CRIL identified a commodity loader used by multiple threat actors in targeted email campaigns that primarily impacted Manufacturing and Government organizations in Italy, Finland, and Saudi Arabia. The multi-stage, fileless infection chain uses weaponized Office documents (CVE-2017-11882), steganographic PNGs hosted on Archive.org, trojanized TaskScheduler assemblies, reflective loading and process hollowing to deliver payloads such as PureLog Stealer to a C2 at 38.49.210[.]241. #PureLogStealer #TaskScheduler
Keypoints
- CRIL tracked a commodity loader shared across multiple high-capability threat actors delivering RATs and infostealers to targeted sectors, especially Manufacturing and Government in Europe and the Middle East.
- Initial infections used targeted phishing with RAR/ZIP attachments and weaponized Office documents exploiting CVE-2017-11882, as well as malicious SVG and LNK-based archives.
- A unified four-stage, largely fileless execution chain includes obfuscated JavaScript, hidden PowerShell retrieval, steganographic PNG extraction, reflective .NET loading, trojanized TaskScheduler assembly, and process hollowing into RegAsm/AddInProcess32.
- Steganography and trojanization of open-source libraries were used to evade detection: payloads were embedded in PNGs hosted on legitimate services (Archive.org, Pixeldrain) and malicious functions appended to trusted .NET libraries.
- The final payload observed in analyzed samples was PureLog Stealer, which exfiltrates browser credentials, crypto wallet data, email and VPN credentials, and system telemetry to C2 38.49.210[.]241.
- A novel UAC bypass was noted where the malware monitors process creation and opportunistically triggers UAC prompts to obtain elevated PowerShell execution through user approval.
MITRE Techniques
- [T1566.001 ] Phishing: Spearphishing Attachment â Targeted phishing emails with malicious attachments masquerading as Purchase Orders (âmasquerading as legitimate Purchase Order communications from business partnersâ).
- [T1190 ] Exploit Public-Facing Application â Use of an exploit for CVE-2017-11882 in Microsoft Equation Editor to weaponize Office documents (âexploiting CVE-2017-11882â).
- [T1204.002 ] User Execution: Malicious File â Victims open JavaScript, VBScript, or LNK files delivered in archives (âExtraction of the RAR archive reveals a first-stage malicious JavaScript payload, PO No 602450.jsâ).
- [T1059.007 ] Command and Scripting Interpreter: JavaScript â Heavily obfuscated JavaScript reconstructs strings and spawns PowerShell to retrieve second-stage payloads (âThe de-obfuscated JavaScript creates a hidden PowerShell processâ).
- [T1059.001 ] Command and Scripting Interpreter: PowerShell â Hidden PowerShell instance retrieves steganographic payloads and decodes assemblies for reflective loading (âThe decoded PowerShell script functions as a second-stage loader, retrieving a malicious PNG fileâ).
- [T1047 ] Windows Management Instrumentation â WMI objects used to spawn hidden PowerShell processes (âcreates a hidden PowerShell process using WMI objects (winmgmts:rootcimv2)â).
- [T1027 ] Obfuscated Files or Information â Multi-layer obfuscation including base64 and string manipulation used throughout the chain (âMulti-layer obfuscation using base64 encoding and string manipulationâ).
- [T1027.003 ] Steganography â Payloads steganographically embedded in PNG images hosted on Archive.org and other services (âmalicious payload hidden within PNG image filesâ).
- [T1620 ] Reflective Code Loading â .NET assembly loaded reflectively in memory to avoid disk writes (âreflected in memory via Reflection.Assembly::Loadâ).
- [T1055.012 ] Process Injection: Process Hollowing â Loader creates a suspended RegAsm.exe and injects the decoded payload into its memory (âcreates a new suspended RegAsm.exe process and injects the decoded payload into its memory spaceâ).
- [T1036.005 ] Masquerading: Match Legitimate Name or Location â Execution through legitimate Windows utilities and trojanized libraries to blend with normal activity (âweaponizing the legitimate open-source TaskScheduler libraryâ and use of RegAsm/AddInProcess32).
- [T1548.002 ] Abuse Elevation Control Mechanism: Bypass User Account Control â UAC bypass that monitors process creation and triggers prompts to gain elevated PowerShell execution (âmonitors process creation events and opportunistically triggered UAC promptsâ).
- [T1497.003 ] Virtualization/Sandbox Evasion: Time-Based Evasion â Use of a 5-second sleep delay to evade automated sandbox analysis (âwith a 5-second sleep delayâ).
- [T1552.001 ] Unsecured Credentials: Credentials In Files â Extraction of credentials from stored files and browser databases (âExtraction of credentials from browser databases and configuration filesâ).
- [T1555.003 ] Credentials from Password Stores: Credentials from Web Browsers â Harvesting saved passwords, cookies, and tokens from multiple browser types (âData harvested from a wide range of Chromium-based browsers⌠Firefox-based browsersâ).
- [T1555 ] Credentials from Password Stores â Extraction from password manager applications and browser-based password stores (âExtraction of credentials from password manager applicationsâ).
- [T1082 ] System Information Discovery â Collection of hardware, OS, and network information for fingerprinting (âCollection of hardware, OS, and network informationâ).
- [T1518.001 ] Security Software Discovery â Enumeration of installed antivirus and security products (âEnumeration of installed antivirus productsâ).
- [T1005 ] Data from Local System â Collection of cryptocurrency wallets, VPN configs, and email data (âCollection of cryptocurrency wallets, VPN configs, and email dataâ).
- [T1114 ] Email Collection â Harvesting email credentials and configurations from desktop email clients (âHarvesting email credentials and configurations from email clientsâ).
- [T1102 ] Web Service â Abuse of Archive.org and other web services to host steganographic payloads (âretrieving a malicious PNG file from Archive.orgâ).
- [T1041 ] Exfiltration Over C2 Channel â Exfiltration of stolen data to C2 infrastructure at 38.49.210[.]241 (âData exfiltration to C2 server at 38.49.210.241â).
Indicators of Compromise
- [SHA-256 ] Sample and payload hashes â c1322b21eb3f300a7ab0f435d6bcf6941fd0fbd58b02f7af797af464c920040a, 5c0e3209559f83788275b73ac3bcc61867ece6922afabe3ac672240c1c46b1d3, and 4 more hashes.
- [URLs ] Malicious hosting and payload retrieval â hxxp://192[.]3.101[.]161/zeus/ConvertedFile[.]txt, hxxps://pixeldrain[.]com/api/file/7B3Gowyz, and 2 more Archive.org PNG URLs.
- [IP Address ] Command-and-control server â 38.49.210[.]241 (PureLog Stealer C2).
- [File names ] Malicious attachments and loader artifacts â PO No 602450.rar, PO No 602450.js, and Microsoft.Win32.TaskScheduler.dll (trojanized library).
- [Binary/process names ] Living-off-the-land binaries abused for execution â RegAsm.exe, AddInProcess32 (used for process hollowing and payload execution).
- [File types ] Steganographic payload carriers â PNG files hosted on Archive.org (e.g., MSI_PRO_with_b64[.]png) used to hide base64-encoded .NET assemblies.
Read more: https://cyble.com/blog/stealth-in-layers-unmasking-loader-in-targeted-email-campaigns/