1. Overview
On March 17, Waseda University announced that its sports newspaper club's website(https://wasedasports[.]com/) had been infected with malware. At the time of my research the final payload was common malware called BitRAT, but there are several interesting points in its infection chain.
A portion of the infection chain is shown below. The compromised site finally trigger download of the zip file. There is nothing interesting about the infection chain after this. You can refer to the IoC section for more information on infecting malware if necessary.
Now, what is interesting? In my opinion, the interesting points of this attack are as follows.
・Using Domen social engineering toolkit: This toolkit was used around 2019-2020, but not recently.
・Mysteriously structured zip file: The file name in this zip file is depending on the archiver used for decompression.
2. Domen social engineering toolkit
Domen is social engineering toolkit and was used for fake update campaigns. This leads target to install malware as an update to their browser or Flash Player. For more details, Malwarebytes has written an excellent article.
https://www.malwarebytes.com/blog/news/2019/09/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns
In fact, fake update is now a common web threat and is not unusual. However, Domen is tool that has not been reported for about the last 4 years. In short, the use of Domen is interesting, but it appears that little has changed. The snippet of Domen code is shown below.
The font version and useragent blacklist have not changed at all. But the browser version to be displayed is slightly different. The browser version was only changed to 123 for the major version, and the minor version remained the same. That makes sense because 123 is the latest version of Chromium and Firefox.
The destination of the communication that take place when the compromised site is accessed are shown below. The pattern "/admin/target" is still the same as the old Domen. The pattern "/admin/target?secret=" can be used for hunting.
However, testdomen.xyz was not assigned IP address in this attack. It is possible that the name testdomen indicates that the attacker was testing Domen.
3. Mysteriously structured zip file
The Browser_Update.zip downloaded by Domen had two interesting points.
The first interesting point is that the name of the unzipped file changes depending on the archiver. This zip file contains "Browser Update.txt" or "Browser Update.js". Why does this happen?
My first idea was the Double Loaded Zip File presented by Trustware. Therefore I opened this file with 010Editor.
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/double-loaded-zip-file-delivers-nanocore/
Different file names are recorded in the local fiel record and central directory record. The zip file records the name of the stored file in two locations. Therefore, the name of the unzipped file change depending on which the archiver refers to as the file name. Antivirus products that change the way they scan by extension may miss this file due to the built-in archiver.
The second interesting point is the difference between the extension in the archiver's view and the extension that is unzipped.
When this file is opened with WinRAR, it appears to contain js file. However, the icon indicates that this file is not js file.
The reason for this is simple! Because the filename contains a trailing space, it recognizes the extension of this file as ".js ".
Then why does the unzipped file have ".js" extension? This is because trailing spaces in filenames are removed by RtlGetFullPathName_Ustr function, which is called in CreateFileW function. (CreateFileW -> CreateFileInternal -> RtlDosPathNameToRelativeNtPathName_U_WithStatus -> RtlpDosPathNameToRelativeNtPathName -> RtlGetFullPathName_Ustr)
This technique also appears to be aimed at deceiving the antivirus about the extension. In conclusion, this file looks like the following table
Archiver | View file | Extract file |
Explorer | 「Browser Update.js 」 | 「Browser Update.js」 |
WinRAR | 「Browser Update.js 」 | 「Browser Update.js」 |
7-Zip 15.05 | 「Browser Update.txt」 | 「Browser Update.txt」 |
7-Zip 24.01 | 「Browser Update.js 」 | 「Browser Update.js_」 |
By the way, there is one more interesting. The overlay area of this file contained RAR data. The contents are harmless data, so perhaps this is some kind of trick.
4. IoC
IoC | Description |
https://www.qama[.]fr/cache/jquery.js | Malicious Javascript |
https://0x80[.]info/o | Domen Javascript |
http://193.233.132[.]136/a/z.png | Malicious Powershell code |
http://193.233.132[.]136/a/0x.png | Malicious VBS code |
http://193.233.132[.]136/a/a.png | Powershell payload with BitRAT |
193.233.132[.]136:4404 | BitRAT C2 |
1669f175d53dd4afca317bccac9bc4880d267773e0dc6b5aac2a2469f6fc5a2c | Browser_Update.zip SHA256 hash |
Comments
Post a Comment