Saturday, December 2, 2023

FIN8 Revamped Hacking Toolkit with New Stealthy Attack Features

Syssphinx (aka FIN8) is a financially motivated cyber-crime group deploying revamped sardonic backdoor to deliver Noberus ransomware.

This group has been active since January 2016, targeting organizations such as hospitality, retail, entertainment, insurance, technology, chemicals, and finance sectors. 

It is also known for its notorious act of deploying various ransomware such as Ragnar Locker ransomware, white rabbit, and Noberous in its attacks on compromised devices.

Symantec researchers observed a recent attack of syssphinx and found that they employed a new variant of the previously used sardonic backdoor.


Unlike other APTs, syssphinx constantly switches its tools and techniques before commencing the attack to evade detection.

It employs spear phishing and social engineering to initialize the attack; later it deploys various backdoors to deliver various ransomware based on the attack.

In order to avoid similarities between the previously used backdoor and the current instance, it alters some of the features of the backdoor.

Revamped Backdoor Features:

Most of the object-oriented features of this backdoor have been replaced with a plain C implementation. 

The backdoor is delivered through a PowerShell script to infect the target machine.

Before commencing the attack, it checks for active sessions of the user machine and connects to the C2 server to establish persistence.

It encrypts the data with the RC4 algorithm using rc4_key as the encryption key. The keystream is reused when encrypting each individual field. 

Another notable feature is that the backdoor supports three different formats to extend its functionality such as PE DLL plugins, shellcode plugins, and shellcode with various arguments.

Also the backdoor has the ability to allow up to 10 interactive sessions to run at the same time. 

The attacker utilizes a stolen process token for each session to launch each process.

Indicators of Compromise

SHA256 File hashes:

307c3e23a4ba65749e49932c03d5d3eb58d133bc6623c436756e48de68b9cc45 – Hacktool.Mimikatz
48e3add1881d60e0f6a036cfdb24426266f23f624a4cd57b8ea945e9ca98e6fd – DLL file
4db89c39db14f4d9f76d06c50fef2d9282e83c03e8c948a863b58dedc43edd31 – 32-bit shellcode
356adc348e9a28fc760e75029839da5d374d11db5e41a74147a263290ae77501 – 32-bit shellcode
e7175ae2e0f0279fe3c4d5fc33e77b2bea51e0a7ad29f458b609afca0ab62b0b – 32-bit shellcode
e4e3a4f1c87ff79f99f42b5bbe9727481d43d68582799309785c95d1d0de789a – 64-bit shellcode
2cd2e79e18849b882ba40a1f3f432a24e3c146bb52137c7543806f22c617d62c – 64-bit shellcode
78109d8e0fbe32ae7ec7c8d1c16e21bec0a0da3d58d98b6b266fbc53bb5bc00e – 64-bit shellcode

Latest articles

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

CISA Warns Hackers Exploiting Wastewater Systems Logic Controllers

In a disconcerting turn of events, cyber threat actors have set their sights on...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles