A set of highly evasive malware with advanced capabilities has been retrieved in attacks launched against ﬁnancial organizations. The attack mechanism closely resembles that of the North Korean APT group called Lazarus or Hidden Cobra. The attacks are speciﬁcally aimed at targeting banks, ATM switching networks and schemes, using variants of the earlier malware associated with this group. The campaign starts with a social-engineering attack impersonating reputable personalities from ﬁnancial institutions. The victim is ﬁrst approached over social media networks like LinkedIn and is invited to personal Gmail and Skype for the interview, subsequently sharing the fake job app that works as a malware dropper.
‘ApplicationPDF.exe’ is a malware dropper which is typically shared by the attacker on Skype or email with the victim. This malicious ﬁle performs the following set of activities: • Downloads a PowerShell script REG_TIME.ps1 after making a connection with a C2 domain ecombox.store • The script is stored at C:\users\public\REG_TIME.ps1 • Executes the following malicious scripts and deletes after 5 seconds REG_TIME.ps1 (Stage 1): • Contains PowerRatankba DES-encrypted payload • Decodes and decrypts the encrypted payload and executes it REG_TIME.ps1 (Stage 2): • Stage two Heavily utilizes WMI to gather information about the targets machine and AD domain • Gathers the following information from the victim’s machine: Victims IP and MAC address Details of operating system Logged in user Running processes State of TCP ports 139, 445 and 3389 It then allows the attacker to upload tools and run commands on the compromised machine to pivot to other machines on the network.
Indicators of Compromise
IP(s) / Hostname(s)
Block the Threat Indicators at their respective controls.
Spread awareness about such scams and how to handle them