{"id":19046,"date":"2022-05-16T02:10:09","date_gmt":"2022-05-16T10:10:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/05\/16\/news-12779\/"},"modified":"2022-05-16T02:10:09","modified_gmt":"2022-05-16T10:10:09","slug":"news-12779","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/16\/news-12779\/","title":{"rendered":"Custom PowerShell RAT targets Germans seeking information about the Ukraine crisis"},"content":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Mon, 16 May 2022 10:00:00 +0000<\/strong><\/p>\n<p><em>This blog post was authored by Hossein Jazi and J\u00e9r\u00f4me Segura<\/em><\/p>\n<p>Populations around the world\u2014and in Europe in particular\u2014are following the crisis in Ukraine very closely, and with events unfolding on a daily basis, people are hungry for information.<\/p>\n<p>Although all countries have reasons to be concerned, the situation is Germany is more complicated than most. It is one of the few European countries to have received criticism for its attitude to the Ukraine-Russia conflict, as it struggles to end its <a href=\"https:\/\/www.bbc.com\/news\/business-61164894\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">reliance on Russian energy<\/a>, and Moscow recently imposed sanctions on Gazprom Germania, further increasing economic tensions.<\/p>\n<p>This week our analysts discovered a new campaign that plays on these concerns by trying to lure Germans with a promise of updates on the current threat situation in Ukraine. The downloaded document is in fact decoy for a Remote Access Trojan (RAT) capable of stealing data and executing other malicious commands on a victim&#8217;s computer.<\/p>\n<h2>Decoy site lures victims with Ukraine situation<\/h2>\n<p>Threat actors registered an expired German domain name at collaboration-bw[.]de that was formally used as a collaboration platform to develop new ideas for the Baden-W\u00fcrttemberg state.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/old_site.png\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"56609\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/custom-powershell-rat-targets-germans-seeking-information-about-the-ukraine-crisis\/attachment\/old_site\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/old_site.png\" data-orig-size=\"839,409\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"old_site\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/old_site-300x146.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/old_site-600x292.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/old_site.png\" alt=\"\" class=\"wp-image-56609\" width=\"839\" height=\"409\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/old_site.png 839w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/old_site-300x146.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/old_site-600x292.png 600w\" sizes=\"auto, (max-width: 839px) 100vw, 839px\" \/><\/a><figcaption>Threat actors registered an expired domain associated with Baden-W\u00fcrttemberg<\/figcaption><\/figure>\n<\/div>\n<p>The threat actors used the domain to host a website that looked like the official Baden-W\u00fcrttemberg website, baden-wuerttemberg.de.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/compare.png\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"56610\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/custom-powershell-rat-targets-germans-seeking-information-about-the-ukraine-crisis\/attachment\/compare-8\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/compare.png\" data-orig-size=\"1353,751\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"compare\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/compare-300x167.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/compare-600x333.png\" loading=\"lazy\" width=\"1353\" height=\"751\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/compare.png\" alt=\"\" class=\"wp-image-56610\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/compare.png 1353w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/compare-300x167.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/compare-600x333.png 600w\" sizes=\"auto, (max-width: 1353px) 100vw, 1353px\" \/><\/a><figcaption>A comparison of the real baden-wuerttemberg.de (top) and the malicious fake (bottom)<\/figcaption><\/figure>\n<\/div>\n<p>With this copycat, the attackers created the perfect placeholder for the lure they wanted their victims to download: A file tantalising called <code>2022-Q2-Bedrohungslage-Ukraine<\/code> (threat situation in Ukraine for Q2), offered via a prominent blue download button.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/lure_site.png\" data-rel=\"lightbox-image-2\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"56608\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/custom-powershell-rat-targets-germans-seeking-information-about-the-ukraine-crisis\/attachment\/lure_site\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/lure_site.png\" data-orig-size=\"681,690\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"lure_site\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/lure_site-296x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/lure_site-592x600.png\" loading=\"lazy\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/lure_site.png\" alt=\"\" class=\"wp-image-56608\" width=\"681\" height=\"690\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/lure_site.png 681w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/lure_site-296x300.png 296w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/lure_site-592x600.png 592w\" sizes=\"auto, (max-width: 681px) 100vw, 681px\" \/><\/a><figcaption>The website promises important information and tips about the Ukraine crisis<\/figcaption><\/figure>\n<\/div>\n<p>An English translation of the page reads:<\/p>\n<pre class=\"wp-block-preformatted\"><strong>Important, current threat situation regarding the Ukraine crisis<\/strong>  On this website you will always find the most important information and tips for dealing with the current threat posed by the Ukraine crisis. Please download the document now and read through the current information. The document is constantly updated and is up to date. Our suggested tips can be practically implemented in everyday work and you should already implement them today. Thanks for your support.<\/pre>\n<h2>File analysis<\/h2>\n<p>The archive file called <code>2022-Q2-Bedrohungslage-Ukraine<\/code> contains a file named <code>2022-Q2-Bedrohungslage-Ukraine.chm<\/code>. The CHM format is Microsoft&#8217;s HTML help file format, which consists of a number of compiled HTML files.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/chm.png\" data-rel=\"lightbox-image-3\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"56611\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/custom-powershell-rat-targets-germans-seeking-information-about-the-ukraine-crisis\/attachment\/chm\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/chm.png\" data-orig-size=\"616,410\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"chm\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/chm-300x200.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/chm-600x399.png\" loading=\"lazy\" width=\"616\" height=\"410\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/chm.png\" alt=\"\" class=\"wp-image-56611\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/chm.png 616w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/chm-300x200.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/chm-600x399.png 600w\" sizes=\"auto, (max-width: 616px) 100vw, 616px\" \/><\/a><figcaption>The CHM file displays a fake error message<\/figcaption><\/figure>\n<\/div>\n<p>Victims will get a fake error message when they open up that file, while PowerShell quietly runs a Base64 command.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/b64.png\" data-rel=\"lightbox-image-4\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"56619\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/custom-powershell-rat-targets-germans-seeking-information-about-the-ukraine-crisis\/attachment\/b64\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/b64.png\" data-orig-size=\"1295,157\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"b64\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/b64-300x36.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/b64-600x73.png\" loading=\"lazy\" width=\"600\" height=\"73\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/b64-600x73.png\" alt=\"\" class=\"wp-image-56619\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/b64-600x73.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/b64-300x36.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/b64.png 1295w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><figcaption>PowerShell executes a Base64-encoded command<\/figcaption><\/figure>\n<\/div>\n<p>After de-obfuscating the command we can see it is designed to execute a script downloaded from the fake Baden-W\u00fcrttemberg website, using Invoke-Expression (IEX).<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/iex.png\" data-rel=\"lightbox-image-5\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"56620\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/custom-powershell-rat-targets-germans-seeking-information-about-the-ukraine-crisis\/attachment\/iex\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/iex.png\" data-orig-size=\"600,135\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"iex\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/iex-300x68.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/iex.png\" loading=\"lazy\" width=\"600\" height=\"135\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/iex.png\" alt=\"\" class=\"wp-image-56620\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/iex.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/iex-300x68.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><figcaption>The PowerShell code fetches and executes a malicious script<\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/powershell.png\" data-rel=\"lightbox-image-6\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"56612\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/custom-powershell-rat-targets-germans-seeking-information-about-the-ukraine-crisis\/attachment\/powershell-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/powershell.png\" data-orig-size=\"764,472\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"powershell\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/powershell-300x185.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/powershell-600x371.png\" loading=\"lazy\" width=\"764\" height=\"472\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/powershell.png\" alt=\"\" class=\"wp-image-56612\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/powershell.png 764w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/powershell-300x185.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/powershell-600x371.png 600w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/a><figcaption>The malicious script downloaded from the fake Baden-W\u00fcrttemberg website<\/figcaption><\/figure>\n<\/div>\n<p>The downloaded script creates a folder called <code>SecuriyHealthService<\/code> in the current user directory and drops two files into it: <code>MonitorHealth.cmd<\/code> and a script called <code>Status.txt<\/code>. The <code>.cmd<\/code> file is very simple and just executes <code>Status.txt<\/code> through PowerShell.<\/p>\n<p>Finally, the downloaded script makes <code>MonitorHealth.cmd<\/code> persistent by creating a scheduled task that will execute it each day at a specific time. <\/p>\n<h2>PowerShell RAT (Status.txt)<\/h2>\n<p><code>Status.txt<\/code> is a RAT written in PowerShell. It starts its activities by collecting some information about the victim&#8217;s computer, such as the current username and working directory, and the computer&#8217;s hostname. It also builds a unique id for the victim, the <code>clientid<\/code>.<\/p>\n<p>This data is exfiltrated as a JSON data structure sent to the server via a POST request:<\/p>\n<div class=\"wp-block-syntaxhighlighter-code \">\n<pre class=\"brush: powershell; title: ; notranslate\"> $json = '{   &quot;type&quot;: &quot;newclient&quot;,   &quot;result&quot;: &quot;&quot;,   &quot;pwd&quot;: &quot;' + $pwd_b64 + '&quot;,   &quot;cuser&quot;: &quot;' + $cuser + '&quot;,   &quot;hostname&quot;: &quot;' + $hname + '&quot;,   &quot;clientid&quot;: &quot;' + $clientid + '&quot; }';  $headers = @{'X-Request-ID' = $strhash;} <\/pre>\n<\/div>\n<p>However, before executing this requests the script will first bypass the Windows Antimalware Scan Interface (<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/amsi\/antimalware-scan-interface-portal\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">AMSI<\/a>) using an AES-encrypted function called <code>bypass<\/code>. It is decrypted using a generated key and IV before execution.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/bypass.png\" data-rel=\"lightbox-image-7\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"56618\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/custom-powershell-rat-targets-germans-seeking-information-about-the-ukraine-crisis\/attachment\/bypass\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/bypass.png\" data-orig-size=\"1862,638\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"bypass\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/bypass-300x103.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/bypass-600x206.png\" loading=\"lazy\" width=\"1862\" height=\"638\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/bypass.png\" alt=\"\" class=\"wp-image-56618\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/bypass.png 1862w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/bypass-300x103.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/bypass-600x206.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/bypass-1536x526.png 1536w\" sizes=\"auto, (max-width: 1862px) 100vw, 1862px\" \/><\/a><figcaption>The bypass function that contains the encrypted script to bypass AMSI.<\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/amsi.png\" data-rel=\"lightbox-image-8\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"56613\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/custom-powershell-rat-targets-germans-seeking-information-about-the-ukraine-crisis\/attachment\/amsi\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/amsi.png\" data-orig-size=\"786,815\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"amsi\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/amsi-289x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/amsi-579x600.png\" loading=\"lazy\" width=\"786\" height=\"815\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/amsi.png\" alt=\"\" class=\"wp-image-56613\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/amsi.png 786w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/amsi-289x300.png 289w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/amsi-579x600.png 579w\" sizes=\"auto, (max-width: 786px) 100vw, 786px\" \/><\/a><figcaption>The content of the AMSI bypass script after decryption<\/figcaption><\/figure>\n<\/div>\n<p>This RAT has the following capabilities: <\/p>\n<ul>\n<li><strong>Download<\/strong> (type: D0WNl04D): Download files from server<\/li>\n<li><strong>Upload<\/strong> (type: UPL04D): Upload file to the server<\/li>\n<li><strong>LoadPS1<\/strong> (type: L04DPS1): Load and execute a PowerShell script<\/li>\n<li><strong>Command<\/strong> (type: C0MM4ND): Execute a specific command <\/li>\n<\/ul>\n<h2>German command and control server<\/h2>\n<p>The attack was thoughtfully carried out\u2014even ensuring that the stolen data was sent to a German domain name, kleinm[.]de, to avoid suspicion.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/POST.png\" data-rel=\"lightbox-image-9\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"56614\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/custom-powershell-rat-targets-germans-seeking-information-about-the-ukraine-crisis\/attachment\/post-9\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/POST.png\" data-orig-size=\"577,315\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"POST\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/POST-300x164.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/POST.png\" loading=\"lazy\" width=\"577\" height=\"315\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/POST.png\" alt=\"\" class=\"wp-image-56614\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/POST.png 577w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/POST-300x164.png 300w\" sizes=\"auto, (max-width: 577px) 100vw, 577px\" \/><\/a><\/figure>\n<\/div>\n<p>It is not easy to attribute this activity to a specific actor, and there are no solid indicators to support attribution. Based on motivation alone, we hypothesise that a Russian threat actor could be targeting German users, but without clear connections in infrastructure or similarities to known TTPs, such attribution is weak.<\/p>\n<p>The Malwarebytes Threat Intelligence team continues to monitor <a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/hermeticwiper-a-detailed-analysis-of-the-destructive-malware-that-targeted-ukraine\/\">attacks taking advantage of the war<\/a> in Ukraine while ensuring our customers are protected.<\/p>\n<h2>Indicators of Compromise (IOCs)<\/h2>\n<p><strong>Phishing site<\/strong><\/p>\n<p>collaboration-bw[.]de\/bedrohung-ukr.html<\/p>\n<p><strong>Lure<\/strong><\/p>\n<p>2022-Q2-Bedrohungslage-Ukraine.zip<br \/>2430f68285120686233569e51e2147914dc87f82c7dbdf07fe0c34dbb1aca77c<br \/>2022-Q2-Bedrohungslage-Ukraine.chm<br \/>80bad7e0d5a5d2782674bb8334dcca03534aa831c37aebb5962da1cd1bec4130<\/p>\n<p><strong>Status.txt<\/strong><br \/>a5d8beaa832832576ca97809be4eee9441eb6907752a7e1f9a390b29bbb9fe1f<\/p>\n<p><strong>MonitorHealth.cmd<\/strong><br \/>fc71522a4125ca4bdc5e5deca4a6498e7f2da4408614c2e1284c3ae8c083a5fd<\/p>\n<p><strong>C2<\/strong><\/p>\n<p>kleinm[.]de<\/p>\n<h2>MITRE ATT&amp;CK<\/h2>\n<figure class=\"wp-block-table aligncenter is-style-stripes has-small-font-size\">\n<table class=\"has-fixed-layout\">\n<thead>\n<tr>\n<th>Tactic<\/th>\n<th>ID<\/th>\n<th>Name<\/th>\n<th>Description<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Execution<\/td>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1059\" target=\"_blank\" rel=\"noreferrer noopener\">T1059<\/a> <\/td>\n<td>Command and Scripting Interpreter<\/td>\n<td>Starts cmd.exe to run hh.exe<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td>Executes PowerShell script to download and execute a script<\/td>\n<\/tr>\n<tr>\n<td>Persistence<\/td>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1053\" target=\"_blank\" rel=\"noreferrer noopener\">T1053<\/a><\/td>\n<td>Scheduled Task\/Job<\/td>\n<td>Executes task scheduler to add MonitorHealth.cmd as a daily task<\/td>\n<\/tr>\n<tr>\n<td>Defense evasion<\/td>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1222\" target=\"_blank\" rel=\"noreferrer noopener\">T1222<\/a><\/td>\n<td>File and Directory Permissions Modification<\/td>\n<td>Uses attrib.exe to hide SecuriyHealthService folder<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/custom-powershell-rat-targets-germans-seeking-information-about-the-ukraine-crisis\/\">Custom PowerShell RAT targets Germans seeking information about the Ukraine crisis<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/custom-powershell-rat-targets-germans-seeking-information-about-the-ukraine-crisis\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Mon, 16 May 2022 10:00:00 +0000<\/strong><\/p>\n<p>Malwarebytes Threat Intelligence has uncovered an attack using the lure of information about the war in Ukraine to target people in Germany.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/custom-powershell-rat-targets-germans-seeking-information-about-the-ukraine-crisis\/\">Custom PowerShell RAT targets Germans seeking information about the Ukraine crisis<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1195,11191,1810,12040,8642],"class_list":["post-19046","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-germany","tag-powershell","tag-rat","tag-threat-intelligence","tag-ukraine"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19046"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19046\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19046"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}