{"id":22768,"date":"2023-08-23T16:10:27","date_gmt":"2023-08-24T00:10:27","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/08\/23\/news-16498\/"},"modified":"2023-08-23T16:10:27","modified_gmt":"2023-08-24T00:10:27","slug":"news-16498","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/08\/23\/news-16498\/","title":{"rendered":"DarkGate reloaded via malvertising and SEO poisoning campaigns"},"content":{"rendered":"<p>In&nbsp;July 2023, we observed a malvertising campaign that lured potential victims to a fraudulent site for a Windows IT management tool. Unlike previous similar attacks, the final payload was packaged differently and not immediately recognizable.<\/p>\n<p>The&nbsp;decoy file came as an MSI installer containing an AutoIT script&nbsp;where the payload was obfuscated to avoid detection. Upon analysis and comparison, we determined that this sample&nbsp;was an updated version of DarkGate, a multi purpose&nbsp;malware toolkit first identified in 2018.&nbsp;<\/p>\n<p>Since the&nbsp;malware&#8217;s obfuscation and encryption features have been recently documented by other researchers, we will focus on two of its web&nbsp;delivery methods, namely the use of malicious ads and search engine poisoning.<\/p>\n<p>The campaigns we observed coincide with an announcement from DarkGate&#8217;s developer in June as well, boasting about the malware&#8217;s new capabilities and limited customer seats.<\/p>\n<h2>New DarkGate<\/h2>\n<p>In its&nbsp;debut&nbsp;back in 2018 and later in 2020, DarkGate (also known as <a href=\"https:\/\/decoded.avast.io\/janrubin\/complex-obfuscation-meh\/\" target=\"_blank\">MehCrypter<\/a>) was distributed via torrent sites and mostly focused on <a href=\"https:\/\/decoded.avast.io\/janrubin\/meh-2-2\/\" target=\"_blank\">European victims and Spanish users<\/a> in particular. The original <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/enter-the-darkgate-new-cryptocurrency-mining-and-ransomware-campaign\" target=\"_blank\">blog post<\/a> from enSilo (now Fortinet) also notes that its author may have been using email to spread malicious attachments.<\/p>\n<p>In June 2023, a&nbsp;threat actor going by the handle RastaFarEye&nbsp;posted an advertisement&nbsp;in the XSS underground forum about&nbsp;a project known as DarkGate. As <a href=\"https:\/\/www.zerofox.com\/blog\/the-underground-economist-volume-3-issue-12\/\" target=\"_blank\">detailed<\/a> by the ZeroFox Dark Ops intelligence team, the new&nbsp;version&nbsp;includes certain key features to evade detection while offering the expected credential stealing capabilities. The&nbsp;cost ($100K\/year) and limited availability (10 customers) make DarkGate somewhat of an elusive toolkit.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file49548_275963_e.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file49548_275963_e.png\" alt=\"Ad from DarkGate developper\" width=\"1188\" height=\"380\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Photo credit: <a href=\"https:\/\/www.zerofox.com\/blog\/the-underground-economist-volume-3-issue-12\/\" target=\"_blank\">ZeroFox Dark Ops intelligence team<\/a><\/p>\n<p>Two blog posts came out in early August, identifying new DarkGate attacks:<\/p>\n<ul>\n<li>Aon&#8217;s Stroz Friedberg Incident Response Services <a href=\"https:\/\/www.aon.com\/cyber-solutions\/aon_cyber_labs\/darkgate-keylogger-analysis-masterofnone\/\" target=\"_blank\">details<\/a> how they encountered a recent&nbsp;incident from a group&nbsp;similar to&nbsp;ScatteredSpider (UNC3944) that was using this new version of DarkGate.<\/li>\n<li>Researcher 0xToxin <a href=\"https:\/\/0xtoxin.github.io\/threat%20breakdown\/DarkGate-Camapign-Analysis\/\" target=\"_blank\">wrote<\/a> about phishing emails distributing a loader leading to DarkGate, with a complete technical analysis of the malware.<\/li>\n<\/ul>\n<h2>Malvertising<\/h2>\n<p>While investigating malvertising campaigns, we observed&nbsp;the following Google ad on on&nbsp;July 13, 2023:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file6536_275963_e.png\" alt=\"Google Ad\" width=\"535\" height=\"120\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>Advanced IP Scanner is a popular tool used by IT administrators. Victims who click on the ad are presented with a decoy site:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file32728_275963_e.png\" alt=\"Decoy page\" width=\"819\" height=\"404\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>The downloaded file (<em>Advanced_IP_Scanner_2.5.4594.1.msi<\/em>) is an installer that contains the legitimate Advanced IP Scanner binary but also some extra files that are unpacked in the %temp% folder upon execution:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file16684_275963_e.png\" alt=\"Payload\" width=\"589\" height=\"234\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>We recognize the familiar use of AutoIT&nbsp;which was already&nbsp;present&nbsp;in the very early versions of DarkGate.<\/p>\n<p>Note:&nbsp;The same threat actor was also serving malicious ads via Bing&nbsp;as&nbsp;<a href=\"https:\/\/medium.com\/@thrunter\/bing-malvertisements-for-sysadmin-tool-deliver-darkgate-5b82f5e2a925\" target=\"_blank\">documented<\/a> by Cyberuptive on August 8, 2023.<\/p>\n<h2>SEO poisoning<\/h2>\n<p>SEO poisoning is an old technique used by various threat actors and scammers who attempt to game search engines&#8217; ranking system. Although it takes a&nbsp;little more time to roll out, it is an effective way to&nbsp;trick users into visiting malicious sites.<\/p>\n<p>The following&nbsp;search result appeared on&nbsp;Google:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file52601_275963_e.png\" alt=\"\" width=\"730\" height=\"207\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>The domain advancedscanner[.]link was created on&nbsp;2023-07-28 and is used to redirect to the decoy page hosted at&nbsp;ipadvancedscanner[.]com. The downloaded file, IPAVSCAN_win_vers_1.1.3.msi, also has the same AutoIt encrypted payload:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file13495_275963_e.png\" alt=\"\" width=\"624\" height=\"233\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<h2>Anti-VM and other checks<\/h2>\n<p>We noticed that&nbsp;several of the&nbsp;newly registered domains associated with these campaigns had implemented advanced fingerprinting checks. We recently <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/malvertisers-up-the-game-against-researchers\" target=\"_blank\">documented<\/a> this trend which&nbsp;could soon become the norm due to its ease of use.<\/p>\n<p>Here&#8217;s another lure, this time for Angry IP Scanner, with a domain (ipangry[.]com registered&nbsp;2023-07-29):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file10541_275963_e.png\" alt=\"\" width=\"1180\" height=\"755\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>The payload, angry_win_0.47_installer.msi and its AutoIt script:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file72275_275963_e.png\" alt=\"\" width=\"596\" height=\"233\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>By using a combination of&nbsp;evasion techniques, the threat actors behind these campaigns are able to distribute DarkGate with a minimal system footprint. They are also diversifying their delivery techniques by leveraging malspam, malvertising and SEO poisoning.<\/p>\n<p>Malwarebytes&#8217; anti-malware engine&nbsp;detects this malware as&nbsp;Backdoor.DarkGate and our web protection blocks its known command and control servers.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/business\" target=\"_blank\">Malwarebytes for Business<\/a> (EDR)&nbsp;customers&nbsp;may&nbsp;also&nbsp;see the following alerts:<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file27029_275963_e.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file27029_275963_e.png\" alt=\"\" width=\"1445\" height=\"494\" \/><\/a><\/p>\n<h2>Indicators of Compromise<\/h2>\n<p><strong>Malvertising campaign<\/strong><\/p>\n<pre>top[.]advscan[.]com<br \/>advanced-ips-scanne[.]com<br \/>a4scan[.]com<br \/>advanced-ip-scanne[.]com<\/pre>\n<p><strong>SEO poisoning campaign<\/strong><\/p>\n<pre>advancedscanner[.]link<br \/>ipadvancedscanner[.]com<br \/>185.224.137[.]54<br \/>185.11.61[.]65<\/pre>\n<p><strong>DarkGate samples<\/strong><\/p>\n<pre>e5ca3a8732a4645de632d0a6edfaf064bdd34a4824102fbc2b328a974350db8f<br \/>206042ec2b6bc377296c8b7901ce1a00c393df89e7c4cbbb1b8da1a86a153b67<br \/>9a7db0204847d26515ed249f9ed577220326f63a724a2e0fb6bb1d8cd33508a3<\/pre>\n<p><strong><\/strong><strong>DarkGate C2s<\/strong><\/p>\n<pre>80.66.88[.]145<br \/>107.181.161[.]200<\/pre>\n<h2>Additional resources<\/h2>\n<ul>\n<li><a href=\"https:\/\/gist.github.com\/0xToxin\/43e25700510ad3cc6268994b56c9a710\" target=\"_blank\">0xToxin&#8217;s payload decryptor<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/esThreatIntelligence\/RussianPanda\/blob\/main\/darkgate_config_extractor.py\" target=\"_blank\">RussianPanda&#8217;s DarkGate config extractor<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/darkgate-reloaded-via-malvertising-campaigns\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/threat-intelligence\" rel=\"category tag\">Threat Intelligence<\/a><\/p>\n<p>Tags: darkgate<\/p>\n<p>Tags: autoit<\/p>\n<p>Tags: malvertising<\/p>\n<p>Tags: seo poisoning<\/p>\n<p>The new version of the DarkGate malware is currently actively being distributed via malspam, malicious ads and SEO poisoning.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/darkgate-reloaded-via-malvertising-campaigns\" title=\"DarkGate reloaded via malvertising and SEO poisoning campaigns\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/darkgate-reloaded-via-malvertising-campaigns\">DarkGate reloaded via malvertising and SEO poisoning campaigns<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[30010,30009,10531,18568,12040],"class_list":["post-22768","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-autoit","tag-darkgate","tag-malvertising","tag-seo-poisoning","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22768","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22768"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22768\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22768"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22768"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}