Wednesday, September 18, 2024
Homecyber securityHackers Using ScrubCrypt 'AV Evasion Tool' To Exploit Oracle WebLogic Servers

Hackers Using ScrubCrypt ‘AV Evasion Tool’ To Exploit Oracle WebLogic Servers

Published on

Hackers exploit Oracle WebLogic Servers, knowing that they are extensively used in enterprises.

Threat actors can use security vulnerabilities present in the WebLogic servers to gain unauthorized access to sensitive data and install backdoors that open avenues for further exploitation.

FortiGuard Labs recently uncovered the 8220 Gang using ScrubCrypt, an antivirus evasion tool, to launch attacks on exploitable Oracle WebLogic servers last year. 

- Advertisement - EHA

Recently, a threat actor distributed a phishing email with malicious SVG files, downloading an obfuscated Batch file containing BatCloak, which uses ScrubCrypt to load VenomRAT payload. 

It maintains a C2 connection to install plugins like VenomRAT v6, Remcos, XWorm, NanoCore, and crypto wallet stealer on victims’ systems, bypassing antivirus detection.

ScrubCrypt ‘AV Evasion Tool’

The attacker begins with a phishing email claiming package delivery, attaching an SVG file titled “INV0ICE_#TBSBVS0Y3BDSMMX.svg” containing base64-encoded data.

Document
Stop Advanced Phishing Attack With AI

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .

When opened, the ECMAScript converts it to a ZIP file named “INV0ICE_#TBSBVS0Y3BDSMMX.zip,” containing an obfuscated batch file. 

Presumed to be from the BatCloak tool, it copies a PowerShell file to “C:\Users\Public\xkn.exe” and hides its activities with parameters. 

Decoding the data, it saves as “pointer.png,” then as “pointer.cmd” in a hidden directory. Upon executing “pointer.cmd,” all files are deleted using “cmd /c del.

The “pointer.cmd” file is a ScrubCrypt batch file that deliberately fills it with jumbled-up strings so that it is difficult to read.

It consists of two payloads, which are Base64 encoded, decrypted using AES-CBC, and compressed using GZIP. 

It uses PowerShell to load an assembly from a byte array and execute its code.

The initial payload establishes persistence and loads malware, which checks for administrator privileges and the presence of a debugger.

In addition, if the user has special rights, then the script copies itself over to “strt.cmd” and schedules a task.

Otherwise, it copies itself into the “StartUp” folder. Next, it loads an assembly called “P” to initiate VenomRAT, Fortinet said.

The second payload evades AMSI and ETW to enable remote access.

Spam emails propagating unauthorized system access, like a modified Quasar RAT called VenomRAT, distribute this malware.

Attack chain (Source – Fortinet)

It sends victim details back to its command and control (C2) server. Debugging shows keep-alive sessions and mechanisms for acquiring plugins.

After receiving orders, it unzips and stores plugins using filename-based PowerShell commands.

Here below, we have mentioned all the plugins that are used:-

The campaign involves various levels of obscurity and uses phishing emails and malicious software to silently spread VenomRAT through ScrubCrypt as well as other malware plugins that give it persistence, evasion mechanisms, and means for running damaging codes. 

The originality in adapting strategies and utilizing the wide range of functionalities available to infiltrate systems without being detected by security solutions illustrates how complex modern threats are, which demand strong security measures.

Secure your emails in a heartbeat! To find your ideal email security vendor, Take a Free 30-Second Assessment.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

UNC2970 Hackers Attacking Job Seekers Using Weaponized PDF Reader

UNC2970, a North Korean cyber espionage group, used customized SumatraPDF trojans to deliver MISTPEN...

Microsoft Windows Kernel Vulnerability Exploited in the Wild

Microsoft has confirmed the exploitation of a Windows Kernel vulnerability, identified as CVE-2024-37985, in...

Discord Announces End-to-End Encryption for Audio & Video Chats

Discord has introduced end-to-end encryption (E2EE) for audio and video chats.Known as the...

Threat Actor Allegedly Selling Bharat Petroleum Database

A threat actor has allegedly put up for sale a database belonging to Bharat...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Microsoft Windows Kernel Vulnerability Exploited in the Wild

Microsoft has confirmed the exploitation of a Windows Kernel vulnerability, identified as CVE-2024-37985, in...

Discord Announces End-to-End Encryption for Audio & Video Chats

Discord has introduced end-to-end encryption (E2EE) for audio and video chats.Known as the...

Threat Actor Allegedly Selling Bharat Petroleum Database

A threat actor has allegedly put up for sale a database belonging to Bharat...