Menlo Security Cloud Security Platform receives FedRAMP® Authorization
Most Searched
Traditional security approaches are flawed, costly, and overwhelming for security teams. Menlo Security is different. It’s the simplest, most definitive way to secure work—making online threats irrelevant to your users and your business.
Video
Our platform invisibly protects users wherever they go online. So threats are history and the alert storm is over.
eBook
Traditional network security wasn’t built to address today’s complex enterprise environments. SASE fixes that problem.
Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise. The collective is made up of elite security researchers that put a spotlight on the threats you know and don’t know about.
Buyer's Guide
Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise.
Abhay Yadav | Feb 23, 2023
Share this article
Menlo Labs has uncovered an unknown threat actor that’s leveraging an evasive threat campaign distributed via Discord that features the PureCrypter downloader and targets government entities. The PureCrypter campaign uses the domain of a compromised non-profit organization as a Command and Control (C2) to deliver a secondary payload. The campaign was found to have delivered several types of malware including Redline Stealer, AgentTesla, Eternity, Blackmoon and Philadelphia Ransomware. Our investigation started when Menlo’s Cloud Security Platform blocked password-protected archive files across multiple government customers in the Asia-Pacific (APAC) and North America regions.
Menlo Labs assesses that this threat actor group will continue to use the compromised and taken infrastructure as long as they can, before needing to find a new home. Leaving credentials in malware is an OpSec failure but it leaves a trace for analysts to follow. Fortunately in this case, Menlo’s Cloud Security Platform blocked this attack, which allowed Menlo Labs to see it and start to track this actor.
Threat analysis showed that PureCrypter is downloading a secondary malware, believed to be AgentTesla.
PureCrypter is an advanced downloader which downloads Remote Access Trojans (RATs) and Infostealers. It has been sold since March 2021 on“hxxps[://]purecoder.sellix.io/.” AgentTesla is an advanced backdoor with capabilities including stealing stored passwords from different browsers, clipboard logging, screen keylogging and screen capturing. It is written in .net and supports all versions of Windows operating system.
In our investigation, we found that AgentTesla establishes a connection to an FTP server where it stores the stolen victim’s credentials. The FTP server appears to have been taken over and the leaked credentials for the domain were found online, thus suggesting that the threat actors used these credentials to gain access to the server.
It’s also noteworthy that the download link for the secondary malware is from a compromised domain of a non-profit organization whose leaked credentials were also found online.
A similar sample to theAgentTesla malware we analyzed was discovered in a phishing email with the subject “FW: New Order no. 5959” from Alejandro Gonzalo ([email protected][.]com). The malicious attachment was named “Nuevo pedido 7887979-800898.gz” and contained FTP server credentials that were the same as those found in the first case.
Under that same email address, another malicious email titled “New Order” was also uncovered with an attached file called “Ppurchase order6007979-709797790.gz”. This one also used the same FTP server – ftp[://]ftp.mgcpakistan[.]com – as part of its infection process!
The FTP server (ftp[://]ftp.mgcpakistan[.]com) was also seen in a campaign using OneNote to deliver malware. Attackers have been sending phishing emails with links to malicious OneNote files that can download additional malware or steal information from the victim’s device. Altogether, the Labs team found 106 files using said FTP server.
In this campaign, Discord was used to host the payload, and a link to the payload is sent via email. To evade existing defenses, PureCrypter uses password protected ZIP files. Below is a screenshot that shows the poor detection of these password-protected payloads on VT.
The following steps were taken by the attacker to deliver the payload:
While we were not able to download the second stage payload from the PureCrypter sample mentioned above (md5 – 5420DCBAE4F1FBA8AFE85CB03DCD9BFC), we were able to identify similar samples which were seen downloading malicious payloads from the compromised non-profit organization. Upon further investigation, we determined that this was AgentTesla and was communicating to an FTP server located in Pakistan (as mentioned in the intel section above). The technical analysis below is for the new sample md5 -C3B90A10922EEF6D635C6C786F29A5D0).
This downloaded binary is packed to evade initial detection. It contains the AgentTesla payload which is encrypted in the resource section using DES Algorithm as shown in the below screenshot.
The des.IV and des.Key of the encrypted payload is shown in the below screenshot.
AgentTesla uses a process hollowing technique to inject its payload (Md5 – BCF031AB2B43DC382B365BA3DF9F09BC) into cvtres.exe. This is a standard windows process that exists across all versions of Windows OS.
AgentTesla uses an XOR algorithm to encrypt its config file. The screenshot below shows the xor encoded config file.
Menlo Labs was able to decrypt the config file. The decrypted file is shown below.
The decrypted file contains the CnC details of the FTP server to which AgentTesla uploads the victim data.
AgentTesla uses FTP for data exfiltration. For FtpWebRequest it requires an FTP server path and credentials to send stolen data to the server shown in the screenshot below:
This screenshot shows how to get FtpWebRequest:
“[email protected][.]com”Password
“*password*” – due to security reasons we are not putting the correct password here.
The Labs team will continue to monitor for an evolution in this threat actor activity. This threat actor doesn’t appear to be a major player in the threat landscape, but the targeting of government entities is surely a reason to watch out for them.
“ftp://ftp[.]mgcpakistan[.]com/”Username: “[email protected][.]com”
cents-ability.org
be18d4fc15b51daedc3165112dad779e17389793fe0515d62bbcf00def2c3c2d5732b89d931b84467ac9f149b2d60f3aee679a5f6472d6b4701202ab2cd80e99
a7c006a79a6ded6b1cb39a71183123dcaaaa21ea2684a8f199f27e16fcb30e8e5d649c5aa230376f1a08074aee91129b8031606856e9b4b6c6d0387f35f6629df950d207d33507345beeb3605c4e0adfa6b274e67f59db10bd08b91c96e8f5ad397b94a80b17e7fbf78585532874aba349f194f84f723bd4adc79542d90efed37a5b8b448e7d4fa5edc94dcb66b1493adad87b62291be4ddcbd61fb4f25346a8efc0b3bfcec19ef704697bf0c4fd4f1cfb091dbfee9c7bf456fac02bcffcfedfC846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331
F34d5f2d4577ed6d9ceec516c1f5a744 (86 files)61259b55b8912888e90f516ca08dc514 (10 files)
HKLM\Software\Microsoft\Fusion\LoggingLevel
Of the 106 samples, over half shared the following MITRE Techniques:
Posted by Abhay Yadav on Feb 23, 2023
Tagged with Blog, HEAT, Menlo Labs, Threat Trends
Threat Trends & Research
To talk to a Menlo Security expert, complete the form, or call us at (650) 695-0695.