{"id":22500,"date":"2023-07-18T16:10:14","date_gmt":"2023-07-19T00:10:14","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/07\/18\/news-16230\/"},"modified":"2023-07-18T16:10:14","modified_gmt":"2023-07-19T00:10:14","slug":"news-16230","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/07\/18\/news-16230\/","title":{"rendered":"FakeSG enters the &#8216;FakeUpdates&#8217; arena to deliver NetSupport RAT"},"content":{"rendered":"<p>Over 5 years ago, we began tracking a new campaign that we called <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\" target=\"_blank\">FakeUpdates<\/a> (also known as <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/part-1-socgholish-very-real-threat-very-fake-update\" target=\"_blank\">SocGholish<\/a>) that used compromised websites to&nbsp;trick users into running a fake browser update. Instead, victims would end up infecting their computers with the NetSupport RAT, allowing threat actors to&nbsp;gain remote access and deliver additional payloads. As we have seen over the years, SocGholish is an established player that has managed to compromise countless victims and deliver ransomware after <a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Behavior:Win32\/Socgolsh.SB&amp;ThreatID=2147815047\" target=\"_blank\">facilitating the installation<\/a> of tools like Cobalt Strike or Mimikatz.<\/p>\n<p>Now, there is a potential new competitor in the &#8220;fake updates&#8221; landscape that looks strangely familiar. The new campaign, which we call FakeSG,&nbsp;also relies on&nbsp;hacked WordPress websites to display a custom landing page mimicking the victim&#8217;s browser. The threat actors are distributing NetSupport RAT either as a zipped download or via an Internet shortcut.&nbsp;While FakeSG appears to be a newcomer, it uses different layers of obfuscation and delivery techniques that make it a threat to take seriously and which could rival potentially rival with SocGholish.&nbsp;&nbsp;<\/p>\n<h2>Campaign similarities<\/h2>\n<p>We first&nbsp;heard of this new campaign thanks to a <a href=\"https:\/\/infosec.exchange\/@rmceoin\/110731409380876450\" target=\"_blank\">Mastodon post<\/a> by <a href=\"https:\/\/infosec.exchange\/@rmceoin\" target=\"_blank\">Randy McEoin<\/a>. The tactics, techniques and procedures (TTPs) are very similar to those of SocGholish and it would be easy to think the two are related. In fact, this chain also leads to NetSupport RAT. However, the template source code is quite different and the payload delivery uses different infrastructure. As a result, we decided to call this variant FakeSG.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file57245_274135_e.png\" alt=\"Original public discovery\" width=\"580\" height=\"676\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<h2>Templates<\/h2>\n<p>FakeSG&nbsp;has different browser templates depending on which browser the victim is running. The themed &#8220;updates&#8221;&nbsp;look very professional&nbsp;and are more up to date than its SocGholish counterpart.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file32228_274135_e.png\" alt=\"Fake Chrome update\" width=\"696\" height=\"917\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file15321_274135_e.png\" alt=\"Fake Edge update\" width=\"697\" height=\"722\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file26649_274135_e.png\" alt=\"Fake Firefox update\" width=\"697\" height=\"719\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<h2>Website injections<\/h2>\n<p>Compromised websites (WordPress appears to be the top target) are injected with a code snippet that replaces the current webpage with the aforementioned fake updates templates. The source code is loaded from one of several domains impersonating Google (google-analytiks[.]com) or Adobe (updateadobeflash[.]website):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file63434_274135_e.png\" alt=\"Malicious code injected into hacked websites\" width=\"1073\" height=\"569\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>That code contains all the web elements (images, fonts, text) needed to render the fake browser update page. We should note that SocGholish used to retrieve media files from separate web requests until more recently when it started using self-contained Base64 encoded images.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file97933_274135_e.png\" alt=\"Source code for Chrome template\" width=\"998\" height=\"936\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<h2>Installation flow<\/h2>\n<p>There are different installation flows for this campaign, but we will focus on the one that uses a URL shortcut. The decoy installer (<em>Install%20Updater%20(V104.25.151)-stable.url<\/em>) is an Internet shortcut downloaded from another compromised WordPress site.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file67288_274135_e.png\" alt=\"Malicious URL shortcut\" width=\"666\" height=\"897\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/>This shorcut uses the WebDav HTTP protocol extension to retrieve the file <em>launcher-upd.hta<\/em> from a remote server:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file44331_274135_e.png\" alt=\"WebDav malicious HTA\" width=\"665\" height=\"896\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>This heavily obfuscated script is responsible for the execution of PowerShell that downloads the final malware payload (NetSupport RAT).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file99756_274135_e.png\" alt=\"Source of malicious HTA file\" width=\"954\" height=\"726\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>Malwarebytes&#8217;s EDR shows the full attack chain (please click to enlarge):<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file72358_274135_e.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file72358_274135_e.png\" alt=\"Killchain viewed by Malwarebytes EDR\" width=\"1517\" height=\"1047\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/a><\/p>\n<p>The NetSupport RAT files are hosted on the same compromised WordPress site used earlier to download the Internet shortcut.&nbsp;The RAT&#8217;s main binary is launched from&nbsp;&#8220;<em>C:Users%username%AppDataRoamingBranScaleclient32.exe<\/em>&#8220;.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file22479_274135_e.png\" alt=\"NetSupport RAT\" width=\"578\" height=\"407\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>Following a successful infection, callbacks are made to the RAT&#8217;s command and control server at 94.158.247[.]27.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file77177_274135_e.png\" alt=\"Web traffic from full infection\" width=\"1184\" height=\"310\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<h2>Roomates<\/h2>\n<p>Fake browser updates are a very common decoy used by malware authors. In addition to SocGholish, the <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\" target=\"_blank\">Domen toolkit<\/a>&nbsp;was a well-built framework that emerged in 2019 while another campaign known as <a href=\"https:\/\/isc.sans.edu\/diary\/sczriptzzbn+inject+pushes+malware+for+NetSupport+RAT\/29170\" target=\"_blank\">sczriptzzbn<\/a> dropped SolarMarker leading to the NetSupport RAT in both cases. Initial access brokers use tools like NetSupport RAT to gather&nbsp;information and perform additional actions on victims of interest. Stolen credentials can be resold to other threat actors tied to ransomware gangs.<\/p>\n<p>It is interesting to see another contender in this relatively small space. While there is a very large number of vulnerable websites, we already see&nbsp;some that have been injected with multiple different malicious code. From a visitor&#8217;s point of view, this means there could be more than one redirect but the&nbsp;&#8220;winner&#8221; will be the one who is able to execute their malicious JavaScript code first.<\/p>\n<p>We will continue to monitor these campaigns and in particular SocGholish to see if the web delivery landscape changes. Malwarebytes customers are protected as we detect the infrastructure and final payload used in these attacks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file15127_274135_e.png\" alt=\"EDR detection\" width=\"900\" height=\"776\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<\/p>\n<h2>Indicators of Compromise (IOCs)<\/h2>\n<p><strong>FakeSG infrastructure<\/strong><\/p>\n<pre>178.159.37[.]73<br \/>google-analytiks[.]com<br \/>googletagmanagar[.]com<br \/>updateadobeflash[.]website<\/pre>\n<p><strong>WebDav launcher<\/strong><\/p>\n<pre>206[.]71[.]148[.]110<br \/>206[.]71[.]148[.]110\/Downloads\/launcher-upd[.]hta<\/pre>\n<p><strong>NetSupport RAT<\/strong><\/p>\n<pre>pietrangelo[.]it\/wp-content\/uploads\/2014\/04\/BranScale[.]zip<br \/>pietrangelo[.]it\/wp-content\/uploads\/2014\/04\/client32[.]exe<\/pre>\n<p><strong>NetSupport RAT C2<\/strong><\/p>\n<pre>94[.]158[.]247[.]27<\/pre>\n<h2>MITRE ATT&amp;CK techniques<\/h2>\n<table border=\"1\" cellpadding=\"0\" cellspacing=\"0\" width=\"882\" style=\"margin-left: auto; margin-right: auto;\"><!--StartFragment--> <\/p>\n<colgroup>\n<col width=\"151\" \/>\n<col width=\"87\" \/>\n<col width=\"280\" \/>\n<col width=\"364\" \/> <\/colgroup>\n<tbody>\n<tr height=\"21\">\n<td height=\"21\" width=\"151\"><strong>Tactic<\/strong><\/td>\n<td width=\"87\"><strong>ID<\/strong><\/td>\n<td width=\"280\"><strong>Name<\/strong><\/td>\n<td width=\"364\"><strong>Details<\/strong><\/td>\n<\/tr>\n<tr height=\"21\">\n<td rowspan=\"3\" height=\"63\">Execution<\/td>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1059\" target=\"_blank\" data-v-9cb1da8c=\"\">T1059<\/a><\/td>\n<td>Command and Scripting Interpreter<\/td>\n<td>Powershell used to download payload<\/td>\n<\/tr>\n<tr height=\"21\">\n<td height=\"21\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1059\/001\" target=\"_blank\" data-v-9cb1da8c=\"\">T1059.001<\/a><\/td>\n<td>Powershell<\/td>\n<td>Starts POWERSHELL.EXE for commands execution<\/td>\n<\/tr>\n<tr height=\"21\">\n<td height=\"21\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1059\/003\" target=\"_blank\" data-v-9cb1da8c=\"\">T1059.003<\/a><\/td>\n<td>Windows Command Shell<\/td>\n<td>Starts CMD.EXE for commands execution<\/td>\n<\/tr>\n<tr height=\"21\">\n<td rowspan=\"2\" height=\"42\">Privilege escalation<\/td>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1548\" target=\"_blank\" data-v-9cb1da8c=\"\">T1548<\/a><\/td>\n<td>Abuse Elevation Control Mechanism<\/td>\n<td>Encoded PowerShell<\/td>\n<\/tr>\n<tr height=\"21\">\n<td height=\"21\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1548\/002\" target=\"_blank\" data-v-9cb1da8c=\"\">T1548.002<\/a><\/td>\n<td>Bypass User Account Control<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr height=\"21\">\n<td rowspan=\"6\" height=\"241\">Defense evasion<\/td>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1564\" target=\"_blank\" data-v-9cb1da8c=\"\">T1564<\/a><\/td>\n<td>Hide Artifacts<\/td>\n<td>&nbsp;Encoded PowerShell<\/td>\n<\/tr>\n<tr height=\"21\">\n<td height=\"21\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1218\" target=\"_blank\" data-v-9cb1da8c=\"\">T1218<\/a><\/td>\n<td>System Binary Proxy Execution<\/td>\n<td>&nbsp;Drops&nbsp;CMSTP.inf in %temp%<\/td>\n<\/tr>\n<tr height=\"21\">\n<td height=\"21\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1027\" target=\"_blank\" data-v-9cb1da8c=\"\">T1027<\/a><\/td>\n<td>Obfuscated Files or Information<\/td>\n<td>&nbsp;Drops&nbsp;th5epzxc.cmdline in %temp%<\/td>\n<\/tr>\n<tr height=\"136\">\n<td height=\"136\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1112\" target=\"_blank\" data-v-9cb1da8c=\"\">T1112<\/a><\/td>\n<td>Modify Registry<\/td>\n<td width=\"364\">Adds key to registry: HKEY_CLASSES_ROOTCLSID{645FF040-5081-101B-9F08-00AA002F954E}shellopencommand \/f \/ve \/t REG_SZ \/d C:UsersadminAppDataRoamingBranScaleclient32.exe<\/td>\n<\/tr>\n<tr height=\"21\">\n<td height=\"21\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1548\" target=\"_blank\" data-v-9cb1da8c=\"\">T1548<\/a><\/td>\n<td>Abuse Elevation Control Mechanism<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr height=\"21\">\n<td height=\"21\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1140\" target=\"_blank\" data-v-9cb1da8c=\"\">T1140<\/a><\/td>\n<td>Deobfuscate\/Decode Files or Information<\/td>\n<td>&nbsp;Encoded PowerShell<\/td>\n<\/tr>\n<tr height=\"21\">\n<td height=\"21\">Discovery<\/td>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1082\" target=\"_blank\" data-v-9cb1da8c=\"\">T1082<\/a><\/td>\n<td>System Information Discovery<\/td>\n<td>Gets computer name<\/td>\n<\/tr>\n<tr height=\"21\">\n<td rowspan=\"2\" height=\"42\">C&amp;C<\/td>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1071\" target=\"_blank\" data-v-9cb1da8c=\"\">T1071<\/a><\/td>\n<td>Application Layer Protocol<\/td>\n<td>NetSupport RAT C2 communication<\/td>\n<\/tr>\n<tr height=\"21\">\n<td height=\"21\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1571\" target=\"_blank\" data-v-9cb1da8c=\"\">T1571<\/a><\/td>\n<td>Non-Standard Port<\/td>\n<td>Port destination: 5051<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<p dir=\"ltr\">Malwarebytes EDR and MDR removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\" class=\"blue-cta-bttn\">TRY NOW<\/a><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/socgholish-copycat-delivers-netsupport-rat\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/threat-intelligence\" rel=\"category tag\">Threat Intelligence<\/a><\/p>\n<p>Tags: fakeupdates<\/p>\n<p>Tags: socgholish<\/p>\n<p>Tags: netsupport<\/p>\n<p>Tags: RAT<\/p>\n<p>A new campaign leveraging compromised WordPress sites emerges with another fake browser update.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/socgholish-copycat-delivers-netsupport-rat\" title=\"FakeSG enters the 'FakeUpdates' arena to deliver NetSupport RAT\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/socgholish-copycat-delivers-netsupport-rat\">FakeSG enters the &#8216;FakeUpdates&#8217; arena to deliver NetSupport RAT<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[18060,22815,1810,22816,12040],"class_list":["post-22500","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-fakeupdates","tag-netsupport","tag-rat","tag-socgholish","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22500"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22500\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22500"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}