Tuesday, October 9, 2018

Delivery (Key)Boy

Introduction

Below we’ve outlined the delivery phase of some recent attacks by KeyBoy, a group of attackers believed to operate out of China. They were first identified in 2013 targeting governments and NGOs in South East Asia. Their primary targeting continues to this day, though they have also been known to target more diverse victims such as the energy sector.

Malware Delivery through Open Source Exploit Kits

KeyBoy sent the following email to India’s Ambassador to Ethiopia from an email address at nic[.]in, India’s National Informatics Centre.

The file f43f60b62002d0700ccbcbd9334520b6

The attached malicious document downloads and executes a script that installs the final payload:

This script contains text (eg; “<component id=’giffile’>” ) which matches a pre-packed version of the popular CVE-2017-0199 exploit available on GitHub.

We’ve seen other malicious documents where KeyBoy have tested another exploit generator. In that case KeyBoy didn’t change the default settings so the document meta-data provides some obvious hints that the document is malicious:

Delivered Malware

The next stage in these attacks is typically a malware family known as TSSL. This malware originally identified by PwC and more recently described by Trend Micro and CitizenLab.

Most samples are built on the attackers machine from the location:

  • D:Work…

Though the build path of a recent sample seems to indicate the attackers are having problems bypassing Symantec antivirus, and is built from:

  • C:UsersCN_ideDesktopTSSL_v3.2.7_BypassSymantec_20180528TClientReleaseFakeRun.pdb

Delivering Android Malware

We’ve also noted continued infections of the Titan Android malware associated with Keyboy, originally identified by LookOut. The source of the files that we have managed to identify is old – and seems to date back to a user named Textplus0012 posting malicious APK files on a Taiwanese site (apk.tw) for downloading Android applications:

The user textplus0012 on apk.tw

This user stopped posting the malicious files in 2015. It is unclear where samples of Titan were delivered from after this.

Detection

AlienVault Agent Detections

The AlienVault Agent is a lightweight, adaptable endpoint agent based on osquery and maintained by AlienVault.

The AlienVault Agent detects the following malicious activity during the attacks:

  • Suspicious Process Created by Microsoft Office Application
  • Powershell Process Created by Scripting Executable
  • Suspicious PowerShell Arguments
  • PowerShell process with suspicious arguments and network activity

Network Detection

ETPRO INFO DYNAMIC_DNS Query to a *.dynamic-dns.net Domain

Appendix

A concise set of indicators are included below, a fuller list is available in the OTX Pulse.

File-Hashes

91dfd19376574039bc80f3af5de341dd8927993ceb5dbb269c375c150a2c3e20

831c3c40cc3fbc28b1ce1eca6bf278602c088f0580d6bdf324ef949c7d48a707

c6c3678d8e6f715eda700eec776f75d1b733cab9757813cff4e206581ed8349f

f83562853dc530a609ed866b375ac725599d7a927281e9d6f2e46f481e3eb292

Fdb85d3f08eb70f0d2171d8bd348574139f63f31a788d2ff1b2a28aca6066345

bf5ee65c6f9523923f6da2eead2a01698857d5fecae661a109b81409c18c0b6b

7bf4fd019411075a5d98cf966516af3ddb7b007c1b9146c264ce2e4a1572e5e8

 

Domains from recent campaigns

muonline.dns04[.]com

microword.itemdb[.]com

office.otzo[.]com

moffice.mrface[.]com

offlce.dnset[.]com

microsoftofice.zyns[.]com

online.ezua[.]com

mutecider[.]com – See report by ClearSkySec

alibabacloud.zzux[.]com

alibabacloud.wikaba[.]com

alibabacloud.dynamic-dns[.]net

bookmarklies[.]com

manager-goog1e[.]com

hellomyanmar[.]info

 

URLs

http://moffice.mrface[.]com/office.sct

http://offlce.dnset[.]com/office.sct

 

Yara Rules

rule keyboy_mobile_titan

{

meta:

author = “AlienVault Labs”

copyright = “Alienvault Inc. 2018”

license = “Apache License, Version 2.0”

sha256 = “5acc64f814cc06db5e5cc56784607ddfa95e3e45170002a210c807857d48a1b0”

strings:

$string_1 = “titans.action.GLOBAL_ACTION”

$string_2 = “titans.action.LOCATION_ACTION”

$string_3 = “titans.action.PHONE_RECORD_ACTION”

condition:

all of them

}

rule keyboy_document_ppsx_sct

{

meta:

author = “AlienVault Labs”

copyright = “Alienvault Inc. 2018”

license = “Apache License, Version 2.0”

description = “Matches on compressed sub-file”

sha256 = “831c3c40cc3fbc28b1ce1eca6bf278602c088f0580d6bdf324ef949c7d48a707”

strings:

$string_1 = “<vt:lpstr>script:http://”

$string_2 = “.sct” TargetMode=”External”/></Relationships>”

condition:

any of them

}

Additional Yara rules are available from Citizen Lab and Florian Roth.

       

The post Delivery (Key)Boy appeared first on Cybersecurity Insiders.


October 09, 2018 at 09:10PM

0 comments:

Post a Comment