Keypoints
- Mandiant links August 2021 CONTI leak to SEO-poisoning campaigns delivering BATLOADER and ATERA Agent.
- The activity appears across victims in a wide range of industries and is suspected to be financially motivated.
- Technical indicators include a large list of MD5 hashes associated with BATLOADER/ATERA samples.
- Network indicators feature multiple malicious domains and two IPs used for hosting or command-and-control.
- A YARA rule (M_Hunting_Downloader_BATLOADER_1) is provided to detect BATLOADER samples, including strings like “launch.bat” and “cmd.exe”.
- The MITRE ATT&CK mapping covers a broad set of techniques from reconnaissance to C2, including PowerShell, Mshta/Msiexec, masquerading, and Kerberoasting.
MITRE Techniques
- [T1593.002] Search Open Websites/Domains – Used to identify target websites or domains for SEO poisoning. Quote: “Search Open Websites/Domains (T1593.002)”
- [T1584] Compromise Infrastructure – Used to establish infrastructure for campaigns. Quote: “Compromise Infrastructure (T1584)”
- [T1608.001] Upload Malware – Stage capabilities to deliver payload. Quote: “Upload Malware (T1608.001)”
- [T1587.001] Malware – Develop capabilities by deploying malware. Quote: “Malware (T1587.001)”
- [T1195] Supply Chain Compromise – Initial Access via compromised software/providers. Quote: “Supply Chain Compromise (T1195)”
- [T1059.001] PowerShell – Execution via PowerShell. Quote: “PowerShell (T1059.001)”
- [T1059.003] Windows Command Shell – Execution via Windows Command Shell. Quote: “Windows Command Shell (T1059.003)”
- [T1059.005] Visual Basic – Execution via Visual Basic. Quote: “Visual Basic (T1059.005)”
- [T1547] Boot or Logon Autostart Execution – Persistence via startup execution. Quote: “Boot or Logon Autostart Execution (T1547)”
- [T1547.001] Registry Run Keys / Startup Folder – Persistence via registry/run keys. Quote: “Registry Run Keys / Startup Folder (T1547.001)”
- [T1133] External Remote Services – Privilege Escalation via remote services. Quote: “External Remote Services (T1133)”
- [T1036] Masquerading – Defense Evasion through masquerading. Quote: “Masquerading (T1036)”
- [T1027] Obfuscated Files or Information – Defense Evasion by obfuscation. Quote: “Obfuscated Files or Information (T1027)”
- [T1070] Indicator Removal on Host – Defense Evasion via trace removal. Quote: “Indicator Removal on Host (T1070)”
- [T1070.004] File Deletion – Defense Evasion by deleting files. Quote: “File Deletion (T1070.004)”
- [T1218] Signed Binary Proxy Execution – Defense Evasion via signed proxy execution. Quote: “Signed Binary Proxy Execution (T1218)”
- [T1218.005] Mshta – Signed Binary Proxy Execution via Mshta. Quote: “Mshta (T1218.005)”
- [T1218.007] Msiexec – Signed Binary Proxy Execution via Msiexec. Quote: “Msiexec (T1218.007)”
- [T1562] Impair Defenses – Defense Evasion by impairing protections. Quote: “Impair Defenses (T1562)”
- [T1562.001] Impair Defenses: Disable or Modify Tools – Specific impairment technique. Quote: “Impair Defenses: Disable or Modify Tools (T1562.001)”
- [T1558] Kerberoasting – Credential Access technique. Quote: “Kerberoasting (T1558)”
- [T1082] System Information Discovery – Discovery tactic. Quote: “System Information Discovery (T1082)”
- [T1016] System Network Configuration Discovery – Discovery via network config. Quote: “System Network Configuration Discovery (T1016)”
- [T1219] Remote Access Software – Command and Control via remote access software. Quote: “Remote Access Software (T1219)”
Indicators of Compromise
- [MD5] context – 1440caafb45e52b0b315c7467fcde11f, 2077d8a65c8b08d64123c4ba3f03cbdd, and other hashes listed (Technical Indicators & Warnings)
- [Domain] context – cmdadminu[.]com, zoomvideo-s[.]com, cloudfiletehnology[.]com, and other network domains observed
- [IP] context – 178.21.11[.]77, 193.124.18[.]128
- [YARA] context – M_Hunting_Downloader_BATLOADER_1 rule used to detect BATLOADER samples
- [File name] context – launch.bat (present in YARA strings)
Read more: https://www.mandiant.com/resources/seo-poisoning-batloader-atera