Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Severity
High
Analysis Summary
The campaign consists of dropping PDF file documents and Microsoft word documents with embedded macros.
The main infection flow consists of the following three main steps.
The attackers lured the users with multiple images to “Enable Content” button so that the document can trigger the malicious macro code.
Attackers used an excel as well to drop the malicious macro code to infect the users.
An interesting part of the download stage in one of the documents, is the unexplained usage of a Dropbox “Host” field in the HTTP request header. Upon further analysis, researchers found that Dropbox was the original source for the second stage of the infection, during this campaign.
The final payload in this campaign is downloaded from a compromised server in the form of a CAB file, which is later expanded into the KEYMARBLE backdoor. It is important to note the CAB file is disguised as a JPEG image on the compromised host (http[:]//37.238.135[.]70/img/anan.jpg).
All of the malicious documents downloaded KEYMARBLE, compressed inside a CAB file, which successfully evaded detection and reduced detection from five vendors of Virus Total to just 2 of them.
Impact
Successful Lazarus Attack
Indicators of Compromise
URLs
hxxp[:]//37[.]238[.]135[.]70/img/anan[.]jpg
Filename
LosAngeles_Court_report.doc
Serial_Numbers.xls
2018.11.2~2019.1.26_ErrorDetail.doc
Malware Hash (MD5/SHA1/SH256)
Remediation