Thursday, April 25, 2024

Chinese Cyber Espionage Group APT10 Delivers UPPERCUT Backdoor Via Malicious Word Documents

Chinese cyber espionage group APT10 know for targeting construction and engineering, aerospace, and telecom firms, and governments agencies in United States, Europe, and Japan.

With the current campaign, the espionage group targeting Japanese entities through spear phishing emails with password-protected Microsoft Word documents that contain malicious VBA macros. Once the user enters the login passwords it requests the user’s to enable macro.

FireEye researchers observed the documents contains Japanese titles related to maritime, diplomatic, North Korean and Latin American issues, so the people interested in these issues have been the target of the campaign.

UPPERCUT Backdoor Execution 

Once the malicious macro is executed it downloads the PEM encoded files padre1.txt, padre2.txt, and padre3.txt and stored them in %TEMP% folder and copies to %AllUserProfile% folder. For decoding the dropped files it uses windows built-in program certutil.exe that used in managing the certificates.

Then macro creates proper extensions using Extensible Storage Engine Utilities (esentutil.exe) and the dropped files are as follows.

[GUP.exe] – Free Generic Updater, responsible for keeping Notepad++ up-to-date.

[libcurl.dll]: Malicious Loader DLL

[3F2E3AB9]: Encrypted shellcode

The macro launches the legitimate GUP.exe which side loads the malicious libcurl.dll file, then it decrypts and runs the encrypted shellcode [3F2E3AB9].

The shellcode decompresses another DLL which is the updated backdoor variant UPPERCUT and then macro deletes the initially downloaded .txt files using Windows esentutl.exe.

From the timeline, it appears UPPERCUT has minor revisions released between December 2017 and May 2018. The new version of UPPERCUT backdoor contains a number of improvements in turns of sending and receiving HTTP response and with the hashing algorithm.

APT10 consistently targets the same geolocation and industry and the malware evolves continuously, the most significant change is in the way backdoor initializes the Blowfish encryption key, which makes it harder for analysts to detect and decrypt the backdoor’s network communications. researchers said.

Related Read

Dangerous Android Malware that Steals Banking Credentials, Call Forwarding, Keylogging, and Ransomware Activities

Android Device With Open ADB Ports Exploited to Spread Satori Variant of Mirai Botnet

60,000 Android Devices are Infected with Malicious Battery Saver App that Steals Various Sensitive Data

Website

Latest articles

Analyze Malicious Powershell Scripts by Running Malware in ANY.RUN Sandbox

Hackers exploit PowerShell, a built-in scripting tool on Windows (and sometimes Linux), to launch...

Beware! Zero-click RCE Exploit for iMessage Circulating on Hacker Forums

A new cybersecurity threat has emerged as a zero-click remote code execution (RCE) exploit...

New DragonForce Ransomware Emerged From The Leaked LOCKBIT Builder

Hackers exploit LOCKBIT Builder due to its versatility in creating customized ransomware payloads which...

JudgeO Online Code Editor Flaw Let Attackers Execute Code as Root User

A critical flaw has been identified in the popular online code editor, JudgeO.If...

Cyber Attack Defenders Up For Battle: Huge Uptick In Timely Detections

Attackers are employing evasion techniques to bypass detection and extend dwell time on compromised...

Alert! Cisco Releases Critical Security Updates to Fix 2 ASA Firewall 0-Days

Cisco has released critical security updates to address multiple vulnerabilities in its Adaptive Security...

Pakistani APT Hackers Attacking Indian Govt Entities With Weaponized Shortcut Files

Cybersecurity experts at Seqrite Labs have reported a surge in cyberattacks against Indian government...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles