ASEC reports re-distribution of the CHM malware, attributed to the RedEyes threat group, leveraging Fukushima wastewater news to lure victims. The malware persists via a RUN registry key and uses an mshta-driven PowerShell backdoor to communicate with a C2 server and perform file operations. hashtags: #CHM #RedEyes
Keypoints
- CHM malware distribution is linked to the RedEyes threat group and is re-emerging after prior campaigns.
- The attack uses topical Fukushima wastewater release as a lure to provoke user curiosity and prompt execution.
- The CHM file registers a command to the RUN key to achieve persistence, enabling execution at startup.
- An mshta-based mechanism loads a JavaScript that decodes and runs a PowerShell backdoor, providing command-and-control capabilities.
- The backdoor communicates with a C2 server (example endpoints at navercorp[.]ru) to receive commands and report results.
- The malware supports extensive commands (fileinfo, dir, file, down, regedit, task, zip, rename, del) for data collection, exfiltration, and system modification.
MITRE Techniques
- [T1059.001] PowerShell β The decoded PowerShell command is a backdoor responsible for registering the RUN key to establish persistence, receiving commands from the threat actorβs server, and transmitting the command execution results. It receives commands from the threat actorβs server, and according to the commands, can perform various malicious behaviors such as uploading/downloading files, transmitting information on specific files, and editing the registry.
- [T1218.005] Signed Binary Proxy Execution: Mshta β The mshta command used to be executed directly by the CHM file (hh.exe), but the recently distributed file registers the command to the RUN key enabling it to be run when the system reboots.
- [T1547.001] Registry Run Keys/Startup Folder β RUN key registration enables persistence; Registry path and command show the mechanism that keeps the malware active after reboot.
- [T1071.001] Web Protocols β The C2 channel uses HTTP endpoints to receive commands and transmit results (e.g., hxxp://navercorp[.]ru/dashboard/image/202302/com.php?U=[Computer name]-[User name] // Receive the threat actorβs command).
- [T1074.001] Data Staged β Saves the list of files and their properties (name, size, last modified time) to CSV, transmits this file to the C2 server, then deletes it locally.
- [T1560.001] Archive Collected Data β Compresses folders in a certain path, transmits them to the C2 server, then deletes them from the local system.
- [T1112] Modify Registry β Edits the registry via the regedit command.
- [T1053.005] Scheduled Task β Adds a Task Scheduler entry to run at 10-minute intervals.
- [T1041] Exfiltration Over C2 Channel β The malware can upload/download files and transmit information to the C2 server.
- [T1140] Deobfuscate/Decode Files or Information β The payload contains an encoded PowerShell command invoked through a JavaScript in the fetched URL.
Indicators of Compromise
- [Hash] context β 52f71fadf0ea5ffacd753e83a3d0af1a
- [URL] context β hxxp://navercorp[.]ru/dashboard/image/202302/4.html
- [URL] context β hxxp://navercorp[.]ru/dashboard/image/202302/com.php
- [IP] context β 2.2.2.2 (appears within the PowerShell command)
- [Domain] context β navercorp.ru
Read more: https://asec.ahnlab.com/en/56857/