APT28 campaign directed against Polish government institutions

Polish CERT Polska and CSIRT MON linked a large-scale malware campaign targeting Polish government institutions to APT28, associated with GRU. The operation uses phishing emails with link redirection, free services (run.mocky.io and webhook.site), and DLL side-loading to deliver a staged payload.

Keypoints

  • Apt28 activity set is associated with the GRU and observed against Polish government institutions.
  • Phishing emails lure recipients to click a link rather than delivering direct malware.
  • The campaign uses run.mocky.io and webhook.site to redirect and log queries, reducing detection and cost.
  • A ZIP payload hides a disguised IMG-XXX.jpg.exe that triggers a DLL side-loading chain.
  • The archive contains a disguised WindowsCodecs.dll and a BAT script to execute additional payloads.
  • The operation shows a multi-stage downloader/loader with web-based C2 communications and data collection.

MITRE Techniques

  • [T1566.002] Spearphishing Link – The campaign sent e-mails with content intended to arouse the recipient’s interest and persuade him to click on the link. [The campaign sent e-mails with content intended to arouse the recipient’s interest and persuade him to click on the link.]
  • [T1204.002] User Execution – If the victim runs the file IMG-238279780.jpg.exe which is a harmless calculator, during startup it will try to load a library WindowsCodecs.dll that was substituted by the attackers. This is a technique known as DLL Side-Loading. [If the victim runs the file IMG-238279780.jpg.exe which is a harmless calculator, during startup it will try to load a library WindowsCodecs.dll that was substituted by the attackers. This is a technique known as DLL Side-Loading.]
  • [T1574.002] Hijack Execution Flow – DLL Side-Loading – The archive actually substitutes WindowsCodecs.dll to load the attacker-provided BAT script. [This is a technique known as DLL Side-Loading.]
  • [T1071.001] Web Protocols – The campaign uses web services (webhook.site and run.mocky.io) as a C2/logging channel and delivery conduit via HTTP(S). [The link directs to an address in the domain run.mocky.io. It is a free service used by developers to create and test APIs. In this case, it was used only to redirect to another website webhook.site allowing logging all queries to the generated address and configuring responses to them.]
  • [T1059.003] Windows Command Shell – The BAT script and subsequent commands operate via batch scripting and Windows command-line actions to download and execute payloads. [The BAT script opens the Microsoft Edge browser, which loads the base64-encoded page content to download another batch script (also using the website webhook.site).]

Indicators of Compromise

  • [URL] C2/Delivery Domains – https://run.mocky.io/v3/87f277a5-a081-4976-8e12-351b6c02a903?q=2d07e34c-3dd3-45e8-865c-3888a65ab885, https://webhook.site/2d07e34c-3dd3-45e8-865c-3888a65ab885
  • [URL] C2/Delivery Domains – https://webhook.site/4ba464d9-0675-4a7a-9966-8f84e93290ba, https://webhook.site/577b82c3-7249-44e9-9353-5eab106fead6
  • [Domain] C2 Infrastructure – run.mocky.io, webhook.site
  • [SHA256] File/Component Hashes – 2bd9591bea6b1f4128e4819e3888b45b193d5a2722672b839ad7ae120bf9af3d, 4001498463dc8f8010ef1cc803b67ac434ff26d67d132933a187697aa2e88ef1
  • [Filename] Samples/Components – IMG-1030873974629655576.zip, WindowsCodecs.dll
  • [Filename] Samples/Components – IMG-238279780.zip, IMG-238279780.jpg

Read more: https://cert.pl/en/posts/2024/05/apt28-kampania/