Threat Report
In this week’s report we are covering two very malicious programs. One being a custom remote access trojan (RAT) called UBoatRAT is being distributed via Google Drive links. The malware obtains a command and control (C2) address from GitHub, and uses Microsoft Windows Background Intelligent Transfer Service (BITS) for maintaining persistence. The other is MirageFox, a new tool produced by APT15 that looks to be an upgraded version of a RAT believed to originate in 2012, known as Mirage. The new malware was tracked by the researchers as MirageFox, the name comes from a string found in one of the components that borrows code from both Mirage and Reaver.
Malware: UBoatRAT is being distributed via Google Drive links
The RAT is usually delivered by a ZIP archive hosted on Google Drive containing a malicious executable disguised as a folder or Excel spreadsheet. Once installed, UBoatRAT checks for virtualization software and tries to obtain a domain name from the network. The malware only performs malicious activities on a machine when it is able to join an Active Directory (AD) domain. The malware is also programmed to detect virtualization software (VMWare, VirtualBox or QEmu) that would indicate a research environment. Since June, the GitHub “uuu” repository the C2 links to has been deleted and replaced by “uj”, “hhh” and “enm”, according to researcher Hayashi. The GitHub user name behind the repository is “elsa999”. For more information there are a few links below:
Links:
Some Mitigation Strategies:
- Mail Filtration to screen for malicious links that relay to Google drive
- File Integrity Management looking for the installation of malicious zip files that unpack executables
- Intrusion detection systems (IDS) would detect intrusion and network communication
- 24x7 Security Monitoring for malicious behavior and immediate incident response
Malware: MirageFox
The China-linked APT15 group (aka Ke3chang, Mirage, Vixen Panda, Royal APT and Playful Dragon) has developed a new strain of malware borrowing the code from one of the tool he used in past operations. APT15 is known for committing cyberespionage against companies and organizations located in many different countries, targeting different sectors such as the oil industry, government contractors, military, and more. The attackers utilizes Windows commands to conduct reconnaissance activities, the lateral movement was conducted by using a combination of net command, mounting the C$ share of hosts and manually copying files to or from compromised hosts.
Links:
Some Mitigation Strategies:
- Intrusion detection systems (IDS) to monitor for malicious communication
- File Integrity Management is looking for new filel installation
- Log Management would collect data on C$ shares and other lateral movement
- Mail Filtration to capture potential files attached to phishing emails
- 24x7 Security Monitoring with Focused Security Content for solid threat detection
We'd love to hear your thoughts. Find us on Twitter, LinkedIn or write in to hello@perchsecurity.com
Next: Threat Report Monday June 11th 2018
Share this on: