A phishing campaign delivering Adwind (also known as JRAT or SockRat) to the utilities industry. The email attachment spoofs a PDF file but is actually the delivery mechanism for the notorious Adwind malware. The national grid utilities infrastructure is the primary target of the campaign. Adwind is designated as a MaaS (malware-as-a-service) and is available for use for a subscription fee. Its functions include taking screenshots, acquiring credentials from browsers (Chrome, IE, and Edge), webcam access, audio recording, file transfer, collecting system and user information, stealing VPN certificates, and a keylogger. The email is sent from a compromised account at Friary Shoes and requests the potential victim to open the PDF, sign it, and return the signed copy. The “attachment” looks like a PDF icon, but is actually a linked JPG that points to the initial payload. The payload is a JAR file, requiring Java to run. Clicking on the “attachment” begins the download and execution process. Once running, Adwind connects to its command and control server. Information harvested from the infected system is sent back to the CnC servers. Popular anti-virus software and analysis tools are disabled by using taskkill.exe.
IP(s) / Hostname(s)
Malware Hash (MD5/SHA1/SH256)