Campaign attributed to APT-C-36 context and IoCs
Overview
The following report provides the TTPs,and IOCs identified in a malware campaign impersonating the “Fiscalía General de la Nación” from Colombia. Our research team identified this campaign through threat hunting on public sources.
The group behind this campaign is APT-C-36, also know as Blind Eagle. Most TTPs coincide with previous campaigns attributed to this cybercriminal group in public investigations.
SCILabs was unable to identify the initial attack vector; however, we determined with high confidence that as in the previous campaigns, the attackers are distributing the malware through phishing emails with a PDF document attached. We make this hypothesis based on the TTPs that we observed in previous campaigns of this threat group.
Like the previous campaign, the cybercriminals continue using njRAT. As it is known, this kind of trojans has similar capabilities like stealing credentials stored in browsers, opening a reverse shell, uploading and downloading files, as well as a password stealer and a keylogger among others.
Based on the TTPs identified and the capabilities identified in the malware used by the attackers, the objective of this campaign is the theft of user information in Colombia.
How could it affect an organization?
The attackers mainly target users in Colombia; the attacker’s goal is implant a backdoor to control the target computer and provide the basis for lateral moves and other types of attacks related to the theft of sensitive information, which can cause financial and reputational losses in the affected companies.
Analysis
Threat Context
SCILabs recovered a PDF file through threat hunting in public sources; the file includes a hyperlink to the One Drive servers, which leads to the download of a password-protected BZ2-type compressed file with a .vbs file inside. The password is inside the PDF file.
The .vbs file downloads a text file that contains a PowerShell encoded script to perform the following operations:
- Decode FunWithAMSI library to Bypass Microsoft AMSI (Windows Antimalware Scan Interface)
- Save the njRAT payload to the Windows registry
- Generate the necessary files to obtain persistence
- Execute the last file to complete the infection by injecting the njRAT trojan into the aspnet_compiler.exe
Attack Flow
Below we show the attack flow observed in the investigation.
Technical Summary
The APT-C-36 group initial access method commonly is phishing emails impersonating various organizations, mainly in Colombia in this case. SCILabs could only retrieve the PDF file attached to the phishing email impersonating the “Fiscalía General de la Nación” from Colombia.
The PDF file contains a URL that leads to a password protected .bz2 file downloaded from legitimate One Drive servers. The .bz2file contains a Visual BasicScript.
The attacker uses a fileless technique using the .vbs script to download from Discord servers a text file that contains base64 encoded PowerShell instructions to perform the following actions:
- Decode FunWithAMSI library to Bypass Microsoft AMSI (Windows Antimalware Scan Interface)
- Save the njRAT payload to the Windows registry default value in key HKCU:\software\wow6432node\Microsoft\WindowsUpdate
- Generate the following files to obtain persistence and end the infection chain:
- SystemLogin.bat: Encoded batch file to execute the last stage of infection through the System Binary Proxy Execution technique via mshta utility and PowerShell sentence. This file is dropped in the %AppData%\Roaming folder
- Login1.vbs: Visual Basic Script dropped in Windows Startup folder to generate persistence and execute the SystemLogin.bat file
- myScript.ps1: Encoded PowerShell Script dropped in Windows %PUBLIC% folder to generate persistence and execute the SystemLogin.bat file. This file contains a njRAT injector, the encoded FunWithAMSI DLL, the AES Everywhere library to decrypt the njRAT payload, and the statements to inject the trojan into the legitimate aspnet_compiler.exe executable.
Finally, the aspnet_compiler.exe executable found in the C:\Windows\Microsoft.NET\Framework\v4.0.30319 directory is used to inject the njRAT trojan and begin communication with the C2 domain(1204abril[.]duckdns[.]org[:]2001).
It is important to mention that, in general, the TTPs of the previous investigations continue to be maintained; however, SCILabs identified that the adversary is using Visual Basic Script files as the first dropper instead of JavaScriptfiles.
Diamond Model
Below we show the diamond model observed during the investigation.
Overlaps between APT-C-36 previous campaignsand this campaign(key indicators)
To determine that the adversary of the previous campaigns and the currents are the same, SCILabs used the “rule of 2 ”which says that to determine that two threats are the same, there must be overlaps in at least two vertices of the diamond model. Here is the result of applying this rule:
Diamond model | Key indicators (Intrusion Data) & Overlaps | Context |
Adversary | APT-C-36 previous campaigns / APT-C-36 current campaign | Password protected compressed file to distribute the first dropper. |
TTP | T1566.001 – Phishing: Spearphishing Attachment | |
Infrastructure | Password protected compressed file | |
Victim | Colombian users and organizations | |
Adversary | APT-C-36 previous campaigns / APT-C-36 current campaign | PDF file for the victim to download the first stage of infection chain. According to public investigations, related emails used to attack the Colombian government, financial institutions and large companies have been found. |
TTP | T1566.001 – Phishing: Spearphishing Attachment | |
Infrastructure | PDF file or Maldoc impersonating the “Fiscalía General de la Nación. | |
Victim | Previous campaigns: Colombian users and organizations Current campaigns: Users in Colombia |
|
Adversary | APT-C-36 previous campaigns / APT-C-36 current campaign | Based on public research and the TTPs observed by SCILabs, the adversaries use JavaScript, Visual Basic Script, and PowerShell for the different stages of infection. |
TTP | T1059 – Command and Scripting Interpreter | |
Infrastructure | Development of artifacts using scripting languages like Visual Basic Script, PowerShell, and JavaScript. Additionally, the use of commodity RATs like njRAT | |
Victim | Previous campaigns: Colombian users and organizations Current campaigns: Users in Colombia | |
Adversary | APT-C-36 previous campaigns / APT-C-36 current campaign | Attackers often download encrypted text files from external systems containing embedded artifacts such as commodity RATs or DLL injectors to deploy the malware. |
TTP | T1105 – Ingress Tool Transfer | |
Infrastructure | njRAT version 0.7NC Generic DLL injector Malware Parameters |
|
Victim | Previous campaigns: Colombian users and organizations Current campaigns: Users in Colombia |
|
Adversary | APT-C-36 previous campaigns / APT-C-36 current campaign | Attackers uses non-standard ports to their c2 servers. |
TTP | T1571 – Non-Standard Port | |
Infrastructure | Previous campaigns ports: 57831, 2050, 57831 Current campaign: 2001 |
|
Victim | Previous campaigns: Colombian users and organizations Current campaigns: Users in Colombia |
|
Adversary | APT-C-36 previous campaigns / APT-C-36 current campaign | Adversaries use obfuscated code throughout the infection chain, using plain text files as the primary means of storing payloads and commands. They often use base64 algorithms and replacement of letters or special characters in obfuscated payloads. |
TTP | T1027 – Obfuscated Files or Information | |
Infrastructure | BASE64 algorithms Replacing letters and special chars Their own functions to obfuscate data |
|
Victim | Previous campaigns: Colombian users and organizations Current campaigns: Users in Colombia |
|
Adversary | APT-C-36 previous campaigns / APT-C-36 current campaign | Attackers have used the commodity RAT njRAT. |
TTP | T1588.002 – Obtain Capabilities Tool | |
Infrastructure | njRAT | |
Victim | Previous campaigns: Colombian users and organizations Current campaigns: Users in Colombia |
|
Adversary | APT-C-36 previous campaigns / APT-C-36 current campaign | The attackers use a .vbs script in the Windows Startup folder to generate persistence. |
TTP | T1547.001 Boot or Logon Auto start Execution: Registry Run Keys / Startup Folder | |
Infrastructure | VBS script in the Windows Startup folder to generate persistence | |
Victim | Previous campaigns: Colombian users and organizations Current campaigns: Users in Colombia |
|
Adversary | APT-C-36 previous campaigns / APT-C-36 current campaign | In recent campaigns, adversaries have used domains from the Duckdns service via the HTTP protocol to communicate with the c2 server. |
TTP | T1071.001 – Application Layer Protocol: Web Protocols | |
Infrastructure | Duckdns domains | |
Victim | Previous campaigns: Colombian users and organizations Current campaigns: Users in Colombia |
|
In this exercise, the overlaps between the infrastructure vertices and capabilities/TTPs of the diamond model can be observed, complying with the rule of 2 and supporting that the adversary behind this campaign is probably APT-C-36. SCILabs will continue to monitor these campaigns to obtain more elements that allow raising the level of certainty of the attribution.
TTPs observed aligned to MITRE’s ATT&CK framework
Assessment
The APT-C-36 threat group is characterized by using commodity RATs such as njRAT; however, SCILabs has identified that the artifacts used during the infection chain have a shallow detection rate by commercial antivirus solutions. Additionally, they are constantly adjusting their artifacts, such as using .vbs files instead of JavaScript files and using different PDF templates or pretexts in their emails to evade the anti-spam protections.
This adversary employs fileless and living off the land techniques, uses legitimate servers like OneDrive and Discord to store malicious artifacts, and various obfuscation and encryption algorithms. This can make it difficult for security solutions to identify malicious behavior easily; for this reason, it is important for organizations to perform threat hunting on organizations’ endpoints and workstations considering directories, registry keys, and executables as those mentioned in this report.
These characteristics make this adversary a focus of attention because SCILabs considers that attackers could begin to consider in the future attacking victims in other countries such as Mexico in all kinds of organizations. Therefore, for SCILabs it is important that organizations are up to date on the TTPs used by this adversary and that could be copied by other cybercriminal groups to carry out more destructive attacks.
We believe that the ideal victims of this type of campaign are the organizations that do not pay special attention to behavioral indicators and that do not know in detail the stages of the infection chain of this type of attack. SCILabs believes that this adversary will continue to use commodity RATs and will continue to target LATAM; however, based on our telemetry, cybercriminals will continue to modify their artifacts to improve their effectiveness.
IOCs
386CEAFDE6870930B4C0C0FAF3274A7A
C86433C0F61D1DF61208B2CFCA02543F
F967C869142E3242BFCA0E9C38CDD6FD
324DB54A7DF625B2CBF6B75E9EFEC140
2BB9168601ED09F975041B3E5593A764
889BDEAF65D152BEC9512A768B73CB5A
08FBA67E620C5AF2C4738EAB767A78D5
HXXPS[:]//ONEDRIVE[.]LIVE[.]COM/DOWNLOAD?CID=7F3ACF9F2D72D5A5&RESID=7F3ACF9F2D72D5A5%21827&AUTHKEY=AMZ2CWHP91GKHCI
HXXPS[:]//CDN[.]DISCORDAPP[.]COM/ATTACHMENTS/911673301896691753/976527856819646504/MIO18MAYOMIO[.]TXT
1204ABRIL[.]DUCKDNS[.]ORG[:]2001
ABRIL[.]DUCKDNS[.]ORG
HKCU:\SOFTWARE\bf02403cd3e34e50a6f
HKCU:\SOFTWARE \wow6432node\Microsoft\WindowsUpdate