MAR-10365227-2.v1 – Impacket 2

Notification

This report is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.

This document is marked TLP:CLEAR–Disclosure is not limited. Sources may use TLP:CLEAR when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be distributed without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.cisa.gov/tlp.

Summary

Description

This Malware Analysis Report (MAR) is the result of analytic efforts by the Cybersecurity and Infrastructure Security Agency (CISA) to provide detailed analysis of files associated with HyperBro, a Remote Access Trojan (RAT). CISA obtained HyperBro malware samples during an on-site incident response engagement at a Defense Industrial Base (DIB) Sector organization compromised by advanced persistent threat (APT) actors.

CISA analyzed 4 files associated with HyperBro malware. The files creates a backdoor program that is capable of uploading and downloading files to and from the system. The RAT is also capable of logging keystrokes and executing commands on the system.

For more information on the confirmed compromise, see Joint CSA: Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization.

Download the PDF version of this report:

For a downloadable copy of IOCs, see:

MAR-10365227.r2.v1 STIX XML
(XML, 74.16 KB
)
Submitted Files (4)

52072a8f99dacd5c293fccd051eab95516d8b880cd2bc5a7e0f4a30d008e22a7 (vftrace.dll)

df847abbfac55fb23715cde02ab52cbe59f14076f9e4bd15edbe28dcecb2a348 (msmpeng.exe)

f1a2791eebaea183f399110c9e8ae11c67f5bebf93a5573d1ac3c56fc71b2230 (config.ini)

f2ba8b8aabf73020febd3a925276d52ce88f295537fe57723df714c13f5a8780 (thumb.dat)

IPs (1)

104.168.236.46

Findings

df847abbfac55fb23715cde02ab52cbe59f14076f9e4bd15edbe28dcecb2a348

Tags

loader

Details
Name msmpeng.exe
Size 351240 bytes
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 4109ac08bdc8591c7b46348eb1bca85d
SHA1 6423d1c324522bfd2b65108b554847ac4ab02479
SHA256 df847abbfac55fb23715cde02ab52cbe59f14076f9e4bd15edbe28dcecb2a348
SHA512 0605362190a9cb04a7392c7eae3ef79964a76ea68dc03dfabe6ec8f445f1c355772f2ca8166cbee73188e57bff06b74fb2cfa59869cb4461fffe1c3589856554
ssdeep 6144:BTMoU0+zvvLIpa8bo5GOc1G41vupWn2rwRGekPHZLZKA1UnmOlm:XUDvvsc80AOc1GYvAW2EGtH5ZKAKmOQ
Entropy 6.471736
Antivirus

No matches found.

YARA Rules

No matches found.

ssdeep Matches

No matches found.

PE Metadata
Compile Date 2016-01-05 08:22:40-05:00
Import Hash b66afb12e84aa5ce621a6635837cadba
Company Name CyberArk Software Ltd.
File Description CyberArk Viewfinity
Internal Name vf_host.exe
Legal Copyright Copyright © 1999-2016 CyberArk Software Ltd. All Rights Reserved.
Original Filename vf_host.exe
Product Name CyberArk Viewfinity
Product Version 5.5.10.101
PE Sections
MD5 Name Raw Size Entropy
3822119e846581669481aba79308c57c header 1024 2.580725
98ccfff2af4ccaa3335f63592a1fba02 .text 270848 6.543317
9dcc89a0d16e36145bb07924ca260dfe .rdata 50688 5.132125
14d493033fc147f67601753310725b2b .data 5632 3.711689
615729d1383743a91b8baf309f1a8232 .rsrc 16896 4.839559
Packers/Compilers/Cryptors
Microsoft Visual C++ ?.?
Relationships
df847abbfa… Used 52072a8f99dacd5c293fccd051eab95516d8b880cd2bc5a7e0f4a30d008e22a7
Description

This artifact is a version of vf_host.exe from Viewfinity. The file is used to side-load the malicious dynamic-link library (DLL), vftrace.dll.

The program is also capable of bypassing User Account Controls (UAC) on the system by disabling Admin Approval Mode in User Account Controls Group Policy in HKLMSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem. This can allow the malware to run with Admin privileges, or allow remote logon (RDP) with full Admin privileges.

52072a8f99dacd5c293fccd051eab95516d8b880cd2bc5a7e0f4a30d008e22a7

Tags

trojan

Details
Name vftrace.dll
Size 73728 bytes
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 7655ff65f74f08ee2c54f44e5ef8f098
SHA1 3c7beb8978feac9ba8f5bab0656242232471bf7d
SHA256 52072a8f99dacd5c293fccd051eab95516d8b880cd2bc5a7e0f4a30d008e22a7
SHA512 efea9b8a7b6b7cfa31814af4ffe45fab68d159a6239271b632166b2f6b44af8a4e1cc559fa56537ec4142e0484031a9b79034d4e5a8cbbf1d5250b86370cdfcf
ssdeep 1536:d0X1BkgxVXJyBaUihWutqQQ4znsWgcdqydbPX:O7XMBOs41znqypP
Entropy 6.334911
Antivirus
Adaware Gen:Variant.Bulz.429221
AhnLab Trojan/Win.HYPERBRO
Avira TR/Injector.nmrbf
Bitdefender Gen:Variant.Bulz.429221
Comodo Malware
Cyren W32/Agent.GCPS-3922
ESET a variant of Win32/LuckyMouse.BR trojan
IKARUS Trojan.Win32.LuckyMouse
K7 Riskware ( 0040eff71 )
NANOAV Trojan.Win32.LuckyMouse.iwacwz
Sophos Troj/Agent-BGVD
Trend Micro Trojan.780F7AE8
Trend Micro HouseCall Trojan.780F7AE8
VirusBlokAda TScope.Malware-Cryptor.SB
Zillya! Trojan.LuckyMouse.Win32.24
YARA Rules

No matches found.

ssdeep Matches

No matches found.

PE Metadata
Compile Date 2021-03-02 02:18:56-05:00
Import Hash 182f35372e9fd050b6e0610238bcd9fd
PE Sections
MD5 Name Raw Size Entropy
a89421fb59d33658892123b94906aa72 header 1024 2.836214
624b09cd367db7ebfc510aab51f95791 .text 42496 6.692212
8885c137e1772d11b48e71da92aa3d3c .rdata 23552 4.949495
2304803a4ce5a785e19eb0b45efb7065 .data 2048 2.051382
2139727f6ccf1b15d0f96e805001b2fc .gfids 512 1.386027
a4fc8d9199bcb8669008e62d5dc7d675 .rsrc 512 4.712298
73a0737f1475d88793ad42fc04bef1ab .reloc 3584 6.466489
Packers/Compilers/Cryptors
Borland Delphi 3.0 (???)
Relationships
52072a8f99… Connected_To 104.168.236.46
52072a8f99… Used_By df847abbfac55fb23715cde02ab52cbe59f14076f9e4bd15edbe28dcecb2a348
52072a8f99… Created f1a2791eebaea183f399110c9e8ae11c67f5bebf93a5573d1ac3c56fc71b2230
52072a8f99… Created f2ba8b8aabf73020febd3a925276d52ce88f295537fe57723df714c13f5a8780
Description

This DLL is side-loaded by df847abbfac55fb23715cde02ab52cbe59f14076f9e4bd15edbe28dcecb2a348 detailed in this report.

When the DLL is executed it will create a Globally Unique Identifier (GUID) to identify the system to the command and control (C2) during communication. The GUID is written to a file called ‘Config.ini’ and placed in the current directory.

The program will decrypt and read a configuration file called ‘thumb.dat’ that instructs it to spawn a new instance of the Service Host Process (svchost.exe) and inject itself into the new instance. Svchost.exe is run with the -k netsvcs parameter to allow the malware to connect to its C2. The malware collects the following information to send to the C2 via POST when establishing a connection.

—Begin Collected Information—
Computer Name
IP Address
Path to the malware location
Process name that it is running in (svchost.exe)
Mode
Name of the malware
GUID
—End Collected Information—

During analysis, the malware attempted to connect to the Uniform Resource Identifier (URI), hxxps[:]//104.168.236.46/api/v2/ajax using the fixed User-Agent string Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36.

To achieve persistence on the system, the program creates a service in the registry called ‘Windows Defenders Service’ that starts automatically when the user logs on.

—Begin Registry Settings—
HKLMSystemCurrentControlSetserviceswindefendersType. Data: 272
HKLMSystemCurrentControlSetserviceswindefendersStart. Data: 2
HKLMSystemCurrentControlSetserviceswindefendersErrorControl. Data: 1
HKLMSystemCurrentControlSetserviceswindefendersImagePath    Data: “C:Program Files (x86)Common Fileswindefendersmsmpenge.exe”
HKLMSystemCurrentControlSetserviceswindefendersDisplayName    Data: Windows Defenders
HKLMSystemCurrentControlSetserviceswindefendersWOW64. Data: 1
HKLMSystemCurrentControlSetserviceswindefendersObjectName. Data: LocalSystem
HKLMSystemCurrentControlSetserviceswindefende37337060DeleteFlag. Data: 1
HKLMSystemCurrentControlSetserviceswindefende37337060Start. Data: 4
HKLMSystemCurrentControlSetserviceswindefendersDescription    Data: Windows Defenders Service
—End Registry Settings—

It may also create an autorun entry in the registry at HKLMSoftwareMicrosoftWindowsCurrent VersionRun.

The malware creates a hidden folder called ‘windefenders’ in the path C:Program Files (x86)Common Files where it will copy the PE file ‘msmpeng.exe’ along with the GUID file, ‘config.ini’, the malicious library ‘vftrace.dll’, and the encrypted configuration file ‘thumb.dat’. A second hidden folder called ‘windefenders’ is also created in the path C:ProgramData. This folder holds another instance of the PE file.

The program is capable of logging keystrokes, uploading and downloading files, and will also invoke RpcServerListen to wait for incoming Remote Procedure Call (RPC) connections. It will also open a pipe called ‘DeviceNamedPipetestpipe’ that it uses to pass commands from its daemon to any worker processes it may set up.

104.168.236.46

Tags

command-and-control

URLs
  • hxxps[:]//104.168.236.46/api/v2/ajax
Ports
  • 443 TCP
Whois

Domain Name: HOSTWINDSDNS.COM
Registry Domain ID: 1655837964_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.namecheap.com
Registrar URL: http://www.namecheap.com
Updated Date: 2021-06-25T06:27:14Z
Creation Date: 2011-05-12T23:01:53Z
Registry Expiry Date: 2029-05-12T23:01:53Z
Registrar: NameCheap, Inc.
Registrar IANA ID: 1068
Registrar Abuse Contact Email: abuse@namecheap.com
Registrar Abuse Contact Phone: +1.6613102107
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: DNS1.HOSTWINDSDNS.COM
Name Server: DNS2.HOSTWINDSDNS.COM
Name Server: DNS3.HOSTWINDSDNS.COM
Name Server: DNS4.HOSTWINDSDNS.COM
DNSSEC: unsigned

Domain name: hostwindsdns.com
Registry Domain ID: 1655837964_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.namecheap.com
Registrar URL: http://www.namecheap.com
Updated Date: 2020-04-27T12:40:10.00Z
Creation Date: 2011-05-12T23:01:53.00Z
Registrar Registration Expiration Date: 2029-05-12T23:01:53.00Z
Registrar: NAMECHEAP INC
Registrar IANA ID: 1068
Registrar Abuse Contact Email: abuse@namecheap.com
Registrar Abuse Contact Phone: +1.9854014545
Reseller: NAMECHEAP INC
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registry Registrant ID: Redacted for Privacy Purposes
Registrant Name: Redacted for Privacy Purposes
Registrant Organization: Redacted for Privacy Purposes
Registrant Street: Redacted for Privacy Purposes
Registrant City: Redacted for Privacy Purposes
Registrant State/Province: WA
Registrant Postal Code: Redacted for Privacy Purposes
Registrant Country: US
Registrant Phone: Redacted for Privacy Purposes
Registrant Phone Ext: Redacted for Privacy Purposes
Registrant Fax: Redacted for Privacy Purposes
Registrant Fax Ext: Redacted for Privacy Purposes
Registrant Email: Select Contact Domain Holder link at https://www.namecheap.com/domains/whois/result?domain=hostwindsdns.com
Registry Admin ID: Redacted for Privacy Purposes
Admin Name: Redacted for Privacy Purposes
Admin Organization: Redacted for Privacy Purposes
Admin Street: Redacted for Privacy Purposes
Admin City: Redacted for Privacy Purposes
Admin State/Province: Redacted for Privacy Purposes
Admin Postal Code: Redacted for Privacy Purposes
Admin Country: Redacted for Privacy Purposes
Admin Phone: Redacted for Privacy Purposes
Admin Phone Ext: Redacted for Privacy Purposes
Admin Fax: Redacted for Privacy Purposes
Admin Fax Ext: Redacted for Privacy Purposes
Admin Email: Select Contact Domain Holder link at https://www.namecheap.com/domains/whois/result?domain=hostwindsdns.com
Registry Tech ID: Redacted for Privacy Purposes
Tech Name: Redacted for Privacy Purposes
Tech Organization: Redacted for Privacy Purposes
Tech Street: Redacted for Privacy Purposes
Tech City: Redacted for Privacy Purposes
Tech State/Province: Redacted for Privacy Purposes
Tech Postal Code: Redacted for Privacy Purposes
Tech Country: Redacted for Privacy Purposes
Tech Phone: Redacted for Privacy Purposes
Tech Phone Ext: Redacted for Privacy Purposes
Tech Fax: Redacted for Privacy Purposes
Tech Fax Ext: Redacted for Privacy Purposes
Tech Email: Select Contact Domain Holder link at https://www.namecheap.com/domains/whois/result?domain=hostwindsdns.com
Name Server: dns1.hostwindsdns.com
Name Server: dns2.hostwindsdns.com
Name Server: dns3.hostwindsdns.com
Name Server: dns4.hostwindsdns.com
DNSSEC: unsigned

Relationships
104.168.236.46 Connected_From 52072a8f99dacd5c293fccd051eab95516d8b880cd2bc5a7e0f4a30d008e22a7
Description

During analysis, the file vftrace.dll attempted to connect to this domain.

f1a2791eebaea183f399110c9e8ae11c67f5bebf93a5573d1ac3c56fc71b2230

Details
Name config.ini
Size 49 bytes
Type ASCII text, with CRLF line terminators
MD5 9d8d7d7bb357ee37a6ae71c5140f28b9
SHA1 40fc8b1a691339b9fa1526970ff2a2e1d3f899d7
SHA256 f1a2791eebaea183f399110c9e8ae11c67f5bebf93a5573d1ac3c56fc71b2230
SHA512 1d30fb579e0dba09b24669a5a981652f1f6404d2f536e8e640c48585b3035d0826fed15279568400418c19849e17489baccd18e35b53f8cdbc196a0dd5abd496
ssdeep 3:pSMk0eR2Hxm+yn:pSMFeR2Vy
Entropy 4.546046
Antivirus

No matches found.

YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
f1a2791eeb… Created_By 52072a8f99dacd5c293fccd051eab95516d8b880cd2bc5a7e0f4a30d008e22a7
Description

This artifact contains a GUID that is generated by the malware to uniquely identify the system during communication with the C2.

f2ba8b8aabf73020febd3a925276d52ce88f295537fe57723df714c13f5a8780

Tags

backdoorkeylogger

Details
Name thumb.dat
Size 58274 bytes
Type data
MD5 84f09d192ec90542ede22c370836ffa6
SHA1 7fb23c6b4db90b55694bdd1cc5c1b4c706a4e181
SHA256 f2ba8b8aabf73020febd3a925276d52ce88f295537fe57723df714c13f5a8780
SHA512 56474f45eed25ab86ac9d17b6afb69e0dee07fe507fc5ac4e22ebae0d124700c533dc2adaaaf4be096a5dab27f7f88c21b290cca600576dbf8f10482f2f62d8b
ssdeep 1536:xy98XehX2k0xfXGxGKt5mzvOOIE3CYzahbdoZJI7Vq:xRX0X90KNtevUXYzahbdfq
Entropy 7.301514
Antivirus

No matches found.

YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
f2ba8b8aab… Created_By 52072a8f99dacd5c293fccd051eab95516d8b880cd2bc5a7e0f4a30d008e22a7
Description

This artifact is the encrypted configuration data that is read by 52072a8f99dacd5c293fccd051eab95516d8b880cd2bc5a7e0f4a30d008e22a7 detailed in this report. The decrypted strings in the configuration are listed below:

—Begin Decrypted Strings—
system -k networkservice
svchost.exe
localservice -k localservice
networkservice
clip.log
rb %04/%02d%02d:%02d:%02d
ab+
SOFTWAREMicrosoft
config_ : %d %d %d %d
config.ini
Guid
Config %08X%04X%04X%02X%02X%02X%02X%02X%02X%02X%02X
RtlGetVersion
ntdll.dll
Vista
Win2008
Win7
Win2008(R2)
Win8
Win2012
Win8.1
Win2012(R2)
WinXp
Win2003
Win10
Win2016
IsWow64Process
kernel32
open
%d/%d/%d %d:%d
key.log
explorer.exe
/api/v2/ajax
POST
https://%s:%d/api/v2/ajax
pipetestpipe
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
config.ini
SOFTWAREMicrosoftWindowsCurrentVersionRun
log.log
%s%d
exe
wb
Kernel32.dll
msiexec.exe
cmd.exe
ntdll
SeDebugPrivilege
runas
taskmgr
exe
ccc
bbb
aaa
windefende%d
80A85553-1E05-4323-B4F9-43A4396A4507
Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36

—End Decrypted Strings—

This configuration allows the malware to connect to its C2, create persistence on the system, log keystrokes and telemetry data, and execute commands from the command line.

Relationship Summary

df847abbfa… Used 52072a8f99dacd5c293fccd051eab95516d8b880cd2bc5a7e0f4a30d008e22a7
52072a8f99… Connected_To 104.168.236.46
52072a8f99… Used_By df847abbfac55fb23715cde02ab52cbe59f14076f9e4bd15edbe28dcecb2a348
52072a8f99… Created f1a2791eebaea183f399110c9e8ae11c67f5bebf93a5573d1ac3c56fc71b2230
52072a8f99… Created f2ba8b8aabf73020febd3a925276d52ce88f295537fe57723df714c13f5a8780
104.168.236.46 Connected_From 52072a8f99dacd5c293fccd051eab95516d8b880cd2bc5a7e0f4a30d008e22a7
f1a2791eeb… Created_By 52072a8f99dacd5c293fccd051eab95516d8b880cd2bc5a7e0f4a30d008e22a7
f2ba8b8aab… Created_By 52072a8f99dacd5c293fccd051eab95516d8b880cd2bc5a7e0f4a30d008e22a7

Conclusion

The following MITRE ATT&CK tactics and techniques were observed during analysis of these samples.

T1543.003 Persistence: Create or Modify System Process. Adversaries may create or modify Windows services to repeatedly execute malicious payloads as part of persistence. When Windows boots up, it starts programs or applications called services that perform background system functions. Windows service configuration information, including the file path to the service’s executable or recovery programs/commands, is stored in the Windows Registry. Service configurations can be modified using utilities such as sc.exe and Reg.

T1574.002 Hijack Execution Flow: DLL Side-Loading. Adversaries may execute their own malicious payloads by side-loading DLLs. Side-loading involves hijacking which DLL a program loads. But rather than just planting the DLL within the search order of a program then waiting for the victim application to be invoked, adversaries may directly side-load their payloads by planting then invoking a legitimate application that executes their payload(s).

T1567.000 Exfiltration: Exfiltration Over Web Service. Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. Popular Web services acting as an exfiltration mechanism may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to compromise. Firewall rules may also already exist to permit traffic to these services.

T1560.000 Collection: Archive Collected Data. An adversary may compress and/or encrypt data that is collected prior to exfiltration. Compressing the data can help to obfuscate the collected data and minimize the amount of data sent over the network. Encryption can be used to hide information that is being exfiltrated from detection or make exfiltration less conspicuous upon inspection by a defender.

Recommendations

CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization’s systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.

  • Maintain up-to-date antivirus signatures and engines.
  • Keep operating system patches up-to-date.
  • Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
  • Restrict users’ ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
  • Enforce a strong password policy and implement regular password changes.
  • Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
  • Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
  • Disable unnecessary services on agency workstations and servers.
  • Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its “true file type” (i.e., the extension matches the file header).
  • Monitor users’ web browsing habits; restrict access to sites with unfavorable content.
  • Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).
  • Scan all software downloaded from the Internet prior to executing.
  • Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).

Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, “Guide to Malware Incident Prevention & Handling for Desktops and Laptops”.

Contact Information

CISA continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://us-cert.cisa.gov/forms/feedback/

Document FAQ

What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-888-282-0870 or CISA Service Desk.

Can I submit malware to CISA? Malware samples can be submitted via three methods:

CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA’s homepage at www.cisa.gov.