Blackcat uses malicious WinSCP advertisement

The threat actors group named BlackCat (also known as ALPHV) has been observed using malvertising techniques, to distribute their malware via web pages spoofing the official website of WinSCP, a file transfer application.

According to observations made by the Trendmicro team, malicious actors have recently been abusing malvertising to distribute malware via websites masquerading as legitimate sites. In the specific case involved in this article, the website used by malicious actors is WinSCP, an open-source Windows file transfer application.

The use of advertising platforms by malicious actors to trick users is not a new practice, due to the widespread use of platforms such as Google Ads by companies to promote their applications in a better way. This is no different for WinSCP, with approximately 400,000 downloads per week.

The malicious group BlackCat has been using WinSCP-specific malvertisements in search engines such as Bing or Google. When the user searches for “WinSCP Download” the malicious advertisement is displayed to the user, who upon clicking on it is redirected to a website which displays a tutorial of the application in question.

Once the user is redirected to the website impersonating the original site, they will find a download button which will proceed to download an ISO file from an infected WordPress web page. The downloaded files are identified as “setup.exe” and “msi.dll” the former is the lure for the user to run and the latter is the malware dropper activated by the executable.

When the “setup.exe” file is executed, it calls the “msi.dll” file which extracts a Python folder from the RCDATA DLL section as would be the case in a genuine WinSCP installer. Between the two Python installations is a trojanized “python310.dll” file with the purpose of creating persistence on the compromised systems using an execution key named “Python” and the value “C:UsersPublicMusicpythonpythonw.exe”.

When the pythonw.exe executable starts, it loads a modified python320.dll which contains a Cobalt Strike beacon that starts a connection to the attackers’ command and control (C2) server. From here the main beacon module is obtained.

Next, multiple scheduled tasks are created on the compromised systems to maintain persistence on them. At the same time, once the Cobalt strike module is running on the system, the actions to be taken can be varied by running additional scripts to search for tools that allow lateral movement and allow the attacker to further compromise the system.

As observed by trendmicro researchers, the malicious group BlackCat makes use of some extra tools for the later phases of the attack, among these tools, we can highlight the ones listed below:

  • AdFind: Command-line tool used to retrieve Active Directory (AD) information.
  • PowerShell commands used to collect user data, extract ZIP files, and execute scripts.
  • AccessChk64: Command-line tool used for user and group permissions recognition.
  • Findstr: command line tool used to search for passwords within XML files.
  • PowerView: PowerSploit script used for AD recognition and enumeration.
  • Python scripts used to run the LaZagne password recovery tool and obtain Veeam credentials.
  • PsExec, BitsAdmin and Curl, used for lateral movement.
  • AnyDesk: legitimate remote management tool abused to maintain persistence.
  • KillAV BAT script used to disable or bypass anti-virus and anti-malware programs.
  • PuTTY secure copy client used to exfiltrate information collected from the compromised system.

It is worth mentioning the use, by the malicious group, of the anti-virus and anti-EDR detection tool called “Terminator”, a tool that, according to what is indicated in the Russian forums where it is traded, could bypass Windows security tools, through a BYOVD attack; with the purpose of manipulating the protection provided by the agents.

Recommendations

  • Implement an awareness and training program on phishing and its consequences, as well as its identification.
  • Implement a centralized logging system to collect and analyze logs from various network devices and systems.
  • Have defined normal network traffic for normal operations, to detect any alteration or abnormal behavior of the same.
  • Implement intrusion detection systems (IDS) to detect command and control activity, as well as any other potentially malicious network activity.
  • Do not click on suspicious links or advertisements and avoid visiting unsafe websites.
  • Use firewalls and content filtering to block access to known malicious websites and services.

IOC

SHA-256
Command and Control
25467df66778077cc387f4004f25aa20b1f9caec2e73b9928ec4fe57b6a2f63c167.88.164.141 = 91. C&C Server
4a4d20d107ee8e23ce1ebe387854a4bfe766fc99f359ed18b71d3e01cb158f4ahttps://167.88.164.40/python/pp2 = 91. C&C Server
13090722ba985bafcccfb83795ee19fd4ab9490af1368f0e7ea5565315c067fehttps://172.86.123.127:8443/work2z = 91. C&C Server
8859a09fdc94d7048289d2481ede4c98dc342c0a0629cbcef2b91af32d52acb5https://172.86.123.127:8443/work2
bacbe893b668a63490d2ad045a69b66c96dcacb500803c68a9de6cca944affefhttps://172.86.123.226:8443/work3z = 91. C&C Server
c7a5a4fb4f680974f3334f14e0349522502b9d5018ec9be42beec5fa8c1597fehttps://172.86.123.226:8443/work3
3ce4ed3c7bd97b84045bdcfc84d3772b4c3a29392a9a2eee9cc17d8a5e5403cehttps://193.42.32.58:8443/work2z = 91. C&C Server
21e7bcc03c607e69740a99d0e9ae8223486c73af50f4c399c8d30cce4d41e839https://193.42.32.58/python/pp
e5db80c01562808ef2ec1c4b8f3f033ac0ed758dhttps://193.42.32.58:8443/zakrep
cfbde85bdb62054b5b9eb4438c3837b9f1a69f61https://104.234.147.134/python/pp3.py = 91. C&C Server
3b14559a6e33fce120a905fde57ba6ed268a51f1http://45.12.253.50:447/work2
aae1b17891ec215a0e238f881be862b4f598e46chttps://45.66.230.240/python/pp3.py = 91. C&C Server
c82b28daeb33d94ae3cafbc52dbb801c4a5b8cfahttps://45.66.230.240:8443/work1
d2663fc6966c197073c7315264602b4c6ba9c192http://45.66.230.240/python/pp
c7568d00ae38b3a4691a413ed439a0e3fb5664b1https://firstclassbale.com/python/pp3.py = 91. C&C Server
61e41be7a9889472f648a5a3d0b0ab69e2e056c5
URLs acceded by Trojan.BAT.COBEACON.AO.dldr
69ffad6be67724b1c7e8f65e8816533a96667a36http://104.234.147.134/python/python.zip
c1516915431cb55703b5a88d94ef6de0ac67190ahttps://167.88.164.40/python/python.zip = 79. Disease Vector
a7b1853348346d5d56f4c33f313693a18b6af457http://172.86.123.226/python/python.zip = 79. Disease Vector
ac8e3146f41845a56584ce5e8e172a56d59aa804https://45.66.230.240/python/python.zip
e5d434dfa2634041cdbdac1dec58fcd49d629513https://closeyoueyes.com/python/python.zip
42da9e9e3152c1d995d8132674368da4be78bf6ahttps://firstclassbale.com/python/python.zip
5cbb6978c9d01c8a6ea65caccb451bf052ed2acdhttps://167.88.164.40/python/unzip.bat = 79. Disease Vector
a9310c3f039c4e2184848f0eb8e65672f9f11240http://172.86.123.226/python/unzip.bat = 79. Disease Vector
5e36a649c82fa41a600d51fe99f4aa8911b87828http://104.234.147.134/python/unzip.bat
5263a135f09185aa44f6b73d2f8160f56779706dhttps://45.66.230.240/python/unzip.bat
75d02e81cc326e6a0773bc11ffa6fa2f6fa5343ehttps://closeyoueyes.com/python/unzip.bat
9d85cb2c6f1fccc83217837a63600b673da1991ahttps://firstclassbale.com/python/unzip.bat
2f2eb89d3e6726c6c62d6153e2db1390b7ae7d01https://167.88.164.40/python/pp3.py = 79. Disease Vector
7d500a2cd8ea7e455ae1799cb4142bb2abac3ae1http://172.86.123.226/python/pp3.py = 79. Disease Vector
0362c710e4813020147f5520a780a15ef276e229ccloseyoueyes.com/python/pp3.py
fb2ef2305511035e1742f689fce928c424aa8b7dhttp:////bigallpack.com/union/desktop
7874d722a6dbaef9e5f9622d495f74957da358da
Distribution URLs
06e3f86369046856b56d47f45ea2f7cf8e240ac5https://cuororeresteadntno.com/how-to-work-with-ftp-ftps-connection-through-winscp/ = 78. Malware Accomplice
36b454592fc2b8556c2cb983c41af4d2d8398ea2https://airplexacrepair.com/the-key-to-secure-remote-desktop-connections-a-comprehensive-guide/ = 78. Malware Accomplice
337ca5eefe18025c6028d617ee76263279650484https://maker-events.com/automating-file-transfers-with-winscp/ = 78. Malware Accomplice
e862f106ed8e737549ed2daa95e5b8d53ed50f87
2a85cdfb1c3434d73ece7fe60d6d2d5c9b7667dd
d883be0ee79dec26ef8c04e0e2857a516cff050c
a0f1a8462cb9105660af2d4240e37a27b5a9afad
ab0eade9b8d24b09e32aa85f78a51b777861debc
0cc0e1cbf4923d2ce7179064c244fe138dcb3ce8
3789a218c966f175067242975e1cb44abdef81ec
83c5f8821f9a07e0318beaa4bcf0b7ef21127aa8
08f63693bb40504b71fe3e4e4d9e7142c011aeb1
b34bb1395199c7b168d9204833fdfd13d542706d
5c6aa1a5bd7572ac8e91eaa5c9d6096f302f775b
9480a79b0b6f164b1148c56f43f3d505ee0b7ef3
7874d722a6dbaef9e5f9622d495f74957da358da
9b1ebbe03949e0c16338595b1772befe276cd10d
801950ed376642e537466795f92b04e13a4fcc2a
1ca4e3fdcdf8a9ab095cfa0629750868eb955eb7
42920e4d15428d4e7a8f52ae703231bdf0aec241
06e3f86369046856b56d47f45ea2f7cf8e240ac5
f42e97901a1a3b87b4f326cb9e6cbdb98652d900
d125c4f82e0bbf369caf1be524250674a603435c
03d7bc24d828abaf1a237b3f418517fada8ae64f
c133992ea87f83366e4af5401a341365190df4e7
b35be51d727d8b6f8132850f0d044b838fec001d
fd84cf245f7a60c38ac7c92e36458c5ea4680809
946c0a0c613c8ac959d94bb2fd152c138fc752da
7b3051f8d09d53e7c5bc901262f5822f1999caae
eeff22b4a442293bf0f5ef05154e8d4c7a603005
2547d2deedc385f7557d5301c19413e1cbf58cf8
0437f84967de62d8959b89d28a56e40247b595d8
105d33c00847ccd0fb230f4a7457e8ab6fb035fc
5831b3a830690c603fd093329dce93b9a7e83ad3
a5c164b734a8b61d8af70257e23d16843a4c72e3
1aff9fd8fdc0eae3c09a3ee6b4df2cdb24306498
3d4051c65d1b5614af737cb72290ec15b71b75bd
a116ef48119c542a2d864f41dbbb66e18d5cd4e6
508e7522db24cca4913aeed8218975c539d3b0a4
72603dadebc12de4daf2e12d28059c4a3dcf60d0
930bd974a2d01393636fdb91ca9ac53256ff6690
a9a03d39705bd1d31563d7a513a170c99f724923
c14bd9ad77d8beca07fb17dc34f8a5f636e621b5
01b122eb0edb6274b3743458e375e34126fd2f9a
b98bb7b4c3b823527790cb62e26d14d34d3e499b
381058a5075ce06605350172e72c362786e8c5e3
75e9d507b1a1606a3647fe182c4ed3a153cecc2c
cd485054625ea8ec5cf1fe0e1f11ede2e23dde00
c9cdfdc45b04cca45b64fedca7c372f73b42cab2
31d4dadd11fe52024b1787a20b56700e7fd257f8
0fe306dc12ba6441ba2a5cab1b9d26638c292f9c
bc0fb6b220045f54d34331345d1302f9a00b3580
b4f59fe2ee3435b9292954d1c3ef7e74c233abea
aee0b252334b47a6e382ce2e01de9191de2e6a7a
92673b91d2c86309f321ade6a86f0c9e632346d8
de7fb8efa05ddf5f21a65e940717626b1c3d6cb4
5f455dcdca66df9041899708289950519971bb76
5ed1b9810ee12d2b9b358dd09c6822588bbb4a83
c779a4a98925bc2f7feac91c1867a3f955462fc2
cb358aa4ed50db8270f3ee7ea5848b8c16fa21fe
5ec6b30dacfced696c0145a373404e63763c2fa8
f2f5137c28416f76f9f4b131f85252f8273baee8
12534212c7d4b3e4262edc9dc2a82c98c2121d04
bc09ee8b42ac3f6107ab5b51a2581a9161e53925
152400be759355ec8dd622ec182c29ce316eabb1
379e497d0574fd4e612339440b603f380093655c
141c7b9be4445c1aad70ec35ae3fe02f5f8d37ac
27e9e6a54d73dcb28b5c7dfb4e2e05aaba913995
ad981cd18f58e12db7c9da661181f6eb9a1754f3
4829eaa38bd061773ceefe175938a2c0d75a75f3
b0d61d1eba9ebf6b7eabcd62b70936d1a343178e
014c277113c4b8c4605cb91b29302cdedbc2044e

Related Post