By Thoufique Haq & Aleksey Fn
Proofpoint researchers recently observed a campaign targeting telecom and military in Russia. Beginning in July 2015 (and possibly earlier), the attack continued into August and is currently ongoing. As a part of this campaign, we also observed attacks on Russian-speaking financial analysts working at global financial firms and covering telecom corporations in Russia, likely a result of collateral damage caused by the attackers targeting tactics.
The attacks employed PlugX malware, a Remote Access Trojan (RAT) widely used in targeted attacks. Proofpoint is tracking this attacker, believed to operate out of China, as TA459 . This same attacker is also reported to have targeted various military installations in Central Asia in the past [1]. While the current campaign from this attacker has been active for a couple of months, there is evidence of activity by this attacker as far back as 2013, employing other backdoors such as Saker, Netbot and DarkStRat .
The attacks seen in the current campaign involved spear-phishing emails that employ both exploit-laden Microsoft Word document attachments, as well as links leading to RAR archives. The email contents, filenames and decoy are all usually in Russian.
PlugX Malware Analysis
1. PlugX Campaign Details: Attachments
The Microsoft Word document attachments observed in this campaign utilized CVE-2012-0158 to exploit the client and implant the PlugX RAT. For example, the attachment LTE-2600.doc (SHA: 6ea86b944c8b5a9b02adc7aac80e0f33217b28103b70153710c1f6da76e36081) was sent to financial analysts covering the telecom industry with the email Subject “Проект бизнес-плана” (“Project business-plan”). The attachment name is suited to the targets because “LTE” is a telecom term referring to Long-Term Evolution networks, typically used to describe 4G networks.
Inspection of the document exploit employing CVE-2012-0158 also revealed that it was crafted using a builder tool, which can be seen in various artifacts visible in the document properties. (Fig.1) However, it should be noted that we do not believe that this builder is exclusively used by this attacker and is likely shared among multiple threat actor groups.
Figure 1: Builder artifacts in exploit document
2. Campaign Details: URLs
As a part of this PlugX campaign, the attackers also sent spear-phishing emails with URLs to RAR archive files hosted on fake domains registered for this campaign. An interesting fact that shines some light on the social engineering tradecraft used by the group is that these domain names as well as payload file names were not chosen at random, as is often the case, but were instead chosen to fit the specific lure.
For example, the RAR archive hosted on www.forum-mil[.]net/news/2015-08-03-3001.rar contained the executable file "Воздушно-космические силы России заступили на боевое дежурство.exe” (“Aerospace Russian forces step up military duty.exe”). Additional searching uncovered a news article with this title on a legitimate Russian-language news site: http://www.forum-mil.ru/news/vozdushno_kosmicheskie_sily_rossii_zastupili_na_boevoe_dezhurstvo/2015-08-03-3001: the malicious executable borrowed the name from the article title, and the site to host the malware mimics the site that hosts the news article.
In another example, the news article http://tvzvezda.ru/news/forces/content/201508191459-88tq.htm was used as the basis for registering the payload hosting site www[.]tvzvezda[.]net/news/forces/content/201508181025.rar. Again, the title of the article was used as the name for the executable inside the RAR archive, and it appears that many of these lures were created in a similar fashion. Specifically, the actor starts with an article describing a military-related event and then registers a payload site and names the malware file. Table 1 shows the full list of payload domains and sites they mimic. (A list of the payload URLs can be found in the Indicators of Compromise section at the end of this post.)
Infection Site | Registrant Email | Legitimate Site Mimicked |
---|---|---|
arms-expo[.]net | gengd@gmail.com | arms-expo[.]ru (Russian information agency on weapons) |
forum-mil[.]net | gengd@gmail.com | foru-mil[.]ru (Forum of the Ministry of Defense of Russian Federation) |
tvzvezda[.]net | hsdf@gmail.com | tvzvezda.ru (TV network run by Russian Ministry of Defense) |
rusarmy[.]net | dolphin@yahoo.com | rusarmy[.]com (Russian army and its weapons forum) |
patriotp[.]com | dolphin@yahoo.com | patriotp[.]ru (Russian military patriot recreation park) |
militarynewes[.]com | gjklsdf@gmail.com | militarynews[.]com (US military news portal) |
Table 1: Details on domains hosting malicious RAR-archived PlugX executables
All the infection domains and command and control (C2) domains were registered using the same registrar in Beijing: “Shanghai Meicheng Technology Information Development Co., Ltd.”. Other than the emails, the information used for registration was randomized.
The RAR archives hosted on fake domains contained RAR SFX (self-extracting executable) packaged executables which drop and load PlugX. Proofpoint researchers observed the following filenames being used for executables in the campaign:
|
Table 2: Filenames of executables inside RAR archives
2.1. Decoy Content and Sandbox Evasion
Interestingly, one of the RAR SFX droppers (SHA: 71be8bb45dfe360ee6076ed34fde12a382fe9d7922bd11b179ca773be12fa54c) launches a decoy Microsoft Word document before launching the executable. (Fig 2) The contents of this decoy document reference the “Tsar Bomba” nuclear test from the Cold War era and have been directly lifted from a Russian site.
Figure 2: Contents of decoy document referencing “Tsar Bomba”
In addition to displaying something potentially relevant to the recipient’s interests, the PlugX payload is not executed by the RAR SXF until the victim closes the decoy Word document, seen in the past as a sandbox evasion technique wherein the payload is not executed until the decoy document is closed. As a result, the actual payload may never execute in malware sandbox environments unless the sandbox is configured to simulate the action of a user closing the decoy document. The SFX script for this document (Fig. 3) appears to have been created with a Chinese language pack version of WinRAR. The decoy document “1.doc” is executed first and waits until it is closed before launching “0810.exe”. This effect can be easily achieved in WinRAR by setting the “Wait and return exit code” option when creating the SFX archive.
Figure 3: RAR SFX script
3. PlugX Implant
The attachment and email campaigns both employed DLL side-loading techniques to load the PlugX payload. All of the payloads used the same clean signed executable “fsguidll.exe”, masquerading as the F-secure GUI component, to sideload “fslapi.dll” which in turn unpacks code from “fslapi.dll.gui”.
Figure 4: DLL sideloading masquerading as the F-secure GUI component
The variant of PlugX used is the P2P version that was described by JPCert [2]. A sample configuration extracted using the volatility script from Arbor [3] is shown below.
PlugX Config (0x36a4 bytes): Hide Dll: -1 Keylogger: -1 Sleep1: 167772160 Sleep2: 0 Cnc: www.pressmil[.]com:80 (HTTP / UDP) Cnc: www.pressmil[.]com:80 (TCP / HTTP) Cnc: www.pressmil[.]com:80 (UDP) Cnc: www.pressmil[.]com:443 (HTTP / UDP) Cnc: www.pressmil[.]com:443 (TCP / HTTP) Cnc: www.pressmil[.]com:443 (UDP) Cnc: www.pressmil[.]com:53 (HTTP / UDP) Cnc: www.pressmil[.]com:53 (UDP) Cnc: www.pressmil[.]com:53 (TCP / HTTP) Cnc: www.pressmil[.]com:995 (HTTP / UDP) Cnc: www.pressmil[.]com:995 (TCP / HTTP) Cnc: www.pressmil[.]com:995 (UDP) Persistence: Service + Run Key Install Folder: %AUTO%\ucP Service Name: sWtDmsuBTyMK Service Display Name: sWtDmsuBTyMK Service Desc: Windows sWtDmsuBTyMK Service Reg Hive: HKCU Reg Key: Software\Microsoft\Windows\CurrentVersion\Run Reg Value: gGIHBgytn Injection: 1 Inject Process: %ProgramFiles(x86)%\Windows Media Player\wmplayer.exe Inject Process: %windir%\system32\winlogon.exe Inject Process: %windir%\explorer.exe Inject Process: %windir%\system32\svchost.exe Uac Bypass Injection: 1 Uac Bypass Inject: %windir%\system32\msiexec.exe Uac Bypass Inject: %windir%\system32\rundll32.exe Uac Bypass Inject: %windir%\explorer.exe Uac Bypass Inject: %windir%\system32\dllhost.exe Plugx Auth Str: TEST Cnc Auth Str: LLL-0808 Mutex: Global\IUNJCCvywXlrisLlcBhqGm Screenshots: 0 Screenshots Sec: 10 Screenshots Zoom: 50 Screenshots Bits: 16 Screenshots Qual: 50 Screenshots Keep: 3 Screenshot Folder: %AUTO%\FS\screen Enable Tcp P2P: 1 Tcp P2P Port: 1357 Enable Udp P2P: 1 Udp P2P Port: 1357 Enable Icmp P2P: 1 Icmp P2P Port: 1357 Enable Ipproto P2P: 1 Ipproto P2P Port: 1357 Enable P2P Scan: 1 P2P Start Scan1: 0.0.0.0 P2P Start Scan2: 0.0.0.0 P2P Start Scan3: 0.0.0.0 P2P Start Scan4: 0.0.0.0 P2P End Scan1: 0.0.0.0 P2P End Scan2: 0.0.0.0 P2P End Scan3: 0.0.0.0 P2P End Scan4: 0.0.0.0 Mac Disable: 00:00:00:00:00:00
Many of the samples used the string “EEEEEE” for authentication of the C2 communication, which is likely the default value. Other observed values include “LLL-0808”, “0abcde”, and “niii-0701”.
4. Command and Control Infrastructure
We observed pressmil[.]com and notebookhk[.]net being used as the C2 servers for this specific campaign. Over the duration of the campaign both of these domains pointed to the same infrastructure on the IP address “43.252.175.119” in Hong Kong. This IP infrastructure has been actively used by this attacker as early as 2014-12-04. The other domains also registered to point to this same IP address include “fedpress[.]net” and “dicemention[.]com”, which have been observed at use in past campaigns.
In addition, the C2 server notebookhk[.]net pointed to 123.254.104.50 multiple times between 2013-08-23 and 2014-09-29. Similarly dicemention[.]com pointed to this IP multiple times between 2013-12-05 and 2014-09-28. There were multiple domains that used this same IP infrastructure 123.254.104.50 in the past such as
business-isa.mynetav[.]org
business-rsa.onmypc[.]org
blacktan[.]cn
dicemention[.]com
leeghost[.]com
notebookhk[.]net
When investigating 123.254.104.50 we discovered additional, older payloads clustering in to three different malware families. These additional malware families used by this attacker in the past were Saker, Netbot and DarkStRat. Researchers at ESET also reported and documented the usage of DarkStRat by this attacker [1].
44.1. Related Malware: Saker (aka XBox) implant
The samples from the Saker cluster exhibited clues that also point to a Russian military attack nexus. For example, the file “zamysel praticteskih dejstvi voisk.scr” (SHA: 556e7e944939929ca4d9ca6c54d9059edf97642ece1d84363f2d46e2e8ca72ae), translates to “plan of army practice maneuvers.scr”. It was also similarly packaged in a RAR archive, and on execution it drops and loads a DLL file “icwnet.dll” (SHA: 1a789568a53c18dab21c9c0386c746878cf8458e3369f0dc36a285fe296f3be3) which contains the exports “ServiceMain” and “JustTempFun”. The malware makes the following beacon to a remote server:
GET /30106C07000038FE0F00<removed>00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000<removed>0000000000000000000000000000000000000000000000000000000000000000000000 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322) Host: www.leeghost.com:1037 Cache-Control: no-cache
This backdoor has been analyzed extensively in the past [4] and provides the attacker a range of functionality, including file manager (enumerate, create, copy, move, delete); the ability to download and run secondary payloads; and deleting all traces of itself and shutting down.
4.2. Related Malware: Netbot (aka TornRat) Implant
When an example payload (SHA: 277fe4dab731149f3d40630f2f8b25092b007c701f04b5304d3ba9570280d015) from this cluster is detonated, it drops and loads a DLL file “taskhost.dll” (SHA: dd9d31c3acb4299619c2251698024da1ac9ec42280aa6c16cd2369907f3be4e3). The malware sends an initial beacon to its C2 server (Fig. 5), which matches the TornRAT network signature previously published by CrowdStrike [5].
Figure 5: Netbot network beacon
The scheme used to encrypt the beacon is a byte XOR with 0x3f followed by an addition with 0x3f. The encrypted beacon contains hostname, system memory, OS information and infection timestamp. (Fig. 6)
Figure 6: Netbot network beacon decoded
Samples from this cluster were found creating the following mutexes.
Winlogin Running!
Netbot2012 Is Running!
NetBotServer Is Running!
It is worth noting that there is similarity in mutex naming scheme to another malware family called NetTraveler (aka Travnet). Netbot is a backdoor and has commands to support features similar noted above for Saker, such as file manager (enumerate, create, copy, move, delete), ability to download and execute secondary payloads; and deleting all traces of itself.
4.3. Related Malware: DarkStRat implant
When an example payload (SHA: b38aa09a2334e11a73ef9a926694f2054789934daa38afeb8d00bce6949b6c4c) from this cluster is detonated it drops and runs an executable file “netlink.exe” (SHA: b38aa09a2334e11a73ef9a926694f2054789934daa38afeb8d00bce6949b6c4c). The RAT sends the string "ok\n" following initial beacon to a remote server. A configuration file “netsetting.ini” is also written to disk with the following contents:
[Option] HostPort=443 HostName=www.dicemention.com
DarkStRat is a full-fledged RAT written in Delphi with an array of features such as file manager, process manager, registry manager, service manager, downloading and running secondary payloads and deleting all traces of itself.
As also noted by the ESET researchers [1], the strings in this RAT strangely show Spanish language origins, albeit with some Chinese connections. The source code for this RAT is hosted on google code with the name “DarkStRat 2008 1.0开源.rar”. The string “开源.” in the name translates to “Open Source”. Various parts of the source code also have strings in Chinese and reference “darkst[.]com” and “fsg2[.]cn”. The owner of this Google-hosted code project is listed as darkteam...@gmail.com. As a result, it can be inferred that code from a Spanish RAT was repurposed by malware author with Chinese origins and marketed as DarkStRat, but as is often the case we should caution against a definitive attribution based solely on characteristics such as language and C2 server locations.
5. PlugX Malware Campaign Conclusion
A detailed examination of this operation reveals an adversary who demonstrates a keen interest in Russian telecom and military sectors, indicative of an actor with geopolitical motives. The attacker adapts and evolves their Tactics, Techniques and Procedures (TTPs) over time as the situation demands. While the attacker appears to do very little to hide their tracks, they remain highly determined and persistent and have carried out attacks through a sustained operation spanning at least two years, and possibly longer. The attacker also invests time to research the locale and current events relevant to their targets and then leverages this in their targeting tactics. Attacks such as these have become a constant occurrence given the covert nature of digital attacks and easy access to targeting information online.
As this threat shows, attackers continue to employ increasingly sophisticated techniques against new targets in order to uncover and steal sensitive information. Organizations need to recognize that they cannot rely on traditional antivirus and anti-spam solutions to detect and stop these advanced threats. In order to combat targeted attacks, organizations should adopt next-generation solutions that make it possible to identify and respond to sophisticated targeted attacks by correlating advanced detection with threat intelligence about actor TTPs and global views of threat traffic, including IOCs that enable response teams to quickly detect and mitigate compromises. Moreover, a multi-layer approach is essential, with email security representing the logical starting point for an advanced threat defense: like this targeted attack, email remains the vector-of-choice for penetrating target organizations and delivering these sophisticated payloads.
Indicators of Compromise (IOCs)
PlugX Infection URLs:
[hxxp://www.arms-expo[.]net/news/content/387206.rar]
[hxxp://arms-expo[.]net/news/content/day_2015-08-20.rar]
[hxxp://arms-expo[.]net/news/samaia_mochnaia_iagernaia_bomba_v_istorii.rar]
[hxxp://www.arms-expo[.]net/news/content/20150818.rar]
[hxxp://www.tvzvezda[.]net/news/forces/content/201508181025.rar]
[hxxp://www.arms-expo[.]net/news/content/20150818.zip]
[hxxp://www.arms-expo[.]net/news/content/Day_2015-08-20.rar]
[hxxp://www.arms-expo[.]net/news/content/VTC.rar]
[hxxp://www.rusarmy[.]net/forum/vvs/modernizirovanoj.rar]
[hxxp://www.rusarmy[.]net/forum/threads/sostojanie-krejserov-proekta-1144.9.rar]
[hxxp://www.forum-mil[.]net/news/2015-08-03-3001.rar]
[hxxp://www.militarynewes[.]com/news/11.08.2015.rar]
PlugX hashes (SHA256):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 hashes (SHA256):
556e7e944939929ca4d9ca6c54d9059edf97642ece1d84363f2d46e2e8ca72ae
0d2600d978f5c1042e93b701654db080aac144dfa2877844334b1d4cd78f4a1d
2a6dee57cb302a1350ade4a33f40a77c1952cf2e6b29d1be8400c13927e34670
383c5d22c1de3aae7684eb5a7d87d6b553f09f166ca402894c5deecabaa7d866
53d29782b8c325c2ff62493cdb261a8e54e45ed04880527e75e8e211b4d8d861
5d97ec30c481e00d4285246b528745f331be905f453e062bd9c2d506e9386f0e
664f80b427bf0145e62f6f90cb4833c30cfb8dc4b2d68746aa01420da82bd8af
6dc560a3b20a6e95552254bdb04fba03f74223a83a58436a3decfab74abc5fb5
a2f4aa2d25bff21e73b15065e2fc38d297ee14253044a66d00690b1bb23fc373
c7d7211d1fea69ea6a9697a8f8d21ac40f6d7dc6863708b9a98930271a156c86
d2a5cf434e8a0c63c23e6a3e5cf8a60f259099a706d2d243ffa5c7dbd46fd9d4
d6ff406da6e9a20074c3e1228ab04d35a3839b1719d3cafbb21ad3e3b6d03ef4
df4571b7d3be63de8338e6905b2689309ed5cce88d57a8db0c7b9aebf713d81c
ed7771339794c7908865f7816513b593369a93c98b39f58ebaaa98f3f0067e9d
Netbot hashes (SHA256):
4524ede160d5476211e99329768b38abd88aacb6fa9334f2c2bbcaab9b0438f5
317e9deef23ff0e919083ac6c94b5ccd3bb0227f674078d66cdd4a2e5d1ebba9
68a98b8e174cb5af20e0ac97978bad6d245a1cb0970b82a4a269a92e7726d74b
277fe4dab731149f3d40630f2f8b25092b007c701f04b5304d3ba9570280d015
f95c6749f4d4fae18f9d384f495dc1c79e7484b309d0d35ea68966763ed325bd
DarkStRat hashes (SHA256):
b38aa09a2334e11a73ef9a926694f2054789934daa38afeb8d00bce6949b6c4c
0d219aa54b1d417da61bd4aed5eeb53d6cba91b3287d53186b21fed450248215
C2 domains observed:
pressmil[.]com
notebookhk[.]net
dicemention[.]com
leeghost[.]com
References:
[1] http://www.welivesecurity.com/2014/11/12/korplug-military-targeted-attacks-afghanistan-tajikistan/
[2] http://blog.jpcert.or.jp/2015/01/analysis-of-a-r-ff05.html