Russia-Linked Sandworm Disguises as Hacktivists to Breach Water Utility Systems – Active IOCs
April 19, 2024Multiple Oracle Products Vulnerabilities
April 19, 2024Russia-Linked Sandworm Disguises as Hacktivists to Breach Water Utility Systems – Active IOCs
April 19, 2024Multiple Oracle Products Vulnerabilities
April 19, 2024Severity
High
Analysis Summary
Middle Eastern governments have been singled out in an as-yet-undisclosed campaign to introduce a new backdoor known as CR4T. The activity was found in February 2024, according to the researchers, however, there is evidence that it may have been going on for at least a year earlier. DuneQuixote is the codename for the campaign.
The report reads, “The group behind the campaign took steps to prevent collection and analysis of its implants and implemented practical and well-designed evasion methods both in network communications and in the malware code.”
The attack chain begins with a dropper, which may be found in two varieties; a standard dropper that can be used as an executable or DLL file, or it can be a corrupted installer file for Total Commander, a genuine program. The main purpose of the dropper, regardless of the mechanism employed, is to extract an embedded command-and-control (C2) address, which is then encrypted and decrypted using a unique manner to shield the server address from automated malware analysis tools.
To be more precise, it means finding the dropper's filename and joining it with one of the numerous hard-coded passages from Spanish poetry that are included in the dropper code. After that, the malware determines the concatenated string's MD5 hash, which is needed to decrypt the C2 server address. Next, the dropper connects to the C2 server and downloads a next-stage payload by sending an HTTP request with a hard-coded ID as the User-Agent string.
If the incorrect user agent is not supplied, the payload cannot be downloaded. Moreover, it seems that the payload is either limited to a single download per victim or is only accessible for a short time after a malware copy is released into the world. In contrast, the trojanized Total Commander installer keeps the majority of the features of the original dropper but has a few changes.
The Spanish poem strings are removed, and extra anti-analysis checks are added to prevent a connection to the C2 server if a debugger or monitoring tool is installed on the system, the cursor position remains unchanged for an extended period, the available RAM is less than 8 GB, or the disk capacity is less than 40 GB.
A memory-only implant based on C/C++, CR4T ("CR4T.pdb") allows attackers to operate files, upload and receive files, and access a terminal for command line execution on the compromised system by establishing a connection with the C2 server.
The same features were also found in a Golang version of CR4T that could be used to build scheduled tasks using the Go-ole library and execute arbitrary commands. Furthermore, the Golang CR4T backdoor can use the Telegram API for C2 communications and the COM objects hijacking approach to accomplish persistence. The Golang variant's existence suggests that the anonymous threat actors responsible for DuneQuixote are continuously honing their cross-platform malware tradecraft.
The 'DuneQuixote' campaign uses a fascinating range of stealth and persistence-oriented technologies to target entities in the Middle East. The attackers exhibit superior evasion skills and strategies by disguising themselves as genuine software and using memory-only implants and droppers to resemble the Total Commander installer.
Impact
- Unauthorized Access
- Data Exfiltration
Indicators of Compromise
Domain Name
- g1sea23g.commonline.space
- telemetry.commonline.space
- e1awq1lp.commonline.space
- mc.commonline.space
MD5
- 3aaf7f7f0a42a1cf0a0f6c61511978d7
- 5759acc816274d38407038c091e56a5c
- 606fdee74ad70f76618007d299adb0a4
- 5a04d9067b8cb6bcb916b59dcf53bed3
- 48c8e8cc189eef04a55ecb021f9e6111
- 7b9e85afa89670f46f884bb3bce262b0
- 4f29f977e786b2f7f483b47840b9c19d
- 9d20cc7a02121b515fd8f16b576624ef
- 4324cb72875d8a62a210690221cdc3f9
- 3cc77c18b4d1629b7658afbf4175222c
- 6cfec4bdcbcf7f99535ee61a0ebae5dc
- c70763510953149fb33d06bef160821c
- f3988b8aaaa8c6a9ec407cf5854b0e3b
- cf4bef8537c6397ba07de7629735eb4e
- 1bba771b9a32f0aada6eaee64643673a
SHA-256
- 24d1987571c493e55d8427ffbb77be3c5685dc5a395c58f57455b8d23029d0a8
- cdddd4dd5a05a90e709943cc1c1ebbd08e92f75fb0cf643464c4f5292c0137a7
- 016265214722a400afcddaaaf8b6c71a02dda3de045f9ca595a7eefd579b1e15
- 30cd168a58c3a6ab2c077a6bf0e9b7ab37077c7f44210224154acdc571900ebb
- a2c33c597ecd4a402e3a8ef8e623a7fbb3fd8ae78d34a1e2b6110b8bef0a6b2b
- c466b9b6ae1de1666d3047ea2a47497941e3e38cf04d28175901de2ea2ba4fa6
- e9f17dcc4537f6812404b32e9e99772ba679948a312c8e9fdf71a0981556e0d6
- c2b3f88649148b6ff1770352a9717690d91cddb18195ebaf4a29560843b9e31f
- f6e90769296b70c7b925337dc9de43f5c3af5004dd3b6c3aede9ee91de8b4233
- 54a1b46f4cefe5fa5ac0b9a538da27cdd9dca6e3b6cd512e3c07b3ebd67148d3
- b31df45851a4046e51663de55cb1b82efe77e86d67869d92889dd1fde982d3d1
- 75c9685d1792d949374eceaacdee95235aa86bc55c8dffec150bee768e4e60e3
- ec14b9ba9b291f3151a3c0b45304c09b4bcc4576854e9df9ae6208e920e74d75
- 7d8bec8c8132108dd7c53c341830adb1ce372dc108fabcbdefc5cc42274fb12a
- d2c0969437ced872ab124e5ceb0a7f1524063849e4ea6dceb740951c7014cd2c
SHA1
- 358f8757418c28e9e2a3c17dda180ace60aaa905
- dd1f3df3d07754843a58ce9613669fb8a57d83cb
- 32539b7ade2830b7bf404e1cb85318cd9b81fb66
- 6312568efa6cc02004acbc77bda6a2ec83e7b945
- 068e76cb548019d8c9dade1493fdf9343d86d8b9
- db7ab88046f162ad5f2ab713dfbbdb23c7c9a8d1
- a42a255e1c3d79c317180e2603eb5487c5afc303
- d6c77554b9821c6405fe386bd04a799426c8c118
- 98671bd063cef4d6f3e17c58652c4a88c57701b8
- d7cf715b9596abe119e3e6f64026ee05efcd539c
- f34b71af24fd1982d0899283c8bfb7b0f1392434
- bbea7b0b57b2eb72e0f373f914143a62851ffe65
- 74db9683f7f0ea511dc37435851b6d77cc4781e4
- e3783a51b31b891b2a9720c3cda3f8cd6e7dbe76
- 08e62722bae308b5a90e8d9281fa112c7d6b6323
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Be vigilant when downloading software and double-check the URL to see if it is legitimate.
- Never download software from untrusted sources.
- Download apps only from official app stores like Google Play Store or Apple App Store. Avoid downloading apps from third-party websites or unofficial sources.
- Review the permissions requested by apps before installing them. Be cautious of apps that request unnecessary permissions or access to sensitive data.
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Keep your operating system and apps up-to-date with the latest security patches and updates
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Be cautious of unsolicited messages, emails, or links, especially from unknown or suspicious sources. Avoid clicking on suspicious links or downloading attachments from untrusted sources.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Regularly backup your data to a secure location, such as a cloud storage service or external hard drive.
- Develop and regularly update an incident response plan that outlines the steps to take in case of a security breach. Test the plan through simulations to ensure its effectiveness.