{"id":18283,"date":"2022-02-14T14:40:03","date_gmt":"2022-02-14T22:40:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/14\/news-12016\/"},"modified":"2022-02-14T14:40:03","modified_gmt":"2022-02-14T22:40:03","slug":"news-12016","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/14\/news-12016\/","title":{"rendered":"NFT Lure Used to Distribute BitRAT"},"content":{"rendered":"<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12\">\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\"><\/div>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2><a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs.html?utm_source=blog&amp;utm_medium=campaign&amp;utm_campaign=FortiGuardLabs\">FortiGuard Labs<\/a>\u00a0Threat Research Report<\/h2>\n<p><b>Affected Platforms: <\/b>Windows<br \/> <b>Impacted Users: <\/b>Windows users<br \/> <b>Impact:<\/b> Compromised machines are under the control of the threat actor<br \/> <b>Severity Level: <\/b>Medium<\/p>\n<p>Despite being around for many years, blockchain captured the zeitgeist of the digital movement with the advent of Bitcoin. Digital currencies, however, are not the only application of this technology. Non-fungible tokens (NFT) entered the popular lexicon in 2021. An NFT is a digital token that uses blockchain to verify the authenticity of digital content and ownership, such as art, music, collectibles, and in-video-game items.<\/p>\n<p>The first major NFT splash came in March 2021, when the digital work of art \u201cEverydays \u2013 The First 5000 Days\u201d created by the digital artist \u201cBeeple\u201d was auctioned and sold for a record-breaking $69 million. Later that month, the NFT of the very first tweet posted by then-Twitter CEO Jack Dorsey was sold for $2.9 million. NFTs even gave new life to a popular 10-year-old internet meme, \u201cNyan Cat.\u201d The original creator remastered the GIF and sold it as an NFT for 10 Ethereum ($590,000).<\/p>\n<p>Exclusive possession of unique assets tends to drive the desire for ownership\u2014and the price\u2014sky-high. And predictably, online criminals are there trying to exploit this activity.<\/p>\n<p>FortiGuard Labs recently came across a peculiar-looking Excel spreadsheet that seemingly included NFT-related information. But instead, it downloads and installs the BitRAT malware in the background. This blog describes how this attack works.<\/p>\n<h2>Strange looking Excel macro file (XLSM) and target<\/h2>\n<p>The original source of the malicious Excel file has not been identified. However, the file provides some clues as to its origin and target. First, the XLSM is named \u201cNFT_Items.xlsm\u201d. Second, the file has two workbooks, one of which is in Hebrew. That workbook contains what appears to be legitimate Discord rooms that deal with NFTs. It also includes the names of NFTs, forecasts for potential investment returns (hyped, solid, and 50\/50), and selling quantities. Finally, like many similar recent attacks, this attack abuses Discord by using it to host malicious files. These points provide enough evidence to conclude that the attacker likely sent a message to NFT enthusiasts in Israel to entice them to download and open the malicious XLSM.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/nft-lure-used-to-distribute-bitrat\/_jcr_content\/root\/responsivegrid\/image.img.png\/1644860885213\/img1.png\" alt=\"Screenshot of Malicious XLSM file, \u201cNFT_Item.xlsm\u201d\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 1. Malicious XLSM file, \u201cNFT_Item.xlsm\u201d<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The XLSM contains a malicious macro, which the user is asked to enable upon opening the file. Once the XLSM file is opened, and the macro is enabled, the XLSM drops a batch file. It then uses a PowerShell script to download another file from Discord, NFTEXE.exe.\u00a0<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/nft-lure-used-to-distribute-bitrat\/_jcr_content\/root\/responsivegrid\/image_297166098.img.png\/1644860926886\/fig2.png\" alt=\"Screenshot of Malicious macro in NFT_Item.xlsx\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 2. Malicious macro in NFT_Item.xlsx<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p class=\"cq-text-placeholder-ipe\" data-emptytext=\"Text\">\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/nft-lure-used-to-distribute-bitrat\/_jcr_content\/root\/responsivegrid\/image_1286554338.img.png\/1644860940747\/fi3.png\" alt=\"Image of Windows batch file dropped by the malicious macro in NFT_Item.xlsx\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 3. Windows batch file dropped by the malicious macro in NFT_Item.xlsx<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p class=\"cq-text-placeholder-ipe\" data-emptytext=\"Text\">\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/nft-lure-used-to-distribute-bitrat\/_jcr_content\/root\/responsivegrid\/image_2125661588.img.png\/1644860962611\/fig4.png\" alt=\"Example of Decoded PowerShell script delivered by the batch file in Figure 3\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 4. Decoded PowerShell script delivered by the batch file in Figure 3<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The downloaded NFTEXE.exe is a .NET executable file that attempts to run &quot;ipconfig \/renew&quot; and then pull down yet another file, NFTEXE.png, from Discord. Disguised as an image file, NFTEXE.png is pure data with all its strings flipped (see <i>Figure 5.<\/i>).\u00a0<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/nft-lure-used-to-distribute-bitrat\/_jcr_content\/root\/responsivegrid\/image_1401076114.img.png\/1644860977590\/fig5.png\" alt=\"Example of Reversed strings in NFTEXE.png\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 5. Reversed strings in NFTEXE.png<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Running &quot;ipconfig\/renew&quot; is an attempt to disrupt analysis of the malware should it find itself running in a cloud environment by dropping the connection to the analyst so that the NFTEXE.png will not be downloaded.<\/p>\n<p>NFTEXE.exe then reverses these strings into the next stage file, \u201cNnkngxzwxiuztittiqgz.dll\u201d. A .NET DLL appears to have been compiled on January 2<sup>nd<\/sup>, 2022. Since the malicious XLSM was made available on a public online scan service on January 3<sup>rd<\/sup>, the XLSM file was distributed soon after compilation.<\/p>\n<p>NFTEXE.exe copies itself as C:Users[username]AppDataRoamingMicrosoftWindowsStart MenuProgramsAdobeCloud.exe, which runs at every startup to maintain persistence. NFTEXE.exe also makes a copy of MSBuild.exe, a legitimate Windows file, to C:Users[username]AppDataLocal and runs it. NFTEXE.exe then injects a malicious payload into the running MSBuild.exe using Nnkngxzwxiuztittiqgz.dll.<\/p>\n<h2>BitRAT<\/h2>\n<p>Our analysis determined that the payload is BitRAT, a Remote Access Trojan (RAT) that was first sold in a hacking forum in August 2020.<\/p>\n<p>One trait of the BitRAT sample that FortiGuard Labs analyzed is its usage of Hidden VNC (HVNC). HVNC provides an attacker with remote access to the compromised machine. BitRAT is known to have borrowed the HVNC code from another malware, TinyNuke, the source code of which was leaked in 2017. Another notable thing included in the BitRAT sample is a string, \u201cAVE_MARIA\u201d, used as a traffic header value when an HVNC client communicates to its C2 server for verification. The HVNC communication is designed to fail if the traffic header value is not \u201cAVE_MARIA\u201d.<\/p>\n<p>More BitRAT functionality was revealed during our analysis once additional strings were decrypted. For example, we were able to see that BitRAT can bypass User Account Control (UAC)\u2014a Windows security feature first introduced in Windows Vista that helps prevent unauthorized changes to the operating system\u2014and Windows Defender\u2014 an anti-malware component of Microsoft Windows first released with Windows XP. We also found that this variant can also monitor the screen and, if present, utilize the webcam.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--6 aem-GridColumn--offset--default--3\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/nft-lure-used-to-distribute-bitrat\/_jcr_content\/root\/responsivegrid\/image_874008273.img.png\/1644861001943\/fig6.png\" alt=\"More BitRAT capabilities\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 6. More BitRAT capabilities<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>After the strings were decrypted, it also became apparent that BitRAT uses Slowloris for its DDoS capabilities.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--5 aem-GridColumn--offset--default--3\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/nft-lure-used-to-distribute-bitrat\/_jcr_content\/root\/responsivegrid\/image_1161018250.img.png\/1644861016050\/fig7.png\" alt=\"Example of Slowloris DDOS\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 7. Slowloris DDOS<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Other BitRAT functionality includes:<\/p>\n<ul>\n<li>Stealing credentials from browsers and applications installed on the compromised machine<\/li>\n<li>Mining Monero cryptocurrency<\/li>\n<li>Logging keystrokes<\/li>\n<li>Uploading and downloading additional files to the compromised machine<\/li>\n<li>Listening live through a microphone <\/li>\n<\/ul>\n<p>In an attempt to hide stolen information, this variant of BitRAT stores collected data (keystrokes, clipboard data, etc.) in an alternate data stream (ADS) file that is majority encoded in Base64.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/nft-lure-used-to-distribute-bitrat\/_jcr_content\/root\/responsivegrid\/image_2122462921.img.png\/1644861048633\/fig8.png\" alt=\"BitRAT writing to ADS file C:UsersREMAppDataLocal:11-01-22\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 8. BitRAT writing to ADS file C:UsersREMAppDataLocal:11-01-22<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>As can be inferred by the file name above, a new file will be created each day and given the name of the current date.<i><\/i><\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/nft-lure-used-to-distribute-bitrat\/_jcr_content\/root\/responsivegrid\/image_1822248217.img.png\/1644861060224\/fig9.png\" alt=\"Example of Contents of the ADS log file.\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 9. Contents of the ADS log file.<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The C2 server (205[.]185[.]118[.]52) this particular BitRAT variant connects to belongs to FranTech Solutions, a hosting provider that is known as a bulletproof hosting service provider. A bulletproof hosting service is just like a regular web hosting service in that they are used to store content. The difference is that a bulletproof hosting service also hosts illegal content, such as malware, C2, exploit kits, and fake shopping sites. They also tend to be more resistant to complaints and takedown requests.<\/p>\n<h2>Conclusion<\/h2>\n<p>In this attack, NFT was used to lure a victim into opening a malicious XLSM file to deliver BitRAT, which put the victim\u2019s data and machine at risk.<\/p>\n<p>NFT is a new internet phenomenon that some view as a legitimate investment and money-making opportunity. Any investment comes with risk, but certain risks taken before money changes hands are avoidable. Be mindful that attackers often use attractive and trendy subjects as lures. As NFTs become increasingly popular, they will be used to entice victims into opening malicious files or clicking on malicious links. Standard security practices such as not opening files downloaded from untrusted or suspicious sources can prevent threat actors from gaining access to users\u2019 money and valuable data.<\/p>\n<h2>Fortinet Protections<\/h2>\n<p>The FortiGuard Antivirus Service detects and blocks this threat as MSIL\/Agent.JWX!tr.dldr and VBA\/Agent.XC!tr.<\/p>\n<p>FortiEDR detects the downloaded NFTEXE.exe as malicious based on its behavior.<\/p>\n<p>All network IOCs are blocked by the WebFiltering client.<\/p>\n<h2>IOCs<\/h2>\n<h5>Sample SHA-256:<\/h5>\n<ul>\n<li>88ef347ad571f74cf1a450d5dad85a097bb29ab9b416357501cdc4c00388f796<\/li>\n<li>342a5102bc7eedb62d5192f7142ccc7413dc825a3703e818cf32094638ebd17a<\/li>\n<\/ul>\n<h5>Network IOCs:<\/h5>\n<ul>\n<li>hxxps:\/\/cdn[.]discordapp.com\/attachments\/923977279179202600\/927289948825079828\/NFT_LIST.xlsm<\/li>\n<li>hxxps:\/\/cdn[.]discordapp.com\/attachments\/927290851930013766\/927291495604699167\/NFT_LIST.xlsm<\/li>\n<li>\u00a0hxxps:\/\/cdn[.]discordapp.com\/attachments\/923858595353874472\/928279600659234826\/NFTEXE.EXE<\/li>\n<li>205[.]185[.]118[.]52<\/li>\n<\/ul>\n<div><i>\u00a0<\/i><\/div>\n<div><i>Learn more about Fortinet\u2019s\u00a0<\/i><a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?utm_source=blog&amp;utm_campaign=fortiguard-labs\"><i>FortiGuard Labs<\/i><\/a><i>\u00a0threat research and intelligence organization and the FortiGuard Security Subscriptions and Services\u00a0<\/i><a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?tab=security-bundles&amp;utm_source=blog&amp;utm_campaign=security-bundles\"><i>portfolio<\/i><\/a><i>.<\/i><\/div>\n<\/p><\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\">\n<div id=\"om-qbkzwxxbiv83f0ol5a2d-holder\"><\/div>\n<\/div><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/nft-lure-used-to-distribute-bitrat\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/fortinet\/blog\/threat-research<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"\/blog\/threat-research\/nft-lure-used-to-distribute-bitrat\/_jcr_content\/root\/responsivegrid\/image.img.png\/1644860885213\/img1.png\"\/><br \/>FortiGuard Labs researchers discovered an Excel file that uses NFT related information as a lure to download and install BitRAT malware. Read our blog to learn how the attack works.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-18283","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18283"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18283\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18283"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}