Rewterz Threat Alert – Iranian Campaign Tailored to US Companies Introduces TONEDEAF 2.0

Monday, February 3, 2020

Severity

High

Analysis Summary

APT34 (also known as OilRig or Helix Kitten) is a cluster of Iranian government-backed cyber espionage activities that has been active since 2014. The group is known to target various international organizations, mainly in the Middle East. Among their targeted industries are government agencies, financial services, energy and utilities, telecommunications, and oil and gas. In late January 2020, a file named survey.xls was discovered that was designed to look like an employee satisfaction survey tailored to either Westat employees or Westat customers. At first the spreadsheet appeared to be blank. Only once the victim enables macros, the survey is displayed to the user and the malicious VBA code begins to execute.The embedded VBA code unpacks a zip file into a temporary folder, extracts a “Client update.exe” executable file and installs it to “C:UsersvalsClient update.exe”. “Client update.exe” is actually a highly modified version of the TONEDEAF malware, which is named TONEDEAF 2.0. Finally, the crtt function creates a scheduled task “CheckUpdate” that runs the unpacked executable five minutes after being infected by it, as well as on future log-ons.

Impact

  • Unauthorized Code Execution
  • Detection Evasion
  • Information Theft

Indicators of Compromise

Domain Name

manygoodnews[.]com

Filename

  • Client update[.]exe
  • survey[.]xls

MD5

  • 17150a137c43235ad07011b552f9ff27
  • b15552213169ad3b8efb14470987a335
  • 51e362e8dc8d5ed7228af47ed913242a
  • 8beb7bb883a091d2690982d9d46d3bb4
  • e2fc67d5572f66f92c21a9d95a4df2d0

SHA-256

  • c10cd1c78c180ba657e3921ee9421b9abd5b965c4cdfaa94a58e383b45bb72ca
  • a897164e3547f0ce3aaa476b0364a200769e8c07ce825bcfdc43939dd1314bb1
  • d61eecd7492dfa461344076a93fc2668dc28943724190faf3d9390f8403b6411
  • 20b3d046ed617b7336156a64a0550d416afdd80a2c32ce332be6bbfd4829832c
  • 4c323bc11982b95266732c01645c39618550e68f25c34f6d3d79288eae7d4378

Remediation

  • Block the threat indicators at their respective controls.
  • Do not download files/click on URLs attached in untrusted emails.
  • Do not enable macros for files coming from unverified sources.

Data Sheets

Corporate Brochure


Our Story


Services


Solutions


Managed Security


Upcoming Rewterz Trainings/Events

Rewterz News

  • 23, February 2020 Rewterz Threat Advisory – CVE-2019-16028 – Cisco Firepower Management Center
  • 17, February 2020 Rewterz Threat Alert – Satan ransomware rebrands as 5ss5c ransomware
  • 14, February 2020 Rewterz Threat Alert – Emotet Malware Hacks Nearby Wi-Fi Networks to Infect New Victims
  • 13, February 2020 Rewterz Threat Advisory – CVE-2020-3119 – Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution

Copyright © Rewterz. All rights reserved.