ESET researchers uncovered a Lazarus campaign in fall 2021 that targeted a Netherlands aerospace employee and a Belgian political journalist via spearphishing attachments, leading to a multi-tool intrusion set. Notably, it marked the first publicized real-world abuse of CVE-2021-21551 to disable security monitoring, and it leveraged the BLINDINGCAN HTTP(S) backdoor alongside a wide, heavily engineered toolset. #Lazarus #BLINDINGCAN #BYOVD #CVE-2021-21551 #DellDBUtil #WannaCry
Keypoints
- The Lazarus campaign targeted a Netherlands aerospace employee and a Belgian political journalist using spearphishing with job-themed attachments linked to a remote template.
- The most notable tool is the first confirmed real-world abuse of CVE-2021-21551 in a Dell driver to disable OS security monitoring via a user‑mode module.
- In this campaign Lazarus deployed a full HTTP(S) backdoor named BLINDINGCAN, along with a multi-stage toolset including droppers, loaders, and uploaders/downloader components.
- Dropper/loader chains used trojanized open-source projects, encrypted payloads, and loading from unusual locations in the file system; many payloads were DLLs embedded in executables.
- The operation demonstrates Lazarus’s organization, with a large team and sophisticated kernel-level techniques to subvert Windows security features.
- Infrastructure relied on compromised third-party servers for C2, with multiple IPs and domains hosting commands (e.g., turnscor and aquaprographix sites).
- BYOVD techniques (via the Dell vulnerability) were used to load kernel-level components like FudModule.dll, enabling deep persistence and monitoring evasion.
MITRE Techniques
- [T1106] Native API – The Lazarus HTTP(S) backdoor uses the Windows API to create new processes. [“The Lazarus HTTP(S) backdoor uses the Windows API to create new processes.”]
- [T1059.003] Command and Scripting Interpreter: Windows Command Shell – HTTP(S) backdoor malware uses cmd.exe to execute command-line tools. [“HTTP(S) backdoor malware uses cmd.exe to execute command-line tools.”]
- [T1140] Deobfuscate/Decode Files or Information – Many of the Lazarus tools are stored in an encrypted state on the file system. [“Many of the Lazarus tools are stored in an encrypted state on the file system.”]
- [T1070.006] Indicator Removal on Host: Timestomp – The Lazarus HTTP(S) backdoor can modify the file time attributes of a selected file. [“The Lazarus HTTP(S) backdoor can modify the file time attributes of a selected file.”]
- [T1574.002] Hijack Execution Flow: DLL Side-Loading – Many of the Lazarus droppers and loaders use a legitimate program for their loading. [“Many of the Lazarus droppers and loaders use a legitimate program for their loading.”]
- [T1014] Rootkit – The user-to-kernel module of Lazarus can turn off monitoring features of the OS. [“The user-to-kernel module of Lazarus can turn off monitoring features of the OS.”]
- [T1027.002] Obfuscated Files or Information: Software Packing – Lazarus uses Themida and VMProtect to obfuscate their binaries. [“Lazarus uses Themida and VMProtect to obfuscate their binaries.”]
- [T1218.011] System Binary Proxy Execution: Rundll32 – Lazarus uses rundll32.exe to execute its malicious DLLs. [“Lazarus uses rundll32.exe to execute its malicious DLLs.”]
- [T1071.001] Application Layer Protocol: Web Protocols – The Lazarus HTTP(S) backdoor uses HTTP and HTTPS to communicate with its C&C servers. [“The Lazarus HTTP(S) backdoor uses HTTP and HTTPS to communicate with its C&C servers.”]
- [T1573.001] Encrypted Channel: Symmetric Cryptography – The Lazarus HTTP(S) backdoor encrypts C&C traffic using the AES-128 algorithm. [“The Lazarus HTTP(S) backdoor encrypts C&C traffic using the AES-128 algorithm.”]
- [T1132.001] Data Encoding: Standard Encoding – The Lazarus HTTP(S) payloads encode C&C traffic using the base64 algorithm. [“The Lazarus HTTP(S) payloads encode C&C traffic using the base64 algorithm.”]
- [T1560.002] Archive Collected Data: Archive via Library – The Lazarus HTTP(S) uploader can zip files of interest and upload them to its C&C. [“The Lazarus HTTP(S) uploader can zip files of interest and upload them to its C&C.”]
- [T1584.004] Acquire Infrastructure: Server – Compromised servers were used by all the Lazarus HTTP(S) backdoor, uploader, and downloader as a C&C. [“Compromised servers were used by all the Lazarus HTTP(S) backdoor, uploader, and downloader as a C&C.”]
- [T1587.001] Malware – Custom tools from the attack are likely developed by the attackers. Some exhibit highly specific kernel development capacities seen earlier in Lazarus tools. [“Custom tools from the attack are likely developed by the attackers. Some exhibit highly specific kernel development capacities seen earlier in Lazarus tools.”]
- [T1204.002] User Execution: Malicious File – The target was lured to open a malicious Word document. [“The target was lured to open a malicious Word document.”]
- [T1566.003] Phishing: Spearphishing via Service – The target was contacted via LinkedIn Messaging. [“The target was contacted via LinkedIn Messaging.”]
- [T1566.001] Phishing: Spearphishing Attachment – The target received a malicious attachment. [“The target received a malicious attachment.”]
- [T1547.006] Boot or Logon Autostart Execution: Kernel Modules and Extensions – The BYOVD DBUtils_2_3.sys was installed to start via the Boot loader (value 0x00 in the Start key under HKLMSYSTEMCurrentControlSetServices). [“The BYOVD DBUtils_2_3.sys was installed to start via the Boot loader (value 0x00 in the Start key under HKLMSYSTEMCurrentControlSetServices).”]
- [T1547.001] Boot or Logon Autostart Execution: Startup Folder – The dropper of the HTTP(S) downloader creates a OneNoteTray.LNK file in the Startup folder. [“The dropper of the HTTP(S) downloader creates a OneNoteTray.LNK in the Startup folder.”]
Indicators of Compromise
- [SHA-1] context – 296D882CB926070F6E43C99B9E1683497B6F17C4, FudModule.dll (rootkit). Example: Win64/Rootkit.NukeSped.A
- [SHA-1] context – 001386CBBC258C3FCC64145C74212A024EAA6657, C:PublicCachemsdxm.ocx (HTTP(S) downloader). Example: Win32/NukeSped.KQ
- [File name] context – colorui.dll (Dropper for BLINDINGCAN); Adobe.tmp (HTTP(S) downloader); credui.dll (intermediate loader). Example:Win64/NukeSped.JK
- [File path] context – C:ProgramDataPTCcolorui.dll; C:WindowsVsscredui.dll; C:ProgramDataAdobeAdobe.tmp. Example: Dropper/Loader components
- [URL] context – https://aquaprographix[.]com/patterns/Map/maps.php; https://turnscor[.]com/wp-includes/feedback.php; http://www.stracarrara[.]org/images/img.asp. Example: C2 servers
- [IP] context – 67.225.140[.]4 (turnscor site); 50.192.28[.]29 (aquaprographix site); 31.11.32[.]79 (stracarrara site). Example: Compromised hosting sites
- [Certificate] context – “A” MEDICAL OFFICE, PLLC (validly signed but expired certificate used for sslSniffer dropper). Example: Signed 32-bit dropper
Read more: https://www.welivesecurity.com/deutsch/2022/10/18/lazarus-greift-die-niederlande-und-belgien-an/