{"id":22906,"date":"2023-09-13T16:10:03","date_gmt":"2023-09-14T00:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/09\/13\/news-16636\/"},"modified":"2023-09-13T16:10:03","modified_gmt":"2023-09-14T00:10:03","slug":"news-16636","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/09\/13\/news-16636\/","title":{"rendered":"PSA: Ongoing Webex malvertising campaign drops BatLoader"},"content":{"rendered":"<p>A new malvertising campaign is targeting corporate users who are downloading the popular web conferencing software Webex. Threat actors have bought an advert that impersonates Cisco&#8217;s brand and is displayed first when performing a Google search.<\/p>\n<p>We are releasing this blog to warn users&nbsp;about this threat as the malicious ad has been online for almost one week. The malware being used in this campaign is BatLoader, a type of loader that is very good at evading detection.<\/p>\n<p>Note that Webex&nbsp;has not been compromised,&nbsp;this is a malicious campaign where threat actors are impersonating well-known brands to distribute malware.<\/p>\n<h2>Ad campaign details<\/h2>\n<p>For the past several days, we saw the same malicious ad whenever we searched for Webex. The advert is shown to users before the organic result and yet looks even more genuine as it is displaying the brand&#8217;s logo:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file59514_280779_e.png\" alt=\"\" width=\"1728\" height=\"1206\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>In fact, the ad looks entirely legitimate as it not only uses the Webex logo&nbsp;but also shows the official website. Yet, clicking on the menu to the right of the ad&nbsp;shows&nbsp;more&nbsp;details and reveals the advertiser as an individual from Mexico, quite unlikely to be related to Cisco:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file97124_280779_e.png\" alt=\"\" width=\"1482\" height=\"928\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>To understand&nbsp;how this is happening, we can look at the Google Ads policy&nbsp;for&nbsp;<a href=\"https:\/\/support.google.com\/google-ads\/answer\/6246601\/\" target=\"_blank\">display URLs<\/a>. In particular, Google states that:<\/p>\n<p><em>Your ads&rsquo; URLs should give customers a clear idea of what page they&#8217;ll arrive at when they click an ad. For this reason, Google&#8217;s policy is that both display and landing page URLs should be within the same website. This means that the display URL in your ad needs to match the domain that visitors land on when they click on your ad.<\/em><\/p>\n<p>This malicious ad actually complies with this rule in the strict sense of the term as its landing page URL, also known as <a href=\"https:\/\/support.google.com\/google-ads\/answer\/6080568?sjid=8934865850450445437-NA\" target=\"_blank\">final URL<\/a>, is on the same domain.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file84888_280779_e.png\" alt=\"\" width=\"1776\" height=\"722\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>The threat actor is exploiting a loophole known as the <a href=\"https:\/\/support.google.com\/google-ads\/answer\/7197008?sjid=8934865850450445437-NA\" target=\"_blank\">tracking template<\/a>. Google describes the&nbsp;tracking template&nbsp;as a place where you put URL tracking information. This is particularly helpful for advertisers as it gives them a number of metrics. However, it can also be abused in a way where&nbsp;the tracking template URL is used as a filtering and redirection mechanism.<\/p>\n<p>For example, the threat actor has created a Firebase URL (trixwe.page.link) as their tracking template<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file78269_280779_e.png\" alt=\"\" width=\"872\" height=\"336\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/>The tracking URL can perform a number of checks on the visitor and determine if they&nbsp;are a potential victim. Here&#8217;s what happens if the ad was clicked via a sandbox:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file63119_280779_e.png\" alt=\"\" width=\"1582\" height=\"606\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>We can see the tracking page redirects to a custom attacker-controlled website at monoo3at[.]com. This step allows the threat actor to fingerprint the visitor and then determine which action to take. In this case, the visitor was&nbsp;detected&nbsp;as a sandbox and&nbsp;therefore is being redirected to&nbsp;Webex&#8217;s official website. This technique is important because it allows the malicious advertiser to keep their ad up and running for a long time.<\/p>\n<p>However, when the ad is clicked by a real victim, the web traffic looks very different:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file51972_280779_e.png\" alt=\"\" width=\"1410\" height=\"1056\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>Instead, the user is redirected to a malicious website (webexadvertisingoffer[.]com) purporting to be Webex:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file99958_280779_e.png\" alt=\"\" width=\"1778\" height=\"1530\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<h2>BatLoader: the stealthy malware loader<\/h2>\n<p>The downloaded file exceeds the size limit for many sandboxes and is designed to bypass detection from antivirus products. While VirusTotal is not meant to be a replacement for a security product, it typically provides useful information&nbsp;and is often used by people to check if a file is clean.<\/p>\n<p>In this case, there were 0 detection for this MSI file, in part because the format was unsupported&nbsp;by several security products:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file46639_280779_e.png\" alt=\"\" width=\"2022\" height=\"510\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>But there is more to it and the way the file is packaged is making detection much more difficult. If we extract the installer&#8217;s contents we see many different folders and hundreds of files and libraries:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file35115_280779_e.png\" alt=\"\" width=\"1978\" height=\"1024\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/>This is where a different type of security product, such as an EDR can actually show what is going on. The MSI installer contains anti-sandbox features and will only execute in certain environments.&nbsp;Using <a href=\"https:\/\/www.malwarebytes.com\/business\/cloud\" target=\"_blank\">Malwarebytes&#8217; Nebula<\/a>, our cloud-hosted security platform for businesses, we can see&nbsp;the MSI spawns a number of processes including PowerShell and installs Python from a local resource.<\/p>\n<p>This is <a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.bat_loader\" target=\"_blank\">BatLoader<\/a> and based on the environment it detects, it will retrieve a custom secondary payload.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file48730_280779_e.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file48730_280779_e.png\" alt=\"\" width=\"2448\" height=\"1546\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/a><\/p>\n<p>That payload is downloaded from BatLoader&#8217;s command and control server in encrypted format:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file9574_280779_e.png\" alt=\"\" width=\"1632\" height=\"898\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>It is then then decrypted on disk using openssl, which we can see within our EDR environment:<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file87307_280779_e.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file87307_280779_e.png\" alt=\"\" width=\"2384\" height=\"984\" \/><\/a><\/p>\n<p>That dropped malware is <a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.danabot\" target=\"_blank\">DanaBot<\/a>, which was already detected without signature via&nbsp;our EDR&#8217;s heuristic engine:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file85006_280779_e.png\" alt=\"\" width=\"1648\" height=\"1387\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>We have added detection for BatLoader&#8217;s C2:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file54359_280779_e.png\" alt=\"\" width=\"1564\" height=\"1278\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<h2>Malvertising continues to provide initial access to threat actors<\/h2>\n<p>As we saw in this blog post, malvertising is a threat that continues to target corporate users, in particular by taking advantage of search engines such as Google that are commonly used to search for and download software.<\/p>\n<p>Because the ads look so legitimate, there is little doubt people will click on them and visit unsafe sites. The type of software being used in those ads indicate that threat actors are interested in corporate victims that will provide them with credentials useful for further network &#8220;pentesting&#8221; and, in some cases, ransomware deployment.<\/p>\n<p>Loaders such as BatLoader are stealthy and may not be detected by traditional antivirus. A more complete solution such as EDR coupled with an MDR service where human analysts review suspicious activities performed by the malware is a necessity.<\/p>\n<p>We reported the malvertising incident to Google several days ago and will keep monitoring the ad landscape for any changes from these threat actors.<\/p>\n<h2>Indicators of Compromise<\/h2>\n<p>Cloaking infrastructure<\/p>\n<pre>monoo3at[.]com<br \/>206.71.149[.]46<\/pre>\n<p>Decoy site<\/p>\n<pre>webexadvertisingoffer[.]com<br \/>31.31.196[.]208<\/pre>\n<p>BatLoader<\/p>\n<pre>fugas[.]site\/debug\/Installer90.2.msi<br \/>2727a418f31e8c0841f8c3e79455067798a1c11c2b83b5c74d2de4fb3476b654<\/pre>\n<p>BatLoader C2<\/p>\n<pre>updatecorporatenetworks[.]ru<br \/>91.199.147[.]226<\/pre>\n<p>DanaBot<\/p>\n<pre>7a1245584c0a12186aa7228c75a319ca7f57e7b0db55c1bd9b8d7f9b397bfac8<\/pre>\n<hr \/>\n<p dir=\"ltr\">Malwarebytes EDR and MDR removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\" class=\"blue-cta-bttn\">TRY NOW<\/a><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/ongoing-webex-malvertising-drops-batloader\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/threat-intelligence\" rel=\"category tag\">Threat Intelligence<\/a><\/p>\n<p>Tags: malvertising<\/p>\n<p>Tags: batloader<\/p>\n<p>Corporate users performing Google searches for the popular conferencing software Webex are being targeted in a malvertising campaign.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/ongoing-webex-malvertising-drops-batloader\" title=\"PSA: Ongoing Webex malvertising campaign drops BatLoader\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/ongoing-webex-malvertising-drops-batloader\">PSA: Ongoing Webex malvertising campaign drops BatLoader<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[29831,10531,12040],"class_list":["post-22906","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-batloader","tag-malvertising","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22906"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22906\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22906"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}