Chinese cyber espionage group APT10 know for targeting construction and engineering, aerospace, and telecom firms, and governments agencies in United States, Europe, and Japan.
With the current campaign, the espionage group targeting Japanese entities through spear phishing emails with password-protected Microsoft Word documents that contain malicious VBA macros. Once the user enters the login passwords it requests the user’s to enable macro.
FireEye researchers observed the documents contains Japanese titles related to maritime, diplomatic, North Korean and Latin American issues, so the people interested in these issues have been the target of the campaign.
Once the malicious macro is executed it downloads the PEM encoded files padre1.txt, padre2.txt, and padre3.txt and stored them in %TEMP% folder and copies to %AllUserProfile% folder. For decoding the dropped files it uses windows built-in program certutil.exe that used in managing the certificates.
Then macro creates proper extensions using Extensible Storage Engine Utilities (esentutil.exe) and the dropped files are as follows.
[GUP.exe] – Free Generic Updater, responsible for keeping Notepad++ up-to-date.
[libcurl.dll]: Malicious Loader DLL
[3F2E3AB9]: Encrypted shellcode
The macro launches the legitimate GUP.exe which side loads the malicious libcurl.dll file, then it decrypts and runs the encrypted shellcode [3F2E3AB9].
The shellcode decompresses another DLL which is the updated backdoor variant UPPERCUT and then macro deletes the initially downloaded .txt files using Windows esentutl.exe.
From the timeline, it appears UPPERCUT has minor revisions released between December 2017 and May 2018. The new version of UPPERCUT backdoor contains a number of improvements in turns of sending and receiving HTTP response and with the hashing algorithm.
APT10 consistently targets the same geolocation and industry and the malware evolves continuously, the most significant change is in the way backdoor initializes the Blowfish encryption key, which makes it harder for analysts to detect and decrypt the backdoor’s network communications. researchers said.
Android Device With Open ADB Ports Exploited to Spread Satori Variant of Mirai Botnet
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…