Rewterz Threat Alert – Trickbot Targets Windows 10 Users by Abusing ActiveX Control
March 2, 2020Rewterz Threat Alert – ProClient RAT with Advanced Espionage Features
March 3, 2020Rewterz Threat Alert – Trickbot Targets Windows 10 Users by Abusing ActiveX Control
March 2, 2020Rewterz Threat Alert – ProClient RAT with Advanced Espionage Features
March 3, 2020Severity
High
Analysis Summary
Lazarus has a long history of destructive cyber-attacks. Some more notable examples are the 2013 “Dark Seoul” attacks, the 2014 attack on Sony Pictures, a series of SWIFT-targeted campaigns in 2015-2016, and more. The researchers found a new set of MARs (Malware Analysis Reports) covering newly uncovered/updated malware/implants attributed to North Korea. More specifically, these are tools attributed to the Lazarus Group / Hidden Cobra.
Full Featured RAT (Remote Access Trojan) payloads and associated CAgent11 implant builder/controller. This implant is used for standard system management, control and recon. Initial infection is carried out via a malicious executable. An embedded bitmap image (contained in the trojan) is decoded into shellcode upon execution, thus loading the implant. Network communications are encrypted via XOR. The analyzed BISTROMATH samples, along with the other families all attempt to evade analysis via common sandboxes (VIRTUALBOX, QEMU, VMware) via multiple artifact checks (presence of specific devices, registry entries, processes, files).
Impact
- Credential Dumping
- Data from Local System
- System Network Configuration Discov
Indicators of Compromise
SHA-256
- 05feed9762bc46b47a7dc5c469add9f163c16df4ddaafe81983a628da5714461
- 0608e411348905145a267a9beaf5cd3527f11f95c4afde4c45998f066f418571
- 83228075a604e955d59edc760e4c4ed16eedabfc8f6ac291cf21b4fcbcd1f70a
- b05aae59b3c1d024b19c88448811debef1eada2f51761a5c41e70da3db7615a9
- 1ea6b3e99bbb67719c56ad07f5a12501855068a4a866f92db8dcdefaffa48a39
- 4c372df691fc699552f81c3d3937729f1dde2a2393f36c92ccc2bd2a033a0818
- 12480585e08855109c5972e85d99cda7701fe992bc1754f1a0736f1eebcb004d
- fe43bc385b30796f5e2d94dfa720903c70e66bc91dfdcfb2f3986a1fea3fe8c5
- ddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d
- 606c6000f36dc69fefc6df828e1ac9c5529a71a62b99f5df55463606c4c9689c
- 738ba44188a93de6b5ca7e0bf0a77f66f677a0dda2b2e9ef4b91b1c8257da790
- 618a67048d0a9217317c1d1790ad5f6b044eaa58a433bd46ec2fb9f9ff563dc6
- 8ee7da59f68c691c9eca1ac70ff03155ed07808c7a66dee49886b51a59e00085
- 32ec329301aa4547b4ef4800159940feb950785f1ab68d85a14d363e0ff2bc11
- a2a77cefd2faa17e18843d74a8ad155a061a13da9bd548ded6437ef855c14442
- 04d70bb249206a006f83db39bbe49ff6e520ea329e5fbb9c758d426b1c8dec30
- 4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
- c66ef8652e15b579b409170658c95d35cfd6231c7ce030b172692f911e7dcff8
- f8f7720785f7e75bd6407ac2acd63f90ab6c2907d3619162dc41a8ffa40a5d03
- d77fdabe17cdba62a8e728cbe6c740e2c2e541072501f77988674e07a05dfb39
- 70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
- 2151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525
- 8a1d57ee05d29a730864299376b830a7e127f089e500e148d96d0868b7c5b520
- b9a26a569257fbe02c10d3735587f10ee58e4281dba43474dbdef4ace8ea7101
- 52f83cdaefd194fff3d387631d5693a709cd7b3a20a072e7827c4d4218d57695
- 73dcb7639c1f81d3f7c4931d32787bdf07bd98550888c4b29b1058b2d5a7ca33
- fdb87add07d3459c43cfa88744656f6c00effa6b7ec92cb7c8b911d233aeb4ac
- 084b21bc32ee19af98f85aee8204a148032ce7eabef668481b919195dd62b319
- 1a01b8a4c505db70f9e199337ce7f497b3dd42f25ad06487e29385580bca3676
Remediation
- Block all threat indicators at your respective controls.
- Always be suspicious about emails sent by unknown senders.
- Never click on the links/attachments sent by unknown senders.