Unit 42 investigates a destructive, data-theft campaign attributed to the Iranian-linked Agonizing Serpens (Agrius) APT, targeting Israeli higher-education and tech sectors from January to October 2023. The operation blends data exfiltration with new wipers (MultiLayer, PartialWasher, BFG Agonizer) and novel tooling (Sqlextractor), while demonstrating upgraded anti-EDR and anti-forensic techniques. #AgonizingSerpens #Agrius #BlackShadow #PinkSandstorm #DEV-0022 #MultiLayer #PartialWasher #BFGAgonizer #Sqlextractor #IsraeliEducation #IsraeliTech
Keypoints
- Agonizing Serpens (aka Agrius) is an Iranian-linked APT responsible for the attacks.
- Targets were Israeli education and technology organizations across multiple sectors during 2023.
- Attack chain includes initial access via vulnerable public-facing servers and web shells (ASPXSpy variants).
- Credential theft featured Mimikatz, SMB password spraying/brute-forcing, and SAM dumping.
- Lateral movement relied on Plink/SSH for remote tunneling to other machines.
- Data theft from databases (Sqlextractor) followed by exfiltration using WinSCP/Putty.
- Wipers (MultiLayer, PartialWasher, BFG Agonizer) perform staged destruction and anti-forensic actions, including timestomping and boot-sector wiping.
MITRE Techniques
- [T1190] Exploit Public-Facing Application – Initial access via exploiting vulnerable internet-facing web servers. ‘The attackers gained initial access to the environment by exploiting vulnerable internet facing web servers.’
- [T1505.003] Web Shell – Deployment and use of ASPXSpy-like web shells (Uploader.aspx, xcopy.aspx) to foothold and move laterally. ‘The web shells that threat actors used in the described attack… variations to the naming of functions.’
- [T1046] Network Service Discovery – Reconnaissance using Nbtscan, WinEggDrop, and NimScan to map the network. ‘Nbtscan, renamed as systems.txt, to scan the network for existing hosts.’
- [T1046] Network Service Discovery – Further reconnaissance with WinEggDrop and NimScan for port scanning. ‘WinEggDrop… to scan particular hosts of interest.’
- [T1046] Network Service Discovery – Additional port scanning reference with NimScan. ‘NimScan is another publicly available port scanner that the attackers used in the attack.’
- [T1003] Credential Dumping – Obtaining admin credentials via Mimikatz, SMB password spraying/brute force, and SAM dumping. ‘Mimikatz (filename: Mimi.exe)… Dumping the SAM file.’
- [T1021.004] SSH – Lateral movement using Plink to create remote tunnels and connect to remote machines. ‘Plink (renamed as systems.exe) to create remote tunneling and establish connections to remote machines.’
- [T1041] Exfiltration Over C2 Channel – Exfiltrating data to C2 servers using WinSCP and PuTTY. ‘they exfiltrated this information to the attackers’ C2 servers, using different publicly available tools such as WinSCP and Putty.’
- [T1560.001] Archive Collected Data – Archiving data with 7za.exe prior to exfiltration. ‘7za.exe to archive the extracted data in preparation for exfiltration.’
- [T1485] Data Destruction – Wiper payloads (MultiLayer, BFG Agonizer) overwrite data to prevent recovery. ‘Locally stored files are corrupted and overwritten with random data to thwart file recovery efforts.’
- [T1070.006] Timestomp – Masquerade by altering file timestamps. ‘The malware timestomps according to the file system.’
- [T1070.001] Clear Windows Event Logs – MultiLayer deletes event logs via a scheduled task. ‘DeleteLogs() function to create a scheduled task that launches a batch script… removes all the Windows Event Logs.’
- [T1107] File Deletion – Self-deletion and removal of its components. ‘SelfDelete()’ and batch-based removal of traces.
- [T1562.001] Impair Defenses – Anti-hooking and BYOVD driver techniques to bypass security tools. ‘anti-hooking techniques… BYOVD technique.’
Indicators of Compromise
- [IP] Infrastructure – 185.105.46[.]34, 185.105.46[.]19, and 4 more items (e.g., 93.188.207[.]110, 109.237.107[.]212, 217.29.62[.]166, 81.177.22[.]182)
- [SHA256] Web shell hashes – 1ea4d26a31dad637d697f9fb70b6ed4d75a13d101e02e02bc00200b42353985c, 62e36675ed7267536bd980c07570829fe61136e53de3336eebadeca56ab060c2
- [SHA256] Nbtscan hash – 63d51bc3e5cf4068ff04bd3d665c101a003f1d6f52de7366f5a2d9ef5cc041a7
- [SHA256] WinEggDrop hash – 49c3df62c4b62ce8960558daea4a8cf41b11c8f445e218cd257970cf939a3c25
- [SHA256] NimScan hash – dacdb4976fd75ab2fd7bb22f1b2f9d986f5d92c29555ce2b165c020e2816a200, e43d66b7a4fa09a0714c573fbe4996770d9d85e31912480e73344124017098f9
- [SHA256] Mimikatz – 2a6e3b6e42be2f55f7ab9db9d5790b0cc3f52bee9a1272fc4d79c7c0a3b6abda
- [SHA256] ProcDump – 5d1660a53aaf824739d82f703ed580004980d377bdc2834f1041d512e4305d07, f4c8369e4de1f12cc5a71eb5586b38fc78a9d8db2b189b8c25ef17a572d4d6b7
- [SHA256] Plink – 13d8d4f4fa483111e4372a6925d24e28f3be082a2ea8f44304384982bd692ec9
- [SHA256] Sqlextractor – a8e63550b56178ae5198c9cc5b704a8be4c8505fea887792b6d911e488592a7c
- [SHA256] Pscp.exe – a112e78e4f8b99b1ceddae44f34692be20ef971944b98e2def995c87d5ae89ee
- [SHA256] MultiLayer wiper – 38e406b17715b1b52ed8d8e4defdb5b79a4ddea9a3381a9f2276b00449ec8835, f65880ef9fec17da4142850e5e7d40ebfc58671f5d66395809977dd5027a6a3e
- [SHA256] PartialWasher Wiper – ec7dc5bfadce28b8a8944fb267642c6f713e5b19a9983d7c6f011ebe0f663097
- [SHA256] BFG Agonizer Wiper – c52525cd7d05bddb3ee17eb1ad6b5d6670254252b28b18a1451f604dfff932a4
- [SHA256] GMER Loader – agmt.exe – 8967c83411cd96b514252df092d8d3eda3f7f2c01b3eef1394901e27465ff981, a2d8704b5073cdc059e746d2016afbaecf8546daad3dbfe4833cd3d41ab63898
- [SHA256] GMER Driver – 18c909a2b8c5e16821d6ef908f56881aa0ecceeaccb5fa1e54995935fcfd12f7
- [SHA256] Rentdrv2 Loader – drvIX.exe – 2fb88793f8571209c2fcf1be528ca1d59e7ac62e81e73ebb5a0d77b9d5a09cb8
- [SHA256] Rentdrv2 Driver – 9165d4f3036919a96b86d24b64d75d692802c7513f2b3054b20be40c212240a5
Read more: https://unit42.paloaltonetworks.com/agonizing-serpens-targets-israeli-tech-higher-ed-sectors/