyDesk O |
| executable O |
| and O |
| save O |
| it O |
| to O |
|
|
| O |
| % O |
| PUBLIC%\Libraries\dsk.exe O |
|
|
|
|
| O |
| 38 O |
|
|
|
|
| O |
| Download O |
| a O |
| file O |
| and O |
| save O |
| it O |
| to O |
| % O |
| PUBLIC%\Libraries\wallet.exe O |
|
|
|
|
| O |
| 39 O |
|
|
|
|
| O |
| Download O |
| a O |
| file O |
| and O |
| save O |
| it O |
| to O |
| % O |
| PUBLIC%\Libraries\7z.dll O |
|
|
|
|
| O |
| 40 O |
|
|
|
|
| O |
| Download O |
| a O |
| file O |
| and O |
| save O |
| it O |
| to O |
| % O |
| PUBLIC%\Libraries\7z.exe O |
|
|
|
|
| O |
| 41 O |
|
|
|
|
| O |
| Send O |
| the O |
| contents O |
| of O |
| % O |
| PUBLIC%\Libraries\tempFolder O |
| compressed O |
| with O |
| 7Zip O |
|
|
|
|
| O |
| 42 O |
|
|
|
|
| O |
| Download O |
| a O |
| file O |
| and O |
| save O |
| it O |
| to O |
| % O |
| PUBLIC%\Libraries\7za.exe O |
|
|
|
|
| O |
| 17/27 O |
|
|
|
|
| O |
| 43 O |
|
|
|
|
| O |
| Use O |
| % O |
| PUBLIC%\Libraries\7za.exe O |
| to O |
| compress O |
| a O |
| given O |
| folder O |
| to O |
| a O |
| fold.zip O |
|
|
| O |
| archive O |
| and O |
| send O |
| the O |
| compressed O |
| archive O |
| to O |
| the O |
| C&C O |
| server O |
|
|
|
|
| O |
| 44 O |
|
|
|
|
| O |
| Kill O |
| the O |
| PhotoDirector.dll O |
| process O |
|
|
|
|
| O |
| 45 O |
|
|
|
|
| O |
| Download O |
| a O |
| file O |
| and O |
| save O |
| it O |
| to O |
| % O |
| PUBLIC%\Libraries\msg.dll O |
|
|
|
|
| O |
| 46 O |
|
|
|
|
| O |
| Call O |
| stW O |
| ( O |
| ) O |
| function O |
| exported O |
| by O |
| % O |
| PUBLIC%\Libraries\msg.dll O |
|
|
|
|
| O |
| 47 O |
|
|
|
|
| O |
| Download O |
| a O |
| file O |
| and O |
| save O |
| it O |
| to O |
| % O |
| PUBLIC%\Libraries\FileInfo.dll O |
|
|
|
|
| O |
| 48 O |
|
|
|
|
| O |
| Call O |
| fSt O |
| ( O |
| ) O |
| function O |
| exported O |
| by O |
| % O |
| PUBLIC%\Libraries\FileInfo.dll O |
|
|
|
|
| O |
| 49 O |
|
|
|
|
| O |
| Update O |
| the O |
| network O |
| component O |
|
|
|
|
| O |
| Table O |
| 2 O |
| . O |
| RomCom O |
| 3.0 O |
| commands O |
|
|
| O |
| Additional O |
| Malware O |
|
|
| O |
| Based O |
| on O |
| messages O |
| sent O |
| back O |
| to O |
| the O |
| C&C O |
| server O |
| and O |
| how O |
| the O |
| commands O |
| use O |
| these O |
| files O |
| , O |
|
|
| O |
| we O |
| can O |
| infer O |
| the O |
| purpose O |
| of O |
| a O |
| few O |
| additional O |
| components O |
| : O |
|
|
| O |
| PhotoDirector.dll O |
| – O |
| a O |
| program O |
| that O |
| takes O |
| one O |
| or O |
| more O |
| screenshots O |
| and O |
| compresses O |
|
|
| O |
| them O |
| in O |
| a O |
| % O |
| PUBLIC%\Libraries\PhotoDirector.zip O |
| archive O |
|
|
| O |
| procsys.dll O |
| – O |
| a O |
| stealer O |
| known O |
| as O |
| STEALDEAL O |
| to O |
| retrieve O |
| browser O |
| cookies O |
| and O |
| write O |
|
|
| O |
| them O |
| to O |
| % O |
| PUBLIC%\Libraries\BrowserData\Result O |
|
|
| O |
| wallet.exe O |
| – O |
| a O |
| crypto O |
| wallet O |
| grabber O |
| that O |
| writes O |
| stolen O |
| information O |
| to O |
|
|
| O |
| % O |
| PUBLIC%\Libraries\tempFolder O |
|
|
| O |
| msg.dll O |
| – O |
| an O |
| Instant O |
| Messaging O |
| grabber O |
| to O |
| steal O |
| chat O |
| messages O |
|
|
| O |
| FileInfo.dll O |
| – O |
| a O |
| stealer O |
| of O |
| FTP O |
| credentials O |
| , O |
| or O |
| a O |
| component O |
| to O |
| make O |
| the O |
| victim O |
| ’s O |
|
|
| O |
| machine O |
| upload O |
| files O |
| to O |
| an O |
| FTP O |
| server O |
|
|
| O |
| Despite O |
| these O |
| additional O |
| pieces O |
| of O |
| malware O |
| , O |
| RomCom O |
| 3.0 O |
| also O |
| seems O |
| to O |
| have O |
| commands O |
| to O |
|
|
| O |
| download O |
| and O |
| run O |
| legitimate O |
| software O |
| : O |
|
|
| O |
| dsk.exe O |
| – O |
| a O |
| portable O |
| version O |
| of O |
| AnyDesk O |
| software O |
|
|
| O |
| 7z.dll O |
| , O |
| 7z.exe O |
| , O |
| and O |
| 7za.exe O |
| – O |
| files O |
| related O |
| to O |
| the O |
| 7 O |
| - O |
| Zip O |
| program O |
|
|
| O |
| STEALDEAL O |
|
|
| O |
| The O |
| stealer O |
| that O |
| is O |
| downloaded O |
| through O |
| RomCom O |
| ’s O |
| C&C O |
| servers O |
| is O |
| a O |
| relatively O |
| simple O |
| one O |
|
|
| O |
| that O |
| steals O |
| stored O |
| credentials O |
| and O |
| browsing O |
| history O |
| from O |
| the O |
| following O |
| browsers O |
| : O |
|
|
| O |
| Google O |
| Chrome O |
|
|
| O |
| Microsoft O |
| Edge O |
|
|
| O |
| Mozilla O |
| Firefox O |
|
|
|
|
| O |
| 18/27 O |
|
|
|
|
| O |
| Chromium O |
|
|
| O |
| Chrome O |
| Beta O |
|
|
| O |
| Yandex O |
| Browser O |
|
|
| O |
| The O |
| stealer O |
| also O |
| collects O |
| information O |
| on O |
| installed O |
| mail O |
| clients O |
| . O |
| The O |
| stolen O |
| data O |
| is O |
| stored O |
| locally O |
|
|
| O |
| on O |
| the O |
| victim O |
| ’s O |
| machine O |
| at O |
| % O |
| PUBLIC%\Libraries\BrowserData\Result O |
| , O |
| and O |
| through O |
| C&C O |
|
|
| O |
| command O |
| 24 O |
| , O |
| this O |
| data O |
| is O |
| exfiltrated O |
| through O |
| a O |
| RomCom O |
| C&C O |
| server O |
| . O |
| We O |
| detected O |
| the O |
|
|
| O |
| stealer O |
| as O |
| TrojanSpy O |
| . O |
| Win64.STEALDEAL O |
| , O |
| which O |
| is O |
| also O |
| known O |
| as O |
| SneakyStealer O |
| . O |
|
|
| O |
| Evasion O |
| Techniques O |
|
|
| O |
| RomCom O |
| 3.0 O |
| binaries O |
| are O |
| protected O |
| with O |
| VMProtect O |
| . O |
| Some O |
| binaries O |
| are O |
| also O |
| signed O |
| with O |
|
|
| O |
| valid O |
| certificates O |
| . O |
| Because O |
| the O |
| actors O |
| decided O |
| to O |
| use O |
| VMProtect O |
| ’s O |
| anti O |
| - O |
| VM O |
| feature O |
| , O |
| any O |
|
|
| O |
| attempt O |
| to O |
| run O |
| it O |
| in O |
| a O |
| virtual O |
| machine O |
| ( O |
| VM O |
| ) O |
| without O |
| modification O |
| or O |
| VM O |
| hardening O |
| will O |
| cause O |
|
|
| O |
| the O |
| malware O |
| to O |
| show O |
| an O |
| error O |
| message O |
| and O |
| exit O |
| ( O |
| Figure O |
| 5 O |
| ) O |
| . O |
|
|
|
|
| O |
| Figure O |
| 5 O |
| . O |
| Default O |
| VMProtect O |
| anti O |
| - O |
| VM O |
| detection O |
| in O |
| RomCom O |
| 3.0 O |
| samples O |
|
|
| O |
| Another O |
| interesting O |
| technique O |
| RomCom O |
| uses O |
| is O |
| the O |
| ability O |
| to O |
| add O |
| null O |
| bytes O |
| appended O |
| to O |
| the O |
|
|
| O |
| files O |
| received O |
| from O |
| a O |
| C&C O |
| server O |
| . O |
| Making O |
| the O |
| file O |
| bigger O |
| can O |
| be O |
| an O |
| attempt O |
| to O |
| avoid O |
| sandbox O |
|
|
| O |
| products O |
| or O |
| security O |
| software O |
| scanners O |
| that O |
| impose O |
| a O |
| file O |
| size O |
| limit O |
| . O |
|
|
| O |
| In O |
| later O |
| versions O |
| of O |
| RomCom O |
| , O |
| the O |
| binary O |
| that O |
| is O |
| hosted O |
| on O |
| a O |
| lure O |
| site O |
| contains O |
| an O |
| encrypted O |
|
|
| O |
| payload O |
| . O |
| To O |
| correctly O |
| decrypt O |
| the O |
| payload O |
| , O |
| it O |
| will O |
| need O |
| to O |
| reach O |
| out O |
| to O |
| a O |
| web O |
| server O |
| at O |
| the O |
| IP O |
|
|
| O |
| address O |
| 94.142.138.244 O |
| and O |
| download O |
| the O |
| decryption O |
| key O |
| . O |
| We O |
| suspect O |
| this O |
| website O |
| is O |
| a O |
|
|
| O |
| third O |
| - O |
| party O |
| service O |
| that O |
| is O |
| also O |
| being O |
| used O |
| by O |
| other O |
| malware O |
| , O |
| including O |
| the O |
| Vidar O |
| stealer O |
| that O |
| is O |
|
|
| O |
| also O |
| known O |
| as O |
| StealC. O |
| Also O |
| , O |
| recent O |
| RomCom O |
| droppers O |
| have O |
| stopped O |
| dropping O |
| the O |
| worker O |
|
|
| O |
| component O |
| . O |
| Instead O |
| , O |
| the O |
| network O |
| component O |
| downloads O |
| it O |
| from O |
| the O |
| C&C O |
| server O |
| . O |
|
|
| O |
| Packet O |
| Structure O |
| and O |
| Communications O |
| Flow O |
|
|
|
|
| O |
| 19/27 O |
|
|
|
|
| O |
| Based O |
| on O |
| our O |
| observations O |
| of O |
| the O |
| communication O |
| between O |
| victim O |
| machines O |
| and O |
| RomCom O |
|
|
| O |
| C&C O |
| servers O |
| , O |
| we O |
| were O |
| able O |
| to O |
| determine O |
| what O |
| the O |
| packet O |
| structure O |
| of O |
| this O |
| communication O |
|
|
| O |
| looks O |
| like O |
| ( O |
| Figure O |
| 6 O |
| ) O |
| . O |
| Initially O |
| , O |
| the O |
| client O |
| will O |
| reach O |
| out O |
| to O |
| the O |
| server O |
| with O |
| information O |
| on O |
| the O |
|
|
| O |
| victim O |
| ’s O |
| computer O |
| , O |
| such O |
| as O |
| its O |
| Universally O |
| Unique O |
| Identifier O |
| ( O |
| UUID O |
| ) O |
| , O |
| username O |
| , O |
| and O |
| the O |
|
|
| O |
| computer O |
| name O |
| . O |
| The O |
| server O |
| will O |
| then O |
| respond O |
| with O |
| a O |
| session O |
| ID O |
| that O |
| is O |
| four O |
| bytes O |
| long O |
| , O |
| as O |
|
|
| O |
| mentioned O |
| previously O |
| . O |
| This O |
| session O |
| ID O |
| is O |
| then O |
| incremented O |
| by O |
| one O |
| on O |
| the O |
| first O |
| byte O |
| by O |
| the O |
|
|
| O |
| C&C O |
| server O |
| with O |
| each O |
| command O |
| that O |
| is O |
| sent O |
| to O |
| the O |
| victim O |
| machine O |
| . O |
|
|
|
|
| O |
| Figure O |
| 6 O |
| . O |
| Packet O |
| structure O |
| of O |
| the O |
| observed O |
| packets O |
|
|
| O |
| One O |
| of O |
| the O |
| first O |
| commands O |
| we O |
| observed O |
| was O |
| command O |
| 3 O |
| , O |
| which O |
| uses O |
| cmd.exe O |
| to O |
| run O |
| a O |
|
|
| O |
| Nltest O |
| command O |
| with O |
| the O |
| argument O |
| /domain_trusts O |
| . O |
| This O |
| is O |
| done O |
| to O |
| gather O |
| information O |
| on O |
| any O |
|
|
| O |
| domains O |
| that O |
| the O |
| victim O |
| machine O |
| may O |
| know O |
| about O |
| . O |
| Once O |
| the O |
| command O |
| is O |
| finished O |
| , O |
| it O |
| returns O |
|
|
| O |
| the O |
| results O |
| of O |
| the O |
| command O |
| with O |
| the O |
| Session O |
| ID O |
| five O |
| bytes O |
| in O |
| ; O |
| the O |
| first O |
| four O |
| bytes O |
| are O |
| unknown O |
|
|
| O |
| at O |
| this O |
| time O |
| , O |
| but O |
| we O |
| observed O |
| the O |
| first O |
| byte O |
| will O |
| be O |
| 0x01 O |
| if O |
| it O |
| is O |
| returning O |
| data O |
| to O |
| the O |
| server O |
| , O |
| or O |
|
|
| O |
| 0x00 O |
| if O |
| it O |
| is O |
| receiving O |
| data O |
| from O |
| the O |
| server O |
| . O |
| The O |
| C&C O |
| server O |
| then O |
| appears O |
| to O |
| ask O |
| for O |
| specific O |
|
|
| O |
| information O |
| in O |
| an O |
| automated O |
| manner O |
| , O |
| as O |
| the O |
| same O |
| requests O |
| are O |
| sent O |
| in O |
| quick O |
| succession O |
|
|
| O |
| ( O |
| Figure O |
| 7 O |
| ) O |
| . O |
| From O |
| our O |
| analysis O |
| , O |
| we O |
| have O |
| determined O |
| that O |
| the O |
| server O |
| is O |
| asking O |
| for O |
| the O |
| victim O |
|
|
| O |
| machine O |
| to O |
| : O |
|
|
| O |
| 20/27 O |
|
|
|
|
| O |
| 1 O |
| . O |
| Return O |
| ntlest O |
| /domain_trusts O |
| with O |
| command O |
| 3 O |
|
|
| O |
| 2 O |
| . O |
| Download O |
| StealDeal O |
| to O |
| collect O |
| certain O |
| information O |
|
|
| O |
| 3 O |
| . O |
| Use O |
| StealDeal O |
| to O |
| collect O |
| cookies O |
| and O |
| other O |
| information O |
| from O |
| the O |
| victim O |
| ’s O |
| machine O |
|
|
| O |
| 4 O |
| . O |
| Collect O |
| files O |
| from O |
| the O |
| Desktop O |
| , O |
| Documents O |
| , O |
| and O |
| Downloads O |
| folders O |
| using O |
| command O |
| 32 O |
|
|
|
|
| O |
| Figure O |
| 7 O |
| . O |
| Flow O |
| of O |
| the O |
| communication O |
| between O |
| the O |
| C&C O |
| server O |
| and O |
| victim O |
| machine O |
|
|
| O |
| Use O |
| of O |
| fake O |
| companies O |
| and O |
| websites O |
|
|
| O |
| The O |
| malware O |
| uses O |
| certificates O |
| to O |
| lend O |
| credibility O |
| to O |
| the O |
| software O |
| that O |
| the O |
| targeted O |
| victims O |
|
|
| O |
| download O |
| . O |
| On O |
| the O |
| surface O |
| , O |
| the O |
| companies O |
| that O |
| are O |
| signing O |
| these O |
| binaries O |
| look O |
| like O |
| legitimate O |
|
|
| O |
| companies O |
| that O |
| have O |
| undergone O |
| the O |
| process O |
| of O |
| becoming O |
| a O |
| signer O |
| of O |
| these O |
| certificates O |
| . O |
|
|
| O |
| However O |
| , O |
| a O |
| closer O |
| look O |
| at O |
| these O |
| companies O |
| ’ O |
| websites O |
| reveals O |
| several O |
| oddities O |
| , O |
| including O |
| nonexistent O |
| phone O |
| numbers O |
| , O |
| stock O |
| photos O |
| of O |
| executives O |
| , O |
| office O |
| addresses O |
| that O |
| do O |
| not O |
| seem O |
| to O |
|
|
| O |
| match O |
| . O |
| This O |
| leads O |
| us O |
| to O |
| believe O |
| these O |
| are O |
| either O |
| fake O |
| companies O |
| or O |
| legitimate O |
| companies O |
| that O |
|
|
| O |
| are O |
| being O |
| abused O |
| in O |
| order O |
| to O |
| pass O |
| the O |
| checks O |
| needed O |
| to O |
| become O |
| an O |
| authorized O |
| signer O |
| of O |
|
|
| O |
| binaries O |
| . O |
|
|
| O |
| The O |
| RomCom O |
| 3.0 O |
| sample O |
| that O |
| was O |
| used O |
| in O |
| the O |
| AstraChat O |
| campaign O |
| was O |
| signed O |
| by O |
| a O |
|
|
| O |
| Canadian O |
| company O |
| called O |
| Noray O |
| Consulting O |
| Ltd. O |
| , O |
| which O |
| has O |
| a O |
| LinkedIn O |
| page O |
| ( O |
| Figure O |
| 8) O |
| , O |
| a O |
|
|
| O |
| website O |
| , O |
| and O |
| even O |
| a O |
| listing O |
| in O |
| a O |
| business O |
| registry O |
| in O |
| Canada O |
| ( O |
| Figure O |
| 9 O |
| ) O |
| . O |
|
|
|
|
| O |
| 21/27 O |
|
|
|
|
| O |
| Figure O |
| 8 O |
| . O |
| Screenshot O |
| of O |
| Noray O |
| Consulting O |
| 's O |
| LinkedIn O |
| page O |
|
|
|
|
| O |
| Figure O |
| 9 O |
| . O |
| Ontario O |
| business O |
| registry O |
| search O |
| results O |
| for O |
| Noray O |
| Consulting O |
|
|
| O |
| The O |
| company O |
| ’s O |
| LinkedIn O |
| page O |
| goes O |
| on O |
| to O |
| mention O |
| that O |
| Noray O |
| Consulting O |
| works O |
| on O |
| SOX O |
|
|
| O |
| compliance O |
| , O |
| an O |
| annual O |
| audit O |
| mandated O |
| by O |
| the O |
| Sarbanes O |
| - O |
| Oxley O |
| Act O |
| ( O |
| SOX O |
| ) O |
| , O |
| as O |
| well O |
| as O |
| other O |
|
|
| O |
| areas O |
| of O |
| risk O |
| control O |
| . O |
| However O |
| , O |
| the O |
| LinkedIn O |
| page O |
| also O |
| points O |
| to O |
| a O |
| website O |
| , O |
| noray[.]ca O |
| , O |
| that O |
|
|
| O |
| does O |
| not O |
| exist O |
| . O |
|
|
|
|
| O |
| 22/27 O |
|
|
|
|
| O |
| As O |
| the O |
| company O |
| claims O |
| to O |
| be O |
| based O |
| in O |
| Ontario O |
| according O |
| to O |
| its O |
| LinkedIn O |
| page O |
| , O |
| we O |
| looked O |
| for O |
|
|
| O |
| any O |
| information O |
| about O |
| it O |
| in O |
| public O |
| records O |
| for O |
| businesses O |
| in O |
| Canada O |
| . O |
| It O |
| appears O |
| that O |
| in O |
| 2020 O |
| , O |
|
|
| O |
| the O |
| owners O |
| of O |
| Noray O |
| Consulting O |
| . O |
| Changed O |
| the O |
| name O |
| of O |
| the O |
| company O |
| to O |
| just O |
| “ O |
| Noray O |
| . O |
| ” O |
| This O |
| new O |
|
|
| O |
| company O |
| name O |
| is O |
| not O |
| related O |
| to O |
| any O |
| of O |
| the O |
| things O |
| mentioned O |
| in O |
| this O |
| blog O |
| post O |
| or O |
| , O |
| from O |
| what O |
|
|
| O |
| we O |
| can O |
| tell O |
| , O |
| is O |
| doing O |
| anything O |
| malicious O |
| . O |
| It O |
| appears O |
| that O |
| the O |
| actors O |
| are O |
| watching O |
| out O |
| for O |
|
|
| O |
| companies O |
| that O |
| become O |
| inactive O |
| , O |
| or O |
| in O |
| a O |
| similar O |
| status O |
| , O |
| then O |
| will O |
| appropriate O |
| these O |
|
|
| O |
| companies O |
| ’ O |
| names O |
| . O |
|
|
| O |
| Internet O |
| searches O |
| for O |
| Noray O |
| Consulting O |
| show O |
| that O |
| its O |
| main O |
| website O |
| has O |
| a O |
| non O |
| - O |
| matching O |
|
|
| O |
| domain O |
| name O |
| , O |
| firstbyteconsulting[.]com O |
| . O |
| The O |
| website O |
| used O |
| to O |
| be O |
| for O |
| a O |
| company O |
| that O |
|
|
| O |
| specialized O |
| in O |
| project O |
| management O |
| . O |
| This O |
| domain O |
| appears O |
| to O |
| have O |
| expired O |
| in O |
| 2020 O |
| , O |
| but O |
| was O |
|
|
| O |
| bought O |
| and O |
| repurposed O |
| to O |
| resemble O |
| the O |
| website O |
| from O |
| before O |
| 2020 O |
| . O |
| What O |
| ties O |
| this O |
| domain O |
| to O |
|
|
| O |
| Noray O |
| Consulting O |
| now O |
| is O |
| that O |
| the O |
| address O |
| details O |
| on O |
| the O |
| website O |
| match O |
| that O |
| which O |
| is O |
| found O |
| on O |
|
|
| O |
| Noray O |
| Consulting O |
| ’s O |
| LinkedIn O |
| page O |
| : O |
| a O |
| Canadian O |
| company O |
| in O |
| Milton O |
| , O |
| Ontario O |
| . O |
| The O |
| contact O |
| page O |
|
|
| O |
| has O |
| a O |
| map O |
| that O |
| shows O |
| the O |
| company O |
| ’s O |
| location O |
| , O |
| but O |
| the O |
| map O |
| is O |
| in O |
| Russian O |
| ( O |
| Figure O |
| 10 O |
| ) O |
| . O |
| This O |
|
|
| O |
| could O |
| mean O |
| that O |
| the O |
| person O |
| who O |
| made O |
| this O |
| Google O |
| map O |
| had O |
| their O |
| primary O |
| language O |
| set O |
| to O |
|
|
| O |
| Russian O |
| , O |
| which O |
| would O |
| be O |
| unusual O |
| for O |
| a O |
| seemingly O |
| Canadian O |
| - O |
| based O |
| company O |
| . O |
|
|
|
|
| O |
| Figure O |
| 10 O |
| . O |
| Screenshot O |
| of O |
| the O |
| website O |
| ’s O |
| contact O |
| page O |
| map O |
|
|
| O |
| We O |
| also O |
| found O |
| that O |
| the O |
| people O |
| mentioned O |
| on O |
| their O |
| website O |
| are O |
| likely O |
| stock O |
| images O |
| or O |
| AIgenerated O |
| photos O |
| of O |
| people O |
| who O |
| are O |
| not O |
| related O |
| in O |
| any O |
| way O |
| to O |
| the O |
| business O |
| , O |
| as O |
| shown O |
| in O |
|
|
| O |
| Figure O |
| 11 O |
| . O |
|
|
|
|
| O |
| 23/27 O |
|
|
|
|
| O |
| Figure O |
| 11 O |
| . O |
| Screenshot O |
| of O |
| the O |
| website O |
| ’s O |
| team O |
| members O |
| page O |
|
|
| O |
| Further O |
| investigation O |
| reveals O |
| that O |
| Figure O |
| 11 O |
| has O |
| a O |
| number O |
| of O |
| red O |
| flags O |
| : O |
|
|
| O |
| None O |
| of O |
| these O |
| people O |
| appear O |
| to O |
| have O |
| real O |
| personas O |
| on O |
| the O |
| internet O |
|
|
| O |
| Reverse O |
| image O |
| search O |
| reveals O |
| these O |
| are O |
| stock O |
| photo O |
| images O |
| used O |
| on O |
| several O |
| sites O |
|
|
| O |
| Two O |
| members O |
| of O |
| the O |
| team O |
| have O |
| the O |
| same O |
| job O |
| title O |
| of O |
| " O |
| Manager O |
| , O |
| HR O |
| Process O |
| and O |
|
|
| O |
| Compensation O |
| " O |
|
|
| O |
| We O |
| have O |
| also O |
| observed O |
| that O |
| the O |
| text O |
| in O |
| other O |
| parts O |
| of O |
| Noray O |
| Consulting O |
| ’s O |
| website O |
| has O |
| been O |
| at O |
|
|
| O |
| least O |
| partially O |
| copied O |
| from O |
| other O |
| websites O |
| . O |
| This O |
| illustrates O |
| that O |
| these O |
| actors O |
| are O |
| trying O |
| to O |
| make O |
|
|
| O |
| the O |
| sites O |
| believable O |
| , O |
| offering O |
| what O |
| seems O |
| like O |
| realistic O |
| services O |
| that O |
| were O |
| lifted O |
| from O |
| real O |
|
|
| O |
| companies O |
| found O |
| online O |
| . O |
|
|
| O |
| Void O |
| Rabisu O |
| has O |
| had O |
| many O |
| lure O |
| websites O |
| that O |
| attempt O |
| to O |
| convince O |
| targets O |
| to O |
| download O |
|
|
| O |
| trojanized O |
| legitimate O |
| applications O |
| . O |
| These O |
| lure O |
| sites O |
| look O |
| legitimate O |
| at O |
| first O |
| , O |
| but O |
| usually O |
| have O |
|
|
| O |
| similar O |
| oddities O |
| on O |
| the O |
| websites O |
| . O |
| For O |
| example O |
| , O |
| a O |
| site O |
| that O |
| had O |
| a O |
| business O |
| address O |
| of O |
| a O |
|
|
| O |
| shopping O |
| mall O |
| , O |
| and O |
| the O |
| contact O |
| phone O |
| number O |
| of O |
| a O |
| grocery O |
| store O |
| . O |
|
|
|
|
| O |
| 24/27 O |
|
|
|
|
| O |
| Figure O |
| 12 O |
| . O |
| Screenshot O |
| of O |
| the O |
| contact O |
| information O |
| of O |
| a O |
| Void O |
| Rabisu O |
| lure O |
| site O |
|
|
| O |
| We O |
| can O |
| link O |
| the O |
| two O |
| Canadian O |
| companies O |
| that O |
| were O |
| used O |
| to O |
| sign O |
| RomCom O |
| binaries O |
| in O |
| the O |
|
|
| O |
| AstraChat O |
| campaign O |
| and O |
| a O |
| campaign O |
| against O |
| the O |
| Ukrainian O |
| armed O |
| forces O |
| with O |
| more O |
| than O |
| 80 O |
|
|
| O |
| other O |
| mostly O |
| Canadian O |
| companies O |
| in O |
| total O |
| , O |
| based O |
| on O |
| an O |
| analysis O |
| of O |
| internet O |
| infrastructure O |
| . O |
|
|
| O |
| Among O |
| these O |
| 80 O |
| other O |
| mostly O |
| Canadian O |
| companies O |
| , O |
| about O |
| two O |
| dozen O |
| companies O |
| were O |
| used O |
|
|
| O |
| to O |
| sign O |
| other O |
| malware O |
| binaries O |
| like O |
| Emotet O |
| , O |
| Matanbuchus O |
| Loader O |
| , O |
| BatLoader O |
| , O |
| another O |
|
|
| O |
| backdoor O |
| known O |
| as O |
| SolarMarker O |
| , O |
| and O |
| coinminers O |
| . O |
| This O |
| makes O |
| us O |
| believe O |
| that O |
| Void O |
| Rabisu O |
| is O |
|
|
| O |
| likely O |
| to O |
| be O |
| using O |
| a O |
| third O |
| - O |
| party O |
| service O |
| that O |
| aids O |
| in O |
| signing O |
| binaries O |
| with O |
| certificates O |
| of O |
|
|
| O |
| seemingly O |
| legitimate O |
| Canadian O |
| companies O |
| . O |
|
|
| O |
| Conclusions O |
| and O |
| Recommendations O |
|
|
| O |
| The O |
| war O |
| against O |
| Ukraine O |
| has O |
| made O |
| cyber O |
| campaigns O |
| against O |
| Ukraine O |
| , O |
| Eastern O |
| Europe O |
| , O |
| and O |
|
|
| O |
| NATO O |
| countries O |
| more O |
| visible O |
| for O |
| two O |
| reasons O |
| : O |
| the O |
| number O |
| of O |
| attacks O |
| has O |
| increased O |
|
|
| O |
| dramatically O |
| , O |
| and O |
| both O |
| the O |
| private O |
| and O |
| public O |
| sectors O |
| are O |
| looking O |
| closely O |
| at O |
| what O |
| happens O |
| in O |
|
|
| O |
| Ukraine O |
| . O |
| More O |
| information O |
| from O |
| intelligence O |
| agencies O |
| is O |
| being O |
| declassified O |
| by O |
| Western O |
|
|
| O |
| governments O |
| , O |
| so O |
| privately O |
| - O |
| owned O |
| companies O |
| can O |
| investigate O |
| further O |
| for O |
| themselves O |
| . O |
| Another O |
|
|
| O |
| important O |
| factor O |
| is O |
| that O |
| many O |
| actors O |
| who O |
| previously O |
| had O |
| different O |
| motivations O |
| are O |
| becoming O |
|
|
| O |
| more O |
| aligned O |
| towards O |
| the O |
| same O |
| goal O |
| , O |
| even O |
| when O |
| their O |
| campaigns O |
| do O |
| not O |
| appear O |
| to O |
| be O |
| part O |
| of O |
|
|
| O |
| a O |
| coordinated O |
| effort O |
| . O |
|
|
| O |
| The O |
| line O |
| is O |
| blurring O |
| between O |
| cybercrime O |
| driven O |
| by O |
| financial O |
| gain O |
| and O |
| APT O |
| attacks O |
| motivated O |
|
|
| O |
| by O |
| geopolitics O |
| , O |
| espionage O |
| , O |
| disruption O |
| , O |
| and O |
| warfare O |
| . O |
| Since O |
| the O |
| rise O |
| of O |
| Ransomware O |
| - O |
| as O |
| - O |
| aService O |
| ( O |
| RaaS O |
| ) O |
| , O |
| cybercriminals O |
| are O |
| now O |
| using O |
| advanced O |
| tactics O |
| and O |
| targeted O |
| attacks O |
| that O |
|
|
| O |
| were O |
| previously O |
| thought O |
| to O |
| be O |
| the O |
| domain O |
| of O |
| APT O |
| actors O |
| . O |
| Inversely O |
| , O |
| tactics O |
| and O |
| techniques O |
|
|
| O |
| that O |
| were O |
| previously O |
| used O |
| by O |
| financially O |
| motivated O |
| actors O |
| are O |
| increasingly O |
| being O |
| used O |
| in O |
|
|
| O |
| attacks O |
| with O |
| geopolitical O |
| goals O |
| . O |
|
|
|
|
| O |
| 25/27 O |
|
|
|
|
| O |
| Currently O |
| , O |
| APT O |
| actors O |
| like O |
| Pawn O |
| Storm O |
| and O |
| APT29 O |
| , O |
| cyber O |
| mercenaries O |
| like O |
| Void O |
| Balaur O |
| , O |
|
|
| O |
| hacktivism O |
| groups O |
| like O |
| Killnet O |
| , O |
| along O |
| with O |
| cybercriminals O |
| like O |
| former O |
| Conti O |
| affiliates O |
| and O |
| Void O |
|
|
| O |
| Rabisu O |
| , O |
| are O |
| targeting O |
| Ukraine O |
| and O |
| its O |
| allies O |
| , O |
| but O |
| their O |
| campaigns O |
| do O |
| not O |
| yet O |
| look O |
| coordinated O |
| . O |
|
|
| O |
| We O |
| expect O |
| that O |
| significant O |
| geopolitical O |
| events O |
| like O |
| the O |
| current O |
| war O |
| against O |
| Ukraine O |
| will O |
|
|
| O |
| accelerate O |
| the O |
| alignment O |
| of O |
| the O |
| campaigns O |
| of O |
| threat O |
| actors O |
| who O |
| reside O |
| in O |
| the O |
| same O |
|
|
| O |
| geographic O |
| region O |
| . O |
| This O |
| will O |
| lead O |
| to O |
| new O |
| challenges O |
| for O |
| defenders O |
| , O |
| as O |
| attacks O |
| can O |
| then O |
| come O |
|
|
| O |
| from O |
| many O |
| different O |
| angles O |
| , O |
| and O |
| it O |
| will O |
| be O |
| less O |
| clear O |
| who O |
| is O |
| the O |
| actor O |
| responsible O |
| for O |
| them O |
| . O |
|
|
| O |
| Based O |
| on O |
| our O |
| analysis O |
| , O |
| we O |
| believe O |
| the O |
| following O |
| activity O |
| should O |
| be O |
| monitored O |
| in O |
| endpoints O |
| : O |
|
|
| O |
| Downloading O |
| and O |
| executing O |
| MSI O |
| packages O |
| that O |
| contain O |
| entries O |
| in O |
| CustomAction O |
| tables O |
|
|
| O |
| referring O |
| to O |
| DLL O |
| exported O |
| functions O |
|
|
| O |
| Writing O |
| access O |
| to O |
| SOFTWARE\Classes\CLSID\<CSLID O |
| > O |
| under O |
| both O |
|
|
| O |
| HKEY_CURRENT_USER O |
| ( O |
| HKCU O |
| ) O |
| and O |
| HKEY_LOCAL_MACHINE O |
| ( O |
| HKLM O |
| ) O |
| , O |
| which O |
| can O |
|
|
| O |
| be O |
| a O |
| sign O |
| of O |
| COM O |
| hijacking O |
|
|
| O |
| Initiation O |
| of O |
| localhost O |
| sockets O |
| by O |
| rundll32.exe O |
| , O |
| as O |
| RomCom O |
| DLLs O |
| are O |
| loaded O |
| by O |
| this O |
|
|
| O |
| process O |
| — O |
| we O |
| observed O |
| that O |
| RomCom O |
| listens O |
| on O |
| the O |
| port O |
| range O |
| 5554 O |
| - O |
| 5600 O |
| when O |
|
|
| O |
| setting O |
| up O |
| localhost O |
| sockets O |
|
|
| O |
| Binary O |
| padding O |
| with O |
| null O |
| bytes O |
| , O |
| a O |
| known O |
| technique O |
| to O |
| evade O |
| scanners O |
| . O |
| Although O |
|
|
| O |
| RomCom O |
| did O |
| n’t O |
| use O |
| this O |
| feature O |
| in O |
| our O |
| tests O |
| , O |
| it O |
| is O |
| present O |
| in O |
| command O |
| 5 O |
| . O |
| We O |
| included O |
| a O |
|
|
| O |
| YARA O |
| ruleset O |
| to O |
| look O |
| for O |
| such O |
| files O |
| in O |
| our O |
| GitHub O |
| research O |
| repository O |
| . O |
|
|
| O |
| Binary O |
| padding O |
| with O |
| non O |
| - O |
| zero O |
| data O |
| , O |
| which O |
| we O |
| observed O |
| in O |
| one O |
| sample O |
| when O |
| it O |
| was O |
|
|
| O |
| dropping O |
| another O |
| . O |
| This O |
| alone O |
| is O |
| not O |
| malicious O |
| , O |
| but O |
| it O |
| is O |
| worth O |
| flagging O |
| once O |
| detected O |
| for O |
|
|
| O |
| further O |
| investigation O |
| . O |
|
|
| O |
| Endpoint O |
| solutions O |
| like O |
| Trend O |
| Micro O |
| 's O |
| Smart O |
| Protection O |
| Suites O |
| and O |
| Worry O |
| - O |
| Free O |
| Business O |
|
|
| O |
| Security O |
| solutions O |
| also O |
| offer O |
| protection O |
| for O |
| both O |
| users O |
| and O |
| businesses O |
| against O |
| threats O |
| like O |
|
|
| O |
| RomCom O |
| . O |
| These O |
| solutions O |
| come O |
| equipped O |
| with O |
| behavior O |
| - O |
| monitoring O |
| capabilities O |
| that O |
| enable O |
|
|
| O |
| them O |
| to O |
| detect O |
| malicious O |
| files O |
| , O |
| scripts O |
| , O |
| and O |
| messages O |
| . O |
| They O |
| can O |
| also O |
| block O |
| all O |
| related O |
|
|
| O |
| malicious O |
| URLs O |
| . O |
| Additionally O |
| , O |
| the O |
| Trend O |
| Micro O |
| ™ O |
| Deep O |
| Discovery O |
| ™ O |
| solution O |
| includes O |
| an O |
| email O |
|
|
| O |
| inspection O |
| layer O |
| that O |
| can O |
| identify O |
| and O |
| protect O |
| enterprises O |
| from O |
| malicious O |
| attachments O |
| and O |
|
|
| O |
| URLs O |
| . O |
| By O |
| leveraging O |
| these O |
| powerful O |
| tools O |
| , O |
| users O |
| and O |
| businesses O |
| can O |
| effectively O |
| defend O |
|
|
| O |
| themselves O |
| against O |
| the O |
| damaging O |
| effects O |
| of O |
| RomCom O |
| and O |
| other O |
| similar O |
| threats O |
| . O |
|
|
| O |
| Indicators O |
| of O |
| Compromise O |
|
|
| O |
| Download O |
| the O |
| full O |
| list O |
| of O |
| indicators O |
| here O |
| . O |
|
|
| O |
| MITRE O |
| ATT&CK O |
|
|
| O |
| ID O |
|
|
|
|
| O |
| Name O |
|
|
|
|
| O |
| Description O |
|
|
|
|
| O |
| 26/27 O |
|
|
|
|
| O |
| T1583.008 O |
|
|
|
|
| O |
| Acquire O |
| Infrastructure O |
| : O |
|
|
| O |
| Malvertising O |
|
|
|
|
| O |
| RomCom O |
| uses O |
| malvertising O |
| to O |
| redirect O |
| targets O |
|
|
| O |
| to O |
| lure O |
| websites O |
| from O |
| which O |
| to O |
| download O |
| fake O |
|
|
| O |
| installer O |
| applications O |
|
|
|
|
| O |
| T1566.002 O |
|
|
|
|
| O |
| Phishing O |
| : O |
| Spear O |
| Phishing O |
|
|
| O |
| Link O |
|
|
|
|
| O |
| RomCom O |
| sent O |
| highly O |
| targeted O |
| spear O |
| phishing O |
|
|
| O |
| emails O |
|
|
|
|
| O |
| T1027.002 O |
|
|
|
|
| O |
| Obfuscated O |
| Files O |
| or O |
|
|
| O |
| Information O |
| : O |
| Software O |
|
|
| O |
| Packing O |
|
|
|
|
| O |
| RomCom O |
| uses O |
| VMProtect O |
|
|
|
|
| O |
| T1027.001 O |
|
|
|
|
| O |
| Obfuscated O |
| Files O |
| or O |
|
|
| O |
| Information O |
| : O |
| Binary O |
|
|
| O |
| Padding O |
|
|
|
|
| O |
| RomCom O |
| uses O |
| binary O |
| padding O |
| on O |
| dropped O |
| files O |
|
|
| O |
| to O |
| avoid O |
| security O |
| solutions O |
|
|
|
|
| O |
| T1546.015 O |
|
|
|
|
| O |
| Event O |
| Triggered O |
| Execution O |
| : O |
|
|
| O |
| Component O |
| Object O |
| Model O |
|
|
| O |
| Hijacking O |
|
|
|
|
| O |
| RomCom O |
| uses O |
| COM O |
| hijacking O |
| for O |
| persistence O |
|
|
|
|
| O |
| T1571 O |
|
|
|
|
| O |
| Non O |
| - O |
| Standard O |
| Port O |
|
|
|
|
| O |
| RomCom O |
| listens O |
| on O |
| port O |
| ranges O |
| 5554 O |
| to O |
| 5600 O |
|
|
| O |
| for O |
| communication O |
| between O |
| dropped O |
|
|
| O |
| components O |
|
|
|
|
| O |
| T1071.001 O |
|
|
|
|
| O |
| Application O |
| Layer O |
| Protocol O |
| : O |
|
|
| O |
| Web O |
| Protocols O |
|
|
|
|
| O |
| RomCom O |
| uses O |
| HTTPS O |
| for O |
| C&C O |
|
|
| O |
| communications O |
|
|
|
|
| O |
| T1555.003 O |
|
|
|
|
| O |
| Credentials O |
| from O |
| Password O |
|
|
| O |
| Stores O |
| : O |
| Credentials O |
| from O |
|
|
| O |
| Web O |
| Browsers O |
|
|
|
|
| O |
| RomCom O |
| uses O |
| a O |
| stealer O |
| to O |
| gather O |
| credentials O |
|
|
| O |
| of O |
| several O |
| browsers O |
|
|
|
|
| O |
| T1113 O |
|
|
|
|
| O |
| Screen O |
| Capture O |
|
|
|
|
| O |
| RomCom O |
| can O |
| capture O |
| screenshots O |
| of O |
| the O |
|
|
| O |
| victim O |
| 's O |
| machine O |
|
|
|
|
| O |
| T1219 O |
|
|
|
|
| O |
| Remote O |
| Access O |
| Software O |
|
|
|
|
| O |
| RomCom O |
| 's O |
| backdoor O |
| has O |
| a O |
| functionality O |
| to O |
| run O |
|
|
| O |
| AnyDesk O |
| application O |
|
|
|
|
| O |
| 27/27 O |