Cyble CRIL identified a typosquatted Sophos domain (sopbos[.]com) that hosts an auto-downloading malware chain leading to a Cobalt Strike beacon. The dropper executes embedded PowerShell via a runspace to establish a reverse TCP connection to a hex-encoded C2 address. #CobaltStrike #Sophos #PowerShell #Runspace
Keypoints
- Cyble CRIL found a typosquatted Sophos domain impersonating Sophos Home to lure victims.
- The phishing site auto-downloads a malicious payload without requiring user interaction.
- A malicious .NET loader contains an embedded PowerShell script executed in a runspace.
- The final payload delivers a Cobalt Strike beacon that opens a reverse TCP shell.
- The PowerShell chain uses Base64 encoding, AES decryption, and decompression (Deflate/Gzip) with subsequent Invoke-Expression.
MITRE Techniques
- [T1566] Phishing β Brief description of how it was used. Quote relevant content using bracket (βThis malware reaches users via phishing sites.β)
- [T1204] User Execution β Brief description of how it was used. Quote relevant content using bracket (βThe user needs to manually execute the malicious file downloaded from the phishing site.β)
- [T1059] Command and Scripting Interpreter β Brief description of how it was used. Quote relevant content using bracket (βPowerShell scripts are used to execute the Cobalt Strike beacon.β)
- [T1202] Indirect Command Execution β Brief description of how it was used. Quote relevant content using bracket (βPowerShell commands are executed using a malicious executable.β)
- [T1036] Masquerading β Brief description of how it was used. Quote relevant content using bracket (βThe downloaded file is disguised as a Sophos installer.β)
- [T1140] Deobfuscate/Decode Files or Information β Brief description of how it was used. Quote relevant content using bracket (βPowerShell scripts are deobfuscated and decoded to get the Cobalt Strike beacon.β)
- [T1095] Non-Application Layer Protocol β Brief description of how it was used. Quote relevant content using bracket (βTCP is used by the Cobalt Strike beacon to interact with the C&C server.β)
Indicators of Compromise
- [Domain] Phishing Site β sopbos[.]com
- [IP] C2 β 98[.]71.232[.]223
- [MD5] File β c974ffe23d57ec909ef26b55f202047e
- [SHA1] File β ec6da5616d6b3b3269fababe104bfe04f2828717
- [SHA256] File β 067c95ad074afd8993281b02f74d0f257fb312943da0887355da652afb54c0ab
- [File Name] β SophosInstall..exe
Read more: https://cyble.com/blog/covert-delivery-of-cobalt-strike-beacon-via-sophos-phishing-website/