Threat Actors Using Squirrelwaffle Loader to Deploy Qakbot & Cobalt Strike Malware

A new threat emerged recently in the wild that drops malware like Qakbot and Cobalt Strike onto negotiated systems and networks; this new threat is dubbed as “Squirrelwaffle” and threat actors are actively spreading Squirrelwaffle through several malicious email campaigns.

Shortly after the disruption of the widely used botnet, Emotet by the law enforcement agencies, Squirrelwaffle emerged as an alternative to Emotet. The first signs of this new threat appeared in September 2021, and the distribution volumes reached a peak at the end of that month.

Email Campaigns & Languages Used

In addition to stolen reply-chain email campaigns in English, but, the spammers also use emails in the following languages:-

  • French
  • German
  • Dutch
  • Polish

According to the report “A malicious .doc or .xls attachment is typically attached to an email that links to malicious ZIP archives hosted on attacker-controlled web servers and runs malware retrieval code on opening.”

In order to trick recipients into enabling the macros within MS Office Suite, threat actors use DocuSign as bait.

Attack process

As part of the attack, string reversal is used to obfuscate the code, which then writes a VBS script to the %PROGRAMDATA% directory, and then executes it.

Once done, after that from one of the five hardcoded URLs, it fetches Squirrelwaffle in DLL form to deliver it onto the endangered system. Now, here, at this point, if the Squirrelwaffle in DLL form is successfully delivered onto the victim’s system, then using rundll32.exe the malicious DLL is executed.

After completing all the stages, the Squirrelwaffle loader deploys malware like Qakbot and Cobalt Strike. For post-exploitation tasks after deploying beacons, the threat actors use the cracked versions of Cobalt Strike to gain access to compromised devices remotely.

With a C2 over HTTP POST requests containing obfuscated data, the malware tries to communicate, and the body of the HTTP POST request includes the following information about the victim system:-

  • %APPDATA% configuration.
  • The hostname of the system.
  • The username of the victim.
  • The Workstation configuration of the system.

Moreover, it is possible that Squirrelwaffle is a revamped version of Emotet by the members who escaped the law enforcement; or it may be a new attempt by other threat actors who are trying the fill the void left behind by Emotet.

So, the experts of Cisco Talos have urged all the security professionals and organizations to stay aware of the new TTPs used by the threat actors.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…

1 day ago

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…

3 days ago

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…

4 days ago

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…

4 days ago

Google Chrome Security, Critical Vulnerabilities Patched

Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…

4 days ago

Notorious WrnRAT Delivered Mimic As Gambling Games

WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…

4 days ago