Researchers have discovered a new phishing campaign that targets Middle Eastern and North African Government Entities to deliver a new initial access downloader termed “IronWind.” This downloader is followed by additional payload stages, which downloads a shellcode.
Most campaigns were using Dropbox links, which then evolved to using XLL and RAR file attachments to evade detection mechanisms. Moreover, this threat actor activity overlaps with Molerats, Gaza Cybergang, Frankenstein, and WIRTE.
The malicious actor employs a hijacked email account belonging to the Ministry of Foreign Affairs to launch phishing attacks against government entities in the Middle East.
The email utilized phishing tactics to deceive its recipients with a message related to economic affairs. The email contained a hyperlink to a Dropbox file, which once clicked, downloaded a harmful Microsoft PowerPoint Add-in (PPAM) file.
StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.
This file contains a macro that drops three files such as version.dll (IronWind), timeout.exe, and gatherNetworkInfo.vbs.
The timeout.exe file was used to sideload IronWin, which sends an HTTP GET request to the C2 domain (theconomics[.]net), according to the analysis of August 2023.
Once the C2 receives this request, it responds back with a shellcode, which is the third stage of the infection chain.
This shellcode uses .NET loaders to perform WMI queries and also downloads the fourth stage of the malware, which was another .NET executable that uses SharSploit, a .NET post-exploitation library written in C#.
The attachments were observed to shift from PPAM to RAR file in October 2023. The RAR file consists of a tabcal.exe file, which sideloads the IronWind and propsys.dll. Other stages of the malware delivery remained the same.
A complete report about this IronWind infection has been published by Proofpoint which provides detailed information about the threat actor, path of compromise, and other vital information.
SHA256 Value
Domains
IP (C2)
Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…