New DEEP#GOSU Malware Campaign Targets Windows Users with Advanced Tactics

-

Malware

A brand new elaborate assault marketing campaign has been noticed using PowerShell and VBScript malware to contaminate Home windows programs and harvest delicate data.

Cybersecurity firm Securonix, which dubbed the marketing campaign DEEP#GOSU, mentioned it is possible related to the North Korean state-sponsored group tracked as Kimsuky.

“The malware payloads used within the DEEP#GOSU signify a complicated, multi-stage menace designed to function stealthily on Home windows programs particularly from a network-monitoring standpoint,” safety researchers Den Iuzvyk, Tim Peck, and Oleg Kolesnikov mentioned in a technical evaluation shared with The Hacker Information.

“Its capabilities included keylogging, clipboard monitoring, dynamic payload execution, and information exfiltration, and persistence utilizing each RAT software program for full distant entry, scheduled duties in addition to self-executing PowerShell scripts utilizing jobs.”

A notable side of the an infection process is that it leverages authentic companies akin to Dropbox or Google Docs for command-and-control (C2), thus permitting the menace actor to mix undetected into common community site visitors.

On high of that, using such cloud companies to stage the payloads permits for updating the performance of the malware or delivering further modules.

The place to begin is claimed to be a malicious e mail attachment containing a ZIP archive with a rogue shortcut file (.LNK) that masquerades as a PDF file (“IMG_20240214_0001.pdf.lnk”).

The .LNK file comes embedded with a PowerShell script in addition to a decoy PDF doc, with the previous additionally reaching out to an actor-controlled Dropbox infrastructure to retrieve and execute one other PowerShell script (“ps.bin”).

The second-stage PowerShell script, for its half, fetches a brand new file from Dropbox (“r_enc.bin”), a .NET meeting file in binary type that is really an open-source distant entry trojan referred to as TruRat (aka TutRat or C# RAT) with capabilities to document keystrokes, handle information, and facilitate distant management.

It is price noting that Kimsuky has employed TruRat in at the very least two campaigns uncovered by the AhnLab Safety Intelligence Middle (ASEC) final 12 months.

Additionally retrieved by the PowerShell script from Dropbox is a VBScript (“info_sc.txt”), which, in flip, is designed to run arbitrary VBScript code retrieved from the cloud storage service, together with a PowerShell script (“w568232.ps12x”).

The VBScript can be designed to make use of Home windows Administration Instrumentation (WMI) to execute instructions on the system, and arrange scheduled duties on the system for persistence.

Malware

One other noteworthy side of the VBScript is using Google Docs to dynamically retrieve configuration information for the Dropbox connection, permitting the menace actor to vary the account data with out having to change the script itself.

The PowerShell script downloaded because of this is supplied to assemble intensive details about the system and exfiltrate the small print by way of a POST request to Dropbox.

“The aim of this script seems to be designed to function a device for periodic communication with a command-and-control (C2) server by way of Dropbox,” the researchers mentioned. “Its primary functions embrace encrypting and exfiltrating or downloading information.”

In different phrases, it acts as a backdoor to regulate the compromised hosts and constantly maintain a log of person exercise, together with keystrokes, clipboard content material, and the foreground window.

The event comes as safety researcher Ovi Liber detailed North Korea-linked ScarCruft’s embedding of malicious code inside Hangul Phrase Processor (HWP) lure paperwork current in phishing emails to distribute malware like RokRAT.

Malware

“The e-mail incorporates a HWP Doc which has an embedded OLE object within the type of a BAT script,” Liber mentioned. “As soon as the person clicks on the OLE object, the BAT script executes which in flip creates a PowerShell-based reflective DLL injection assault on the victims machine.”

It additionally follows Andariel’s exploitation of a authentic distant desktop answer referred to as MeshAgent to put in malware like AndarLoader and ModeLoader, a JavaScript malware meant for command execution.

“That is the primary confirmed use of a MeshAgent by the Andariel group,” ASEC mentioned. “The Andariel Group has been constantly abusing the asset administration options of home firms to distribute malware within the technique of lateral motion, beginning with Innorix Agent prior to now.”

Andariel, additionally recognized by the names Nicket Hyatt or Silent Chollima, is a sub-cluster of the infamous Lazarus Group, actively orchestrating assaults for each cyber espionage and monetary achieve.

The prolific state-sponsored menace actor has since been noticed laundering a piece of the crypto belongings stolen from the hack of crypto change HTX and its cross-chain bridge (aka HECO Bridge) by Twister Money. The breach led to the theft of $112.5 million in cryptocurrency in November 2023.

“Following frequent crypto-laundering patterns, the stolen tokens had been instantly swapped for ETH, utilizing decentralized exchanges,” Elliptic mentioned. “The stolen funds then lay dormant till March 13, 2024, when the stolen crypto belongings started to be despatched by Twister Money.”

The blockchain analytics agency mentioned that Twister Money’s continuation of its operations regardless of sanctions have possible made it a gorgeous proposition for the Lazarus Group to hide its transaction path following the shutdown of Sinbad in November 2023.

“The mixer operates by good contracts working on decentralized blockchains, so it can’t be seized and shut down in the identical approach that centralized mixers akin to Sinbad.io have been,” it famous.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

ULTIMI POST

Most popular