BatLoader Continues to Abuse Google Search Ads to Deliver Vidar…

BatLoader continues to abuse Google Search Ads to deliver Vidar Stealer and Ursnif by masquerading as legitimate software and using Windows Installer and Python-based loaders to fetch and run payloads. The campaign also impersonates popular apps (ChatGPT, Zoom, Adobe, etc.) and leverages a Python loader chain with PyArmor obfuscation to deploy malicious payloads and perform system reconnaissance and defense evasion. #BatLoader #Vidar

Keypoints

  • BatLoader leverages Google Search Ads to impersonate legitimate software like WinRAR and deliver malicious Windows Installer files.
  • The MSI contains Custom Actions that execute commands, including a hidden batch file that installs Python and launches Python scripts.
  • BatLoader uses PyArmor to protect Python loader scripts and relies on PyArmor-Unpacker to unpack them, then downloads and decrypts payloads.

MITRE Techniques

  • [T1189] Drive-by Compromise – Delivery via Google Search Ads impersonating software. Quote: ‘Google Search Ads were used to impersonate software such as WinRAR to deliver malicious Windows Installer files.’
  • [T1036] Masquerading – Windows Installer files masquerading as the above applications to launch embedded Python scripts. Quote: ‘Windows Installer files masquerading as the above applications to launch embedded Python scripts.’
  • [T1543.003] Windows Installer – The MSI file contains Custom Actions to execute commands. Quote: ‘The batch file (figure 3, insert) performs the following actions:’
  • [T1059.001] PowerShell – The loader uses PowerShell to download and execute payloads. Quote: ‘uses PowerShell to download and execute payloads (Redline Stealer, Ursnif, etc.)’
  • [T1059.003] Command-Line/Batch – The batch file installs Python, installs packages, unpacks OpenSSL, and starts Python files. Quote: ‘The batch file … performs the following actions: 1. Installs Python 3.9.9 using an included setup binary. 2. Uses pip to install pywin32 and wmi packages. 3. Unpacks the compressed OpenSSL library files using PowerShell into multiple locations. 4. Starts two Python files in sequence after a short timeout.’
  • [T1027] Obfuscated/Compressed Files and Information – Python files are protected with PyArmor and unpacked with PyArmor-Unpacker. Quote: ‘two Python files … were protected using PyArmor and require unpacking with tools such as PyArmor-Unpacker.’
  • [T1218] Signed Binary Proxy Execution – WorkFolder.exe is used with a signed execution LOLBAS technique to execute control.exe. Quote: ‘leveraging a signed execution LOLBAS technique to execute control.exe.’
  • [T1055] Process Injection – Ursnif’s binary is injected into the Explorer process. Quote: ‘the Ursnif binary which is injected into the Explorer process.’
  • [T1016] System Network Configuration Discovery – Python checks for domain-joined systems with ARP table characteristics before payload selection. Quote: ‘checks for curating payloads for domain-joined systems with more than 2 IP neighbors in the system’s ARP table.’
  • [T1562.001] Impair Defenses – Defender settings are modified to exclude paths, processes, and file extensions. Quote: ‘Decrypt control.exe.enc using the OpenSSL library … and the file is saved as control.exe.’
  • [T1547.001] Boot or Logon Autostart: Registry Run Keys – Ursnif persistence via a registry Run key. Quote: ‘Registry run key under HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun.’

Indicators of Compromise

  • [Domain] ChatGPT impersonation domains – chatgpt-t[.]com, zoomvideor[.]com, adobe-l[.]com, and other brand impersonation domains referenced for delivery pages.
  • [Domain] Additional brand impersonation domains used as hosting/imposter pages – e.g., spotify-uss[.]com, tableau-r[.]com, adobe-e[.]com, anydesk-o[.]com, anydesk-r[.]com, java-s[.]com, java-r[.]com, java-a[.]com, basecamp-a[.]com, adobe-a[.]com, visualstudio-t[.]com, openoffice-a[.]com, bitwarden-t[.]com, gimp-t[.]com, figma-t[.]com6.
  • [MD5] 3db1edc5b5550f54abdcb5520cf91d75 – Vidar
  • [MD5] 0cb75b1192b23b8e03d955f1156ad19e – Ursnif
  • [MD5] 85fbc743bb686688ce05cf3289507bf7 – Ursnif
  • [MD5] 11ae3dabdb2d2458da43558f36114acb – AdobeSetup.msi (BatLoader)
  • [MD5] 9ebbe0a1b79e6f13bfca014f878ddeec – AdobeSetup.msi (BatLoader)
  • [URL] shvarcnegerhistory[.]com – BatLoader C2
  • [URL] Pixelarmada[.]su – BatLoader C2
  • [Domain] Ursnif C2 domains – uelcoskdi[.]ru, iujdhsndjfks[.]ru, isoridkf[.]ru, gameindikdowd[.]ru, jhgfdlkjhaoiu[.]su, reggy506[.]ru, reggy914[.]ru

Read more: https://www.esentire.com/blog/batloader-continues-to-abuse-google-search-ads-to-deliver-vidar-stealer-and-ursnif