NOBELIUM Uses Poland's Ambassador’s Visit to the U.S. to Target EU Governments Assisting Ukraine
Summary
NOBELIUM, aka APT29, is a sophisticated, Russian state-sponsored threat actor targeting Western countries. At the beginning of March, BlackBerry researchers observed a new campaign targeting European Union countries; specifically, its diplomatic entities and systems transmitting sensitive information about the region's politics, aiding Ukrainian citizens fleeing the country, and providing help to the government of Ukraine.
Brief MITRE ATT&CK Information
Tactic
|
Technique
|
Resource Development
|
T1584.006 (Compromising legitimate web servers to spread downloaders)
|
Initial Access
|
T1566.002 (Spear-phishing email with link to malicious website)
|
Execution
|
T1204.002 (Malicious .lnk files inside of weaponized ISO images)
|
Persistence
|
T1547.001 (Execution through Autorun)
|
Defense Evasion
|
T1027.006 (Malicious HTML obfuscation)
|
Command-and-Control
|
T1102.002 (Communicating via Notion API)
|
Weaponization and Technical Overview
Weapons
|
Obfuscated html files, iso files, .lnk files, DLL 64 bits
|
Attack Vector
|
Spear-phishing
|
Network Infrastructure
|
Compromised legitimate websites.
|
Targets
|
Diplomatic entities
|
Technical Analysis
Context
NOBELIUM is an advanced persistent threat group also known as APT29, which is publicly attributed to the Russian government and specifically to the Foreign Intelligence Service of the Russian Federation (SVR), an organization responsible for collecting intelligence outside Russia, including electronic surveillance.
Although its phishing campaigns aren’t very sophisticated, APT29 is notorious for its agility once it is inside a target’s network. Its operators are known to be stealthy, extremely patient, and skilled in utilizing innovative intrusion techniques that abuse Microsoft technologies and services. The threat group made international news headlines back in December 2020 when a high-level supply chain attack Trojanized a software update to SolarWinds Orien software. The compromise affected thousands of users, distributing a backdoor dubbed SunBurst.
The new NOBELIUM campaign BlackBerry observed creates lures targeted at those with interest in the Ministry of Foreign Affairs of Poland’s recent visit to the U.S., and abuses the legitimate electronic system for official document exchange in the EU called LegisWrite. It partially overlaps with a previous campaign discovered by researchers in October 2022.
NOBELIUM is also known as Cozy Bear and The Dukes, and industry reporting has previously referred to the threat group as StellarParticle, UNC2452, and Dark Halo. NOBELIUM has historically targeted government organizations, non-governmental organizations, think tanks, military, IT service providers, health technology and research, and telecommunications providers.
Attack Vector
The infection vector for this particular campaign is a targeted phishing email containing a weaponized document. The malicious document includes a link leading to the download of an HTML file.
- hxxps[:]//literaturaelsalvador[.]com/Instructions[.]html
- hxxps[:]//literaturaelsalvador[.]com/Schedule[.]html
The weaponized URLs shown above are hosted on a legitimate online library website based in El Salvador in Central America. We believe that the threat actor compromised this website sometime between the end of January 2023 and the beginning of February 2023.
One of the lures appeals to those who want to find out the Poland Ambassador’s schedule for 2023. It overlaps with Ambassador Marek Magierowski's recent visit to the United Statesp; specifically, his talk on February 2, where he discussed the war in Ukraine at the Catholic University of America Columbus School of Law, also known as the Catholic Law, which is based in Washington, DC.
Figure 1: Visual lure masquerading as the Polish Ministry of Foreign Affairs
Another lure we found abuses multiple legitimate systems, including LegisWrite and eTrustEx, which the EU nations use for information exchange and secure data transfer.
Figure 2: Visual lure masquerading as the European Commission
LegisWrite is an editing program that allows secure document creation, revision, and exchange between governments within the European Union. The fact that LegisWrite is used in the malicious lure indicates that the threat actor behind this lure is specifically targeting state organizations within the European Union.
Further analysis of the malicious HTML file reveals it to be a version of NOBELIUM’s malicious dropper tracked as ROOTSAW, also known as EnvyScout. EnvyScout uses a technique known as HTML smuggling to deliver an IMG or ISO file to the victim’s system.
The HTML file delivered in this campaign contains a data block that can be decoded by subtracting 4. Upon decoding that data, we find that it has an “.ISO” file inside.
Figure 3: Contents of the weaponized HTML file
The “hxxps[:]//literaturaelsalvador[.]com/Instructions[.]html” link drops “Instruction.iso”, and the “hxxps[:]//literaturaelsalvador[.]com/Schedule[.]html” link drops “Schedule.iso”. Both of those “.iso” files each contain two files, with the same hash for both:
- BugSplatRc64.dll
- <Instruction||Schedule>.lnk
SHA256
MD5
|
dffaefaabbcf6da029f927e67e38c0d1e6271bf998040cfd6d8c50a4eff639df
38b05aa4b5ba651ba95f7173c5145270
|
ITW File Name
|
Schedule.lnk, Instructions.lnk
|
Compilation Stamp
|
2023-02-08T17:40:55.2737760+00:00
|
File Type/Signature
|
Windows shortcut
|
File Size
|
1488 bytes
|
Command Line Argument
|
BugSplatRc64.dll,InitiateDs
|
The purpose of the “.lnk” file is to run the specified command line argument:
- C:\Windows\system32\rundll32.exe BugSplatRc64.dll,InitiateDs
SHA256
MD5
|
e957326b2167fa7ccd508cbf531779a28bfce75eb2635ab81826a522979aeb98
cf36bf564fbb7d5ec4cec9b0f185f6c9
|
ITW File Name
|
BugSplatRc64.dll
|
Compilation Stamp
|
2023-02-07 13:02:42 UTC
|
File Type/Signature
|
x64 PEDLL
|
File Size
|
271360 bytes
|
The BugSplatRc64.dll file contains many encrypted strings which are decrypted at runtime. Some of the those decrypted strings are as follows:
- BugSplatRc64.dll,InitiateDs" C:\Windows\System32\rundll32.exe"
- Software\Microsoft\Windows\CurrentVersion\Run
- authorization: Bearer secret_X92 sXCVWoTk63aPgGKlPBBmHVmuKXJ2geugKa7Ogj7s
- notion-version:
- 2022-06-28 accept: applicat ion/json..
Continuing with its execution, a new directory is created under “C:\Users\<username>\AppData”, where the BugSplatRc64.dll is copied over.
- C:\Users\<username>\AppData\ DsDiBacks\BugSplatRc64.dll
To remain persistent on the infected system, a new registry key is created under: “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\DsDiBacks”, with the value of “C:\Windows\System32\rundll32.exe "C:\Users\<username>\AppData\Local\DsDiBacks\BugSplatRc64.dll,InitiateDs”.
The BugSplatRc64.dll file aims to collect and exfiltrate information about the infected system. That includes basic data such as the owner’s username and IP address. This information is then used to create the victim’s unique identifier, which it then sends to the command-and-control (C2) server, Notion, which we’ll go into more detail on below.
Every minute (62000ms), the BugSplatRc64.dll connects to the Notion server, waiting for the next payload. If successful, the payload is executed as a shellcode in the memory of its process.
Network Infrastructure
This campaign's malware delivery is based on the use of legacy network infrastructure that has been compromised by the threat actor. Using a compromised legitimate server to host the packed malware payload increases the chances of a successful installation on the victims’ machines.
The packed malware utilizes "api.notion.com" for its C2 communication. "Notion" is a commonly used note-taking application. By using Notion’s application programming interface (API) for C2, the threat group are giving their traffic a benign guise.
NOBELIUM has a history of utilizing compromised C2 servers, such as those hosted in the Microsoft® Azure® cloud infrastructure, to make their malicious C2’s look legitimate. Notion was also used during their November 2022 campaign, further aligning this campaign’s tactics, techniques and procedures (TTPs) with APT29.
This version of Notion is specified in the headers as “2022-06-28", and is the latest version of the API. In a campaign conducted in January 2022, NOBELIUM was still using the Trello API for C2 communication. Use of Notion’s API didn’t begin until late in 2022, leaving the middle of 2022 for the implementation of this new C2 feature.
Figure 4: Notion C2 POST method example
Targets
Based on the current geopolitical situation involving Russia’s invasion of Ukraine, the visit of Poland's Ambassador to the United States and his talk about the war, and the abuse of the online system used to exchange documents inside the European Union, we believe the target of NOBELIUM’s campaign is Western countries, especially those in Western Europe, which provide help to Ukraine.
Conclusions
NOBELIUM actively collects intelligence information about the countries supporting Ukraine in the Russian-Ukraine war. The overlap between Poland's Ambassador’s visit to the United States with the lure used in the attacks, provides evidence that the threat actors carefully follow geopolitical events and use them to increase their possibility of a successful infection.
Furthermore, our initial analysis of weaponized LNK files shows that the threat actor behind this campaign used anti-forensic techniques to wipe out personal metadata to remove information connected to its operations systems.
Using compromised legitimate network infrastructure and a legitimate web server increases NOBELIUM’s technical capabilities to bypass basic network security mechanisms. However, an actionable Threat Intelligence model with counter-measure rules such as Suricata, will help to detect malicious traffic from the internal network to the threat actor’s network infrastructure.
For similar articles and news delivered straight to your inbox, subscribe to the BlackBerry blog.
APPENDIX 1 – Indicators of Compromise (IoCs)
SHA256
MD5
|
21a0b617431850a9ea2698515c277cbd95de4e59c493d0d8f194f3808eb16354
67a6774fbc01eb838db364d4aa946a98
|
SHA256
MD5
|
505f1e5aed542e8bfdb0052bbe8d3a2a9b08fc66ae49efbc9d9188a44c3870ed
E693777A3A85583A1BBBD569415BE09C
|
SHA256
MD5
|
c1ebaee855b5d9b67657f45d6d764f3c1e46c1fa6214329a3b51d14eba336256
89f716d32461880cd0359ffbb902f06e
|
SHA256
MD5
|
dbb39c2f143265ad86946d1c016226b0e01614af35a2c666afa44ac43b76b276
e0cb8157e6791390463714b38158195a
|
SHA256
MD5
|
e957326b2167fa7ccd508cbf531779a28bfce75eb2635ab81826a522979aeb98
cf36bf564fbb7d5ec4cec9b0f185f6c9
|
SHA256
MD5
|
3a489ef91058620951cb185ec548b67f2b8d047e6fdb7638645ec092fc89a835
8d5c0f69c1caa29f8990fbc440ab3388
|
SHA256
MD5
|
4d92a4cecb62d237647a20d2cdfd944d5a29c1a14b274d729e9c8ccca1f0b68b
82ecb8474efe5fedcb8f57b8aafa93d2
|
IP
|
108[.]167.180[.]186
|
URL
|
hxxps[:]//literaturaelsalvador[.]com/Instructions[.]html
|
URL
|
hxxps[:]//literaturaelsalvador[.]com/Schedule[.]html
|
SHA256
MD5
|
dffaefaabbcf6da029f927e67e38c0d1e6271bf998040cfd6d8c50a4eff639df
38b05aa4b5ba651ba95f7173c5145270
|
APPENDIX 2 – Applied Countermeasures
Yara Rules
rule NOBELIUM_SpyDLL_March2023
{
meta:
copyright = "BlackBerry"
description = "Yara rule based on code NOBELIUM_SpyDLL_March2023"
author = "BlackBerry Threat Intelligence Team"
date = "2023-03-07"
sha256 = "e957326b2167fa7ccd508cbf531779a28bfce75eb2635ab81826a522979aeb98"
sha256 = "4d92a4cecb62d237647a20d2cdfd944d5a29c1a14b274d729e9c8ccca1f0b68b"
sha256 = "3a489ef91058620951cb185ec548b67f2b8d047e6fdb7638645ec092fc89a835"
strings:
$1807379073_247 = { 8B ?? ?? ?? ?? ?? ?? 48 ?? ?? ?? ?? 48 ?? ?? ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? ?? ?? 48 ?? ?? 48 ?? ?? ?? ?? 4C ?? ?? ?? ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? 89 ?? ?? ?? ?? ?? ?? 48 ?? ?? ?? 4C ?? ?? ?? ?? F7 ?? E8 ?? ?? ?? ?? 4C ?? ?? ?? ?? 48 ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? 0F 10 ?? ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? ?? ?? 48 ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? 4C ?? ?? ?? ?? 48 ?? ?? ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? ?? ?? 8B ?? ?? ?? 89 ?? 49 ?? ?? 89 ?? 49 ?? ?? 49 ?? ?? 48 ?? ?? 48 ?? ?? ?? ?? 4C ?? ?? 4C ?? ?? 48 ?? ?? ?? ?? 48 ?? ?? ?? ?? 48 ?? ?? ?? ?? 48 ?? ?? ?? ?? 48 ?? ?? ?? ?? 0F 11 ?? ?? ?? 4C ?? ?? ?? ?? 48 ?? ?? ?? ?? E8 ?? ?? ?? ?? 9? 0F 10 ?? ?? ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? 5? 5? 5? 5? 41 ?? 41 ?? 41 ?? C3 }
$1807233630_154 = { 48 ?? ?? ?? ?? ?? ?? 49 ?? ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? 49 ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? 49 ?? ?? 41 ?? ?? 4C ?? ?? 4D ?? ?? 48 ?? ?? 48 ?? ?? ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? 4D ?? ?? 45 ?? ?? 4C ?? ?? 48 ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? ?? ?? 45 ?? ?? 45 ?? ?? BA ?? ?? ?? ?? 31 ?? FF 1? ?? ?? ?? ?? 85 ?? 0F 88 }
$1807250632_125 = { 48 ?? ?? ?? ?? ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? 48 ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? ?? ?? 4D ?? ?? 48 ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 45 ?? ?? 4D ?? ?? 4C ?? ?? 4C ?? ?? C7 ?? ?? ?? ?? ?? ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 84 ?? 0F 85 }
$1807244815_125 = { 48 ?? ?? ?? ?? ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? ?? ?? 49 ?? ?? 4C ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 45 ?? ?? 4D ?? ?? 4C ?? ?? 4C ?? ?? C7 ?? ?? ?? ?? ?? ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 84 ?? 0F 85 }
$1807376832_81 = { 41 ?? 41 ?? 41 ?? 41 ?? 5? 5? 5? 5? 48 ?? ?? ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? 41 ?? ?? ?? 0F 10 ?? 48 ?? ?? ?? ?? ?? ?? ?? 0F 10 ?? 49 ?? ?? 48 ?? ?? 4C ?? ?? 0F 11 ?? ?? ?? ?? ?? ?? 0F 11 ?? ?? ?? 83 ?? ?? ?? ?? 0F 11 ?? ?? ?? ?? ?? ?? 7D }
$1807378924_80 = { 48 ?? ?? ?? ?? ?? ?? ?? 66 ?? ?? ?? E8 ?? ?? ?? ?? 0F 10 ?? ?? ?? ?? ?? ?? 0F 10 ?? ?? ?? ?? ?? ?? 0F 10 ?? ?? ?? ?? ?? ?? 0F 11 ?? ?? ?? ?? ?? ?? 8B ?? ?? ?? ?? ?? ?? 0F 11 ?? ?? ?? ?? ?? ?? 0F 11 ?? ?? ?? ?? ?? ?? 39 ?? ?? ?? ?? ?? ?? 74 }
$1807227484_78 = { 31 ?? 31 ?? 4C ?? ?? FF D? 49 ?? ?? ?? 31 ?? 4D ?? ?? 4C ?? ?? F2 ?? 48 ?? ?? ?? ?? ?? ?? ?? 48 ?? ?? 48 ?? ?? ?? 4C ?? ?? F2 ?? 89 ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? 48 ?? ?? 4C ?? ?? 48 ?? ?? 44 ?? ?? ?? FF 1? ?? ?? ?? ?? 85 ?? 0F 84 }
$1807233543_78 = { 4C ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? ?? ?? ?? ?? ?? 49 ?? ?? 48 ?? ?? ?? ?? 4C ?? ?? 49 ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? 41 ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 45 ?? ?? 0F 85 }
$1807231440_74 = { 4C ?? ?? 31 ?? 48 ?? ?? ?? ?? 41 ?? ?? ?? ?? ?? 48 ?? ?? ?? ?? 48 ?? ?? ?? ?? 41 ?? ?? ?? ?? ?? 8A ?? ?? 48 ?? ?? ?? ?? 48 ?? ?? 42 ?? ?? ?? 0F BE ?? FF 1? ?? ?? ?? ?? 48 ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? 75 }
$1807236234_71 = { 41 ?? 41 ?? 41 ?? 41 ?? 5? 5? 5? 5? 48 ?? ?? ?? 45 ?? ?? 48 ?? ?? ?? ?? 48 ?? ?? 48 ?? ?? C6 ?? ?? 49 ?? ?? 44 ?? ?? 48 ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? 45 ?? ?? 48 ?? ?? 4C ?? ?? ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? 0F 85 }
$1807238694_70 = { 48 ?? ?? ?? ?? ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? 4C ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? 48 ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? 48 ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? 0F 84 }
$1807227341_69 = { 31 ?? 31 ?? FF D? 4C ?? ?? C7 ?? ?? ?? ?? ?? ?? ?? 45 ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? ?? 41 ?? ?? ?? ?? ?? 4C ?? ?? C7 ?? ?? ?? ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? ?? FF 1? ?? ?? ?? ?? 49 ?? ?? 48 ?? ?? 0F 84 }
$1807227414_66 = { 4D ?? ?? 45 ?? ?? 48 ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? ?? C7 ?? ?? ?? ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? ?? FF 1? ?? ?? ?? ?? 49 ?? ?? 48 ?? ?? 0F 84 }
$1807378203_62 = { 41 ?? ?? ?? ?? ?? 41 ?? ?? ?? ?? ?? 31 ?? 41 ?? ?? 41 ?? ?? ?? ?? ?? ?? 99 41 ?? ?? 45 ?? ?? 41 ?? ?? ?? ?? ?? 0F 9F ?? 01 ?? 8D ?? ?? ?? ?? ?? 99 41 ?? ?? 48 ?? ?? 81 F? ?? ?? ?? ?? 7D }
$1807378800_62 = { 41 ?? 41 ?? 41 ?? 5? 5? 5? 5? 48 ?? ?? ?? ?? ?? ?? 0F 11 ?? ?? ?? ?? ?? ?? F2 ?? ?? ?? ?? ?? ?? ?? 66 ?? ?? ?? 49 ?? ?? 49 ?? ?? 4C ?? ?? 0F 54 ?? ?? ?? ?? ?? 66 ?? ?? ?? 66 ?? ?? ?? 73 }
$1807239523_59 = { 48 ?? ?? ?? ?? ?? ?? E8 ?? ?? ?? ?? 4C ?? ?? ?? ?? ?? ?? 49 ?? ?? 4C ?? ?? 4C ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? 4C ?? ?? ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? E8 ?? ?? ?? ?? 84 ?? 0F 84 }
$1807234558_49 = { 48 ?? ?? ?? ?? 48 ?? ?? ?? ?? 45 ?? ?? 45 ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? ?? FF D? 83 ?? ?? 0F 85 }
$1807229643_48 = { 48 ?? ?? ?? ?? ?? 0F B7 ?? ?? C7 ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? 66 ?? ?? ?? ?? ?? ?? ?? ?? ?? 48 ?? ?? ?? ?? 48 ?? ?? 8A ?? ?? ?? ?? ?? 84 ?? 75 }
$1807251921_46 = { 44 ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? ?? 4C ?? ?? 41 ?? ?? 89 ?? 0F B7 ?? 8B ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? 89 ?? ?? 41 ?? ?? ?? ?? ?? ?? 74 }
$1807234510_44 = { 48 ?? ?? ?? ?? 41 ?? ?? ?? ?? ?? 45 ?? ?? 48 ?? ?? ?? ?? ?? ?? 48 ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? 48 ?? ?? ?? ?? FF D? 85 ?? 0F 85 }
$1807248778_42 = { 48 ?? ?? ?? ?? ?? ?? E8 ?? ?? ?? ?? 48 ?? ?? ?? ?? ?? ?? 4C ?? ?? 4C ?? ?? 48 ?? ?? ?? ?? ?? ?? ?? E8 ?? ?? ?? ?? 84 ?? 0F 84 }
$1807227300_37 = { C7 ?? ?? ?? ?? ?? ?? ?? 45 ?? ?? 45 ?? ?? 31 ?? 48 ?? ?? ?? ?? ?? ?? FF 1? ?? ?? ?? ?? 49 ?? ?? 48 ?? ?? 0F 84 }
$1807409201_33 = { 48 ?? ?? BD ?? ?? ?? ?? 49 ?? ?? 48 ?? ?? ?? 31 ?? 48 ?? ?? 0F 92 ?? 48 ?? ?? 4D ?? ?? 48 ?? ?? 75 }
$1807348925_27 = { 48 ?? ?? 48 ?? ?? ?? ?? ?? ?? 42 ?? ?? ?? ?? 88 ?? ?? ?? 0F B6 ?? ?? 45 ?? ?? 74 }
$1807351416_16 = { 48 ?? ?? ?? 48 ?? ?? ?? 48 ?? ?? 4C ?? ?? 0F 86 }
condition:
uint16(0) == 0x5a4d and filesize < 1MB and 18 of them
}
|
APPENDIX 3 – Deobfuscated Strings
000000006BBC3040 01 00 00 00 00 00 00 00 77 69 6E 69 6E 65 74 00 ........wininet.
000000006BBC3050 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................
000000006BBC3060 6E 74 64 6C 6C 00 00 00 00 00 00 00 00 00 00 00 ntdll...........
000000006BBC3150 5C 44 73 44 69 42 61 63 6B 73 5C 00 00 00 00 00 \DsDiBacks\.....
000000006BBC3160 01 00 00 00 00 00 00 00 72 75 6E 64 6C 6C 33 32 ........rundll32
000000006BBC3170 2E 65 78 65 00 00 00 00 01 00 00 00 00 00 00 00 .exe............
000000006BBC3180 43 6F 70 79 46 69 6C 65 41 00 00 00 00 00 00 00 CopyFileA.......
000000006BBC3190 01 00 00 00 00 00 00 00 6B 65 72 6E 65 6C 33 32 ........kernel32
000000006BBC31A0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................
000000006BBC31B0 52 65 67 43 6C 6F 73 65 4B 65 79 00 00 00 00 00 RegCloseKey.....
000000006BBC31C0 01 00 00 00 00 00 00 00 61 64 76 61 70 69 33 32 ........advapi32
000000006BBC31D0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................
000000006BBC31E0 52 65 67 53 65 74 56 61 6C 75 65 45 78 41 00 00 RegSetValueExA..
000000006BBC31F0 01 00 00 00 00 00 00 00 61 64 76 61 70 69 33 32 ........advapi32
000000006BBC3200 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................
000000006BBC3210 52 65 67 51 75 65 72 79 56 61 6C 75 65 45 78 41 RegQueryValueExA
000000006BBC3220 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................
000000006BBC3230 61 64 76 61 70 69 33 32 00 00 00 00 00 00 00 00 advapi32........
000000006BBC3240 01 00 00 00 00 00 00 00 52 65 67 4F 70 65 6E 4B ........RegOpenK
000000006BBC3250 65 79 45 78 41 00 00 00 01 00 00 00 00 00 00 00 eyExA...........
000000006BBC3260 61 64 76 61 70 69 33 32 00 00 00 00 00 00 00 00 advapi32........
000000006BBC3270 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000006BBC3280 47 65 74 50 72 6F 63 65 73 73 49 6D 61 67 65 46 GetProcessImageF
000000006BBC3290 69 6C 65 4E 61 6D 65 41 00 00 00 00 00 00 00 00 ileNameA........
000000006BBC32A0 01 00 00 00 00 00 00 00 70 73 61 70 69 00 00 00 ........psapi...
000000006BBC32B0 01 00 00 00 00 00 00 00 2E 74 65 78 74 00 00 00 .........text...
000000006BBC32C0 01 00 00 00 00 00 00 00 2E 64 6C 6C 00 00 00 00 .........dll....
000000006BBC32D0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000006BBC32E0 63 3A 5C 77 69 6E 64 6F 77 73 5C 73 79 73 74 65 c:\windows\syste
000000006BBC32F0 6D 33 32 5C 00 00 00 00 01 00 00 00 00 00 00 00 m32\............
000000006BBC3300 43 72 65 61 74 65 46 69 6C 65 41 00 00 00 00 00 CreateFileA.....
000000006BBC3310 01 00 00 00 00 00 00 00 6B 65 72 6E 65 6C 33 32 ........kernel32
000000006BBC33F0 01 00 00 00 00 00 00 00 72 65 73 75 6C 74 73 00 ........results.
000000006BBC3400 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................
000000006BBC3410 50 4F 53 54 00 00 00 00 01 00 00 00 00 00 00 00 POST............
000000006BBC3420 76 31 2F 64 61 74 61 62 61 73 65 73 2F 33 37 30 v1/databases/370
000000006BBC3430 38 39 61 62 63 30 39 32 36 34 36 33 31 38 32 62 89abc0926463182b
000000006BBC3440 62 35 33 34 33 62 63 65 32 35 32 63 63 2F 71 75 b5343bce252cc/qu
000000006BBC3450 65 72 79 00 00 00 00 00 01 00 00 00 00 00 00 00 ery.............
000000006BBC3460 56 4B 6F 4D 72 00 00 00 01 00 00 00 00 00 00 00 VKoMr...........
000000006BBC3470 65 71 75 61 6C 73 00 00 01 00 00 00 00 00 00 00 equals..........
000000006BBC3480 72 69 63 68 5F 74 65 78 74 00 00 00 00 00 00 00 rich_text.......
000000006BBC3490 01 00 00 00 00 00 00 00 4E 61 6D 65 00 00 00 00 ........Name....
000000006BBC34A0 01 00 00 00 00 00 00 00 70 72 6F 70 65 72 74 79 ........property
000000006BBC34B0 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................
000000006BBC34C0 66 69 6C 74 65 72 00 00 01 00 00 00 00 00 00 00 filter..........
000000006BBC34D0 70 61 67 65 5F 73 69 7A 65 00 00 00 00 00 00 00 page_size.......
000000006BBC37E0 6F 62 6A 65 63 74 00 00 00 00 00 00 00 00 00 00 object..........
000000006BBC37F0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000006BBC3800 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000006BBC3810 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000006BBC3820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000006BBC3830 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000006BBC3840 61 70 69 2E 6E 6F 74 69 6F 6E 2E 63 6F 6D 00 00 api.notion.com..
000000006BBC3850 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000006BBC3860 61 75 74 68 6F 72 69 7A 61 74 69 6F 6E 3A 20 42 authorization: B
000000006BBC3870 65 61 72 65 72 20 73 65 63 72 65 74 5F 58 39 32 earer secret_X92
000000006BBC3880 73 58 43 56 57 6F 54 6B 36 33 61 50 67 47 4B 6C sXCVWoTk63aPgGKl
000000006BBC3890 50 42 42 6D 48 56 6D 75 4B 58 4A 32 67 65 75 67 PBBmHVmuKXJ2geug
000000006BBC38A0 4B 61 37 4F 67 6A 37 73 00 00 00 00 00 00 00 00 Ka7Ogj7s........
000000006BBC38B0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000006BBC38C0 6E 6F 74 69 6F 6E 2D 76 65 72 73 69 6F 6E 3A 20 notion-version:
000000006BBC38D0 32 30 32 32 2D 30 36 2D 32 38 00 00 00 00 00 00 2022-06-28......
000000006BBC38E0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000006BBC38F0 61 63 63 65 70 74 3A 20 61 70 70 6C 69 63 61 74 accept: applicat
000000006BBC3900 69 6F 6E 2F 6A 73 6F 6E 00 00 00 00 00 00 00 00 ion/json........
000000006BBC3910 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000006BBC3920 63 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 70 content-type: ap
000000006BBC3930 70 6C 69 63 61 74 69 6F 6E 2F 6A 73 6F 6E 00 00 plication/json..
000000006BBC3940 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000006BBC3950 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000006BBC3960 4D 6F 7A 69 6C 6C 61 2F 35 2E 30 20 28 57 69 6E Mozilla/5.0 (Win
000000006BBC3970 64 6F 77 73 20 4E 54 20 36 2E 33 3B 20 57 4F 57 dows NT 6.3; WOW
000000006BBC3980 36 34 29 20 41 70 70 6C 65 57 65 62 4B 69 74 2F 64) AppleWebKit/
000000006BBC3990 35 33 37 2E 33 36 20 28 4B 48 54 4D 4C 2C 20 6C 537.36 (KHTML, l
000000006BBC39A0 69 6B 65 20 47 65 63 6B 6F 29 20 43 68 72 6F 6D ike Gecko) Chrom
000000006BBC39B0 65 2F 33 35 2E 30 2E 31 39 31 36 2E 31 31 34 20 e/35.0.1916.114
000000006BBC39C0 53 61 66 61 72 69 2F 35 33 37 2E 33 36 00 00 00 Safari/537.36...
|
Related Reading
About The BlackBerry Research and Intelligence Team
The BlackBerry Research and Intelligence team is a highly experienced threat research group specializing in a wide range of cybersecurity disciplines, conducting continuous threat hunting to provide comprehensive insights into emerging threats. We analyze and address various attack vectors, leveraging our deep expertise in the cyberthreat landscape to develop proactive strategies that safeguard against adversaries.
Whether it's identifying new vulnerabilities or staying ahead of sophisticated attack tactics, we are dedicated to securing your digital assets with cutting-edge research and innovative solutions.