17.9 C
New York
Thursday, June 13, 2024

Coronavirus-themed Marketing campaign delivers Agent Tesla Malware


Whereas the entire world fights in opposition to the COVID-19 pandemic, cybercriminals are busy exploiting the scenario and attacking weak customers & companies. In the previous couple of weeks, there was an increase in coronavirus-themed malspams, that are getting used to ship a wide range of malware. At Fast Heal Safety Labs, we’ve got noticed Agent Tesla being delivered via such campaigns — the principle motive of those campaigns is to steal delicate knowledge by capturing keystrokes, taking screenshots, & dumping browser passwords, and many others.

Marketing campaign Particulars: We now have noticed a wide range of coronavirus-themed Agent Tesla Campaigns. Under are completely different classes:
• Exploiting MS workplace vulnerability CVE-2017-11882
• Exploiting MS workplace vulnerability CVE-2017-8570
• Archives with double extension executable (ZIP, RAR and many others.)

Variant 1 – Technical Particulars

A sufferer receives a phishing mail with an attachment titled as “COVID 19 NEW ORDER FACE MASKS.doc.rtf “. This doc is an RTF file that exploits CVE-2017-11882 which is a stack-based buffer overflow vulnerability current within the Microsoft Equation editor instrument. This vulnerability permits the attacker to run arbitrary code and after profitable exploitation to ship the Agent Tesla payload. This dropped payload performs code injection in recognized home windows course of RegAsm.exe. The injected code in RegAsm.exe performs all info-stealing exercise and sends it to the CnC server.

Attack Chain

Fig. 1 Assault Chain

The RTF file is extremely obfuscated with a number of invalid management phrases and whitespaces. After deobfuscating file, the next API calls are current on this file.

Fig. 2 Shellcode in RTF file

Fig. 2 Shellcode in RTF file

Fig.3 Shellcode in RTF file

Fig.3 Shellcode in RTF file

Payload Evaluation: The .NET payload is downloaded from CVE-2017-11882 exploit. When the execution begins, it begins decrypting the useful resource part the place the malicious code is saved. Utilizing the process-injection methodology, it injects its code to a real Microsoft file, RegAsm.exe to bypasses safety merchandise. The aim of this payload is to steal delicate knowledge, log person keys and to ship this knowledge to the SMTP server.

 Variant 2 – Technical Particulars

A sufferer receives a phishing mail with an attachment titled as “COVID-19 SUSPECTED AFFECTED VESSEL.doc” OR “COVID-19 measures for FAIRCHEM STEED, Voyage (219152).doc”. This doc is an RTF file containing OLE2Link object to use CVE-2017-8570. This vulnerability triggers the execution of scripts with out person interplay. After profitable exploitation, winword.exe course of drops embedded .sct file and executes it. The .sct file comprises code as proven beneath, which executes PowerShell.exe to obtain and execute payload from a distant server.

Fig. 4 Attack Chain

Fig. 4 Assault Chain

The composite moniker (C6AFABEC197FD211978E0000F8757E2A) is current within the RTF file to execute a .sct file on the sufferer’s machine. Because of the improper dealing with of objects in reminiscence, workplace utility drops and efficiently executes scriptlet file(.sct) which ends up in the execution of malicious code current within the .sct file.

Fig.5 Moniker CLSID and dropped location of .sct file

Fig.5 Moniker CLSID and dropped location of .sct file

The next determine exhibits the code —  the .sct file comprises obfuscated PowerShell code.

Fig.6 Obfuscated .sct file

Fig.6 Obfuscated .sct file

Payload Evaluation: The .NET payload is downloaded by the above CVE-2017-8750 exploit. When execution begins, it checks for an personal occasion, and if discovered, it throws an exception and terminates itself. If not discovered, it begins decrypting the useful resource part the place the malicious dll is saved. Self-injection methodology is used to inject a dll in an personal file. When a brand new occasion of self-process will get began, it drops a shortcut (.lnk) file at startup to determine persistence and modifications the attributes of personal file to hidden. The aim of this payload is to steal delicate knowledge, log person keys and ship knowledge to the SMTP server.

Variant 3 – Technical Particulars

A sufferer receives a phishing mail that carries archived attachments of various sorts like ZIP, RAR, and many others. with a reputation equivalent to “COVID-19 Provider Discover.zip”. This malicious archived attachment will then extract  AutoIT-compiled model of Agent Tesla malware with a reputation equivalent to “COVID-19 Provider Discover.jpg.exe”. When this payload begins, it performs code injection in a recognized Home windows course of, RegAsm.exe. —  after the profitable execution, the payload begins the info-stealing exercise.

FIg. 7 Attack Chain

FIg. 7 Assault Chain

Payload Evaluation: When the execution is began, it creates a .URL file at startup location which comprises a hyperlink to a .VBS file dropped at ‘srdelayed’ location. The self-copy in ‘srdelayed’ folder is created on the similar location from the place file execution has begun. It begins decrypting useful resource part the place the precise malicious code is saved. Right here, AutoIt useful resource part comprises .NET code and utilizing Course of-injection methodology, it injects its code to Microsoft real file RegAsm.exe, additionally a .NET file. The aim of this payload is to steal delicate knowledge, log person keys and carry out knowledge exfiltration over SMTP.

Ultimate Stage Payload Evaluation:

Under is the evaluation of the primary variant which is similar to the opposite two variants.

The malicious code is saved within the useful resource part of the binary.

Fig. 8 Resource Section

Fig. 8 Useful resource Part

After knowledge decryption in reminiscence, dll will get loaded and it once more begins to decrypt a last malicious code in reminiscence which additional injects into self or in a RegAsm.exe course of.

Fig. 9 Decryption of .NET code

Fig. 9 Decryption of .NET code

After self-injection of this decrypted code, it begins gathering system data like Username, Computername, OSFullName and different primary data. It additionally begins to steal the info from browsers. It has as much as 25 hardcoded lists of browsers together with their path out of which few are as talked about beneath –

Fig. 10 Browser Lists

Fig. 10 Browser Lists

It additionally has a listing of e-mail purchasers together with their paths from the place it steals e-mail knowledge and sends to its CnC Server.

The payload can seize the screenshots of the present window in a JPG format with a while interval.  The captured picture because the one seen beneath is distributed to the e-mail server by creating an SMTP consumer.

Fig. 11 SMTP client details

Fig. 11 SMTP consumer particulars

The picture is distributed to 1 hardcoded e-mail ID, ‘amani@planetships.web’ with topic title as SC_<username>  with a message physique containing the knowledge of sufferer’s system and the captured picture as an attachment.

Copying knowledge from the clipboard is one other performance of this payload — it shops all of the copied knowledge in an array.

Fig. 12 Getting a copy of the clipboard data

Fig. 12 Getting a replica of the clipboard knowledge

Keylogging exercise is current on this payload — it first checks for the keyboard structure submit which it captures all of the keyboard occasions.

Fig. 13 Getting the details of the keyboard keys

Fig. 13 Getting the small print of the keyboard keys

Safety by Fast Heal

Our superior signature-less Habits-Based mostly detection efficiently blocks all recognized Agent Tesla variants.

 

Conclusion

Actors behind these campaigns are capitalizing on the worldwide Coronavirus panic to distribute Agent Tesla malware and steal delicate person data. Fast Heal advises customers to train ample warning and keep away from opening attachments & clicking on internet hyperlinks in unsolicited emails. Customers also needs to preserve their Working System up to date and have a full-fledged safety resolution put in on all units

Fast Heal’s analysis crew is proactively monitoring all campaigns associated to COVID-19 and dealing relentlessly to make sure the security of our clients

 

MITRE ATT&CK TIDs

Tactic Method
Preliminary Entry Spearphishing Attachment
Preliminary Entry Spearphishing Hyperlink
Execution Execution via API
Execution Exploitation for Shopper Execution
Execution PowerShell
Execution Scripting
Persistence Registry Run Keys / Startup Folder
Defence Evasion Obfuscated Recordsdata or Info
Defence Evasion Course of Hollowing
Defence Evasion Scripting
Credential Entry Credential Dumping
Credential Entry Credentials in Recordsdata
Discovery Question Registry
Discovery System Info Discovery
Assortment Clipboard Knowledge
Assortment Enter Seize
Assortment Display screen Seize
Command And Management Distant File Copy
Command And Management Commonplace Software Layer Protocol
Exfiltration Exfiltration Over Various Protocol

 

IOCs:

527142E25A8229D1DC910AF23CDB5256 (DOC)

C1B04A9474CA64466AD4327546C20EFC (DOC)

F1E95D1E23A582E4EF8B19E55E21D40E (PE)

6D5ED323EF55F7BD34BC193DDC8AFE74 (PE)

C3166A86DBF5B6A95FC723EF639DAD45 (PE)

5[.]189[.]132[.]254

107[.]189[.]7[.]179

 

Topic Matter Professional:

  • Aniruddha Dolas
  • Pavankumar Chaudhari
  • Bajrang Mane

Aniruddha Dolas



Supply hyperlink

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles