Unit 42 researchers analyzed a fake PoC for CVE-2023-40477 in WinRAR that ultimately delivered VenomRAT via a multi-stage infection chain based on a PoC for CVE-2023-25157. The actors used social engineering and publicly available PoC code to lure miscreants into executing the payload and establish a persistent C2 via a VenomRAT variant. #WinRAR #CVE202340477 #VenomRAT #GeoServer #CVE202325157 #checkblacklistwords.eu #whalersplonk
Keypoints
- The fake PoC for CVE-2023-40477 was released by the threat actor alias whalersplonk after the vulnerability was publicly disclosed.
- The PoC was based on an open-source PoC for CVE-2023-25157 in GeoServer and modified before distribution.
- The infection chain culminates in a VenomRAT payload, delivered via a Python PoC script, a batch file, and PowerShell-stage downloads.
- The malware uses checkblacklistwords.eu as a C2/loader domain and communicates with 94.156.253.109:4449 as the VenomRAT C2.
- Persistence is achieved by creating a scheduled task named Windows.Gaming.Preview to run the payload periodically.
- The campaign includes social engineering (README with usage instructions and a video) to entice victims to run the PoC.
MITRE Techniques
- [T1203] Exploitation for Client Execution – The WinRAR CVE-2023-40477 vulnerability allows an attacker to execute code on a system that opens a malicious file. ‘The CVE-2023-40477 vulnerability in WinRAR allows an attacker to execute code on a system that opens a malicious file.’
- [T1204.002] User Execution – The fake PoC is designed to be run by targets and leads to a VenomRAT payload; ‘The fake PoC meant to exploit this WinRAR vulnerability was based on publicly available PoC code… will install a VenomRAT payload.’
- [T1059.001] PowerShell – The batch script downloads and executes a PowerShell script from a remote URL; ‘The batch script hosted at the URL above runs an encoded PowerShell script that will download another PowerShell script from checkblacklistwords[.]eu/c.txt.’
- [T1105] Ingress Tool Transfer – The PoC adds code that downloads an executable from remote sources (checkblacklistwords[.]eu/words.txt) and runs it; ‘downloads an executable from checkblacklistwords[.]eu/words.txt’.
- [T1053.005] Scheduled Task – A scheduled task named Windows.Gaming.Preview is created to run the payload every three minutes; ‘creates a scheduled task named Windows.Gaming.Preview that runs the executable every three minutes to persistently run the payload.’
- [T1057] Process Discovery – The analysis notes running processes related to the attack; ‘Table 2 shows … running processes.’
- [T1056.001] Keylogging – The VenomRAT variant includes keylogging functionality; ‘logs keystrokes to %APPDATA%MyDataDataLogs_keylog_offline.txt.’
- [T1041] Exfiltration – The malware uploads the offline keylogger file back to the C2 channel; ‘Uploads the offline key logger file from %APPDATA%MyDataDataLogs_keylog_offline.txt.’
- [T1071.001] Web Protocols – The malware uses HTTP-based C2 communications and a domain-based loader; ‘The Windows.Gaming.Preview.exe communicates with its C2 server’ and ‘checkblacklistwords[.]eu’ domains/URLs.
Indicators of Compromise
- [File] 7fc8d002b89fcfeb1c1e6b0ca710d7603e7152f693a14d8c0b7514d911d04234 – CVE-2023-40477-main.zip
- [File] ecf96e8a52d0b7a9ac33a37ac8b2779f4c52a3d7e0cf8da09d562ba0de6b30ff – poc.py
- [File] c2a2678f6bb0ff5805f0c3d95514ac6eeaeacd8a4b62bcc32a716639f7e62cc4 – bat.bat
- [File] b99161d933f023795afd287915c50a92df244e5041715c3381733e30b666fd3b – c.ps1
- [File] b77e4af833185c72590d344fd8f555b95de97ae7ca5c6ff5109a2d204a0d2b8e – Windows.Gaming.Preview.exe
- [IPv4] 94.156.253[.]109 – VenomRAT C2
- [Domain] checkblacklistwords[.]eu – Hosted files in infection chain
- [URL] http://checkblacklistwords[.]eu/check-u/robot?963421355?Ihead=true – Hosted bat.bat
- [URL] http://checkblacklistwords[.]eu/c.txt – Hosted c.ps1
- [URL] http://checkblacklistwords[.]eu/words.txt – Hosted Windows.Gaming.Preview.exe
Read more: https://unit42.paloaltonetworks.com/fake-cve-2023-40477-poc-hides-venomrat/