GlowSand describes a Ukraine-focused, multi-stage malware campaign leveraging documents with malicious macros to download staged payloads. It uses geofenced infrastructure and persistence via a scheduled task to maintain access and conduct system discovery and exfiltration.

Read more:
Hashtags: #GlowSand #Salmon #HotStart #DeprivePDF #QuicklyXML #Vipertos #Zvonishu #Ukraine

Keypoints

  • Attacks rely on documents in email attachments to deliver the initial payload targeting Ukrainian government entities.
  • The download server is configured to serve payloads only to Ukrainian IP addresses, indicating geo-targeted infrastructure.
  • The malware campaign employs a multi-stage approach with at least three document files and evolving payloads.
  • Persistence is achieved by creating a Task Scheduler entry named “HotStart” that periodically executes a script.
  • Additional stages are delivered via LNK files and XML/XML-like resources (e.g., quickly.xml) with Ukrainian IP-restricted domains.
  • The operators perform lightweight reconnaissance and system information gathering, including a screenshot, before deploying the main payload.
  • IoCs include multiple hashes, Vipertos-related domains, and several IP addresses linked to the infrastructure.

MITRE Techniques

  • [T1566.001] Spearphishing Attachment – The initial document is described as being opened via email attachments to deliver the next stages. Bracket quote: ‘the context of successful attacks is the use of documents in email attachments.’
  • [T1059.005] Command and Scripting Interpreter – The obfuscated macro is decoded at runtime and is divided into two parts, indicating macro-based execution within the document. Bracket quote: ‘The obfuscated macro is decoded at runtime and is divided into two parts.’
  • [T1027] Obfuscated/Compressed Files and Information – The macro/code is obfuscated and split, requiring decoding to reveal actions. Bracket quote: ‘The obfuscated macro is decoded at runtime and is divided into two parts.’
  • [T1053.005] Scheduled Task – Persistence via Task Scheduler, creating a task named “HotStart” to run a script every 5 minutes. Bracket quote: ‘creates a new task in Task Scheduler called “HotStart”; and every 5 minutes will run the script “C:UsersAdmindeprive.pdf”.’
  • [T1105] Ingress Tool Transfer – The first stage drops a payload from a download address; the server is configured to deliver to Ukrainian IPs. Bracket quote: ‘The malware download server is configured in such a way that it only allows downloading files for Ukrainian IP addresses.’
  • [T1082] System Information Discovery – The next-stage payload collects machine information and posts back to the server. Bracket quote: ‘gathers identifying machine information to post back to the same server’
  • [T1113] Screen Capture – The campaign includes taking a screenshot as part of system enumeration. Bracket quote: ‘takes a screenshot and gathers identifying machine information’
  • [T1041] Exfiltration Over C2 Channel – Data (system info) is posted back to the remote server. Bracket quote: ‘post back to the same server’

Indicators of Compromise

  • [Hash] a93ff0e6c42aa3f011a53108dc9b224dc85d9e0930f81e3b3010801089126e4e, 1a1ac565ba08ac51eb6ef27d0fe47a03372112f476ad3008f6ead30dbdcee565, and 5 more hashes
  • [Domain] alphabet.fake39.vipertos[.]ru, vipertos[.]ru, and other Vipertos domains
  • [IP] 143.244.131[.]123, 141.164.45[.]200
  • [File] salmon.udb, deprive.pdf
  • [URL] hxxp://a0681546.xsph[.]ru/death/quickly.xml, txxp://ip-api.com/csv/delicious71.kolopartor[.]ru?fields=query

Read more: https://inquest.net/blog/2022/06/27/glowsand