{"id":24145,"date":"2024-03-12T16:10:05","date_gmt":"2024-03-13T00:10:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/03\/12\/news-17875\/"},"modified":"2024-03-12T16:10:05","modified_gmt":"2024-03-13T00:10:05","slug":"news-17875","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/03\/12\/news-17875\/","title":{"rendered":"FakeBat delivered via several active malvertising campaigns"},"content":{"rendered":"\n<p>February was a particularly busy month for search-based malvertising with the number of incidents we documented almost doubling. We saw similar payloads being dropped but also a few new ones that were particularly good at evading detection.<\/p>\n<p>One malware family we have been tracking on this blog is <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/clever-malvertising-attack-uses-punycode-to-look-like-legitimate-website\">FakeBat<\/a>. It is very unique in that the threat actor uses MSI installers packaged with heavily obfuscated PowerShell code. For weeks, the malvertiser helping to distribute this malware was abusing the same URL shortener services which may have made the attack somewhat predictable. We saw them experimenting with new redirectors and in particular leveraging legitimate websites to bypass security checks.<\/p>\n<p>Another interesting aspect is the diversity of the latest campaigns. For a while, we saw the same software brands (Parsec, Freecad) being impersonated over and over again. With this latest wave of FakeBat malvertising, we are seeing many different brands being targeted.<\/p>\n<p>All the incidents described in this blog have been reported to Google.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-new-redirection-chain\">New redirection chain<\/h2>\n<p>During the past several weeks, FakeBat malvertising campaigns used two kinds of ad URLs. As observed in other malvertising campaigns, they were abusing URL\/analytics shorteners which are ideal for cloaking. That practice enables a threat actor to use a &#8216;good&#8217; or &#8216;bad&#8217; destination URL based on their own defined parameters (time of day, IP address, user-agent, etc.).<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"760\" height=\"189\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_af32ce.png\" alt=\"\" class=\"wp-image-106419\" \/><\/figure>\n<p>The other type of redirect was using subdomains from expired and sitting <em>.com<\/em> domains reassigned for malicious purposes. This is a common trick to give the illusion of credibility. However, in the most recent malvertising campaigns we see the threat actor abusing legitimate websites that appear to have been compromised.<\/p>\n<p>It&#8217;s worth noting that the few examples we found were all Argentinian-based (.ar TLD):<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"710\" height=\"224\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_378dc2.png\" alt=\"\" class=\"wp-image-106426\" \/><\/figure>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"722\" height=\"211\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_abea74.png\" alt=\"\" class=\"wp-image-106425\" \/><\/figure>\n<p>Victims click on the ad which sends a request to those hacked sites. Because the request contains the Google referer, the threat actor is able to serve a conditional redirect to their own malicious site:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"755\" height=\"694\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_28594e.png\" alt=\"\" class=\"wp-image-106443\" \/><\/figure>\n<p>The full infection chain can be summarized in the web traffic image seen below:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"753\" height=\"254\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_299041.png\" alt=\"\" class=\"wp-image-106438\" \/><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-several-active-brand-impersonations\">Several active brand impersonations<\/h2>\n<p>There are currently several campaigns running including OneNote, Epic Games, Ginger and even the Braavos smart wallet application. A number of those malicious domains can be found on Russian-based hoster DataLine (78.24.180[.]93).<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"831\" height=\"833\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_cbb61a.png\" alt=\"\" class=\"wp-image-106445\" \/><\/figure>\n<p>Each downloaded file is an MSIX installer signed with a valid digital certificate (Consoneai Ltd). <\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"594\" height=\"297\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_f75479.png\" alt=\"\" class=\"wp-image-106447\" \/><\/figure>\n<p>Once extracted, each installer contains more or less the same files with a particular PowerShell script:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"604\" height=\"642\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_61bdbf.png\" alt=\"\" class=\"wp-image-106448\" \/><\/figure>\n<p>When the installer is ran, this PowerShell script will execute and connect to the attacker&#8217;s command and control server. Victims of interest will be cataloged for further use.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2>\n<p>FakeBat continues to be a threat to businesses via malicious ads for popular software downloads. The malware distributors are able to bypass Google&#8217;s security checks and redirect victims to deceiving websites.<\/p>\n<p>It is as important to defend against the supporting infrastructure as the malware payloads. However, that is not always easy since legitimate websites may be used to defeat domain blocklists. As always, blocking ads at the source via system policies such as <a href=\"https:\/\/www.threatdown.com\/products\/dns-filtering\/\">ThreatDown DNS Filter<\/a>, remains one the most effective ways to stop malvertising attacks in their tracks.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-indicators-of-compromise\">Indicators of Compromise<\/h2>\n<p><strong>Hacked sites<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">cecar[.]com[.]ar estiloplus[.]tur[.]ar<\/pre>\n<p><strong>Decoy sites<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">obs-software[.]cc bandi-cam[.]cc breavas[.]app open-project[.]org onenote-download[.]com epicgames-store[.]org blcnder[.]org<\/pre>\n<p><strong>Download URLs<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">bezynet[.]com\/OBS-Studio-30[.]0[.]2-Full-Installer-x64[.]msix bezynet[.]com\/Bandicam_7[.]21_win64[.]msix church-notes[.]com\/Braavos-Wallet[.]msix church-notes[.]com\/Epic-Games_Setup[.]msix church-notes[.]com\/Onenote_setup[.]msix<\/pre>\n<p><strong>File hashes<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">07b0c5e7d77629d050d256fa270d21a152b6ef8409f08ecc47899253aff78029<br>0d906e43ddf453fd55c56ccd6132363ef4d66e809d5d8a38edea7622482c1a7a<br>15ce7b4e6decad4b78fe6727d97692a8f5fd13d808da18cb9d4ce51801498ad8<br>40c9b735d720eeb83c85aae8afe0cc136dd4a4ce770022a221f85164a5ff14e5<br>f7fbf33708b385d27469d925ca1b6c93b2c2ef680bc4096657a1f9a30e4b5d18<\/pre>\n<p><strong>Command and control servers<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">ads-pill[.]xyz<br>ads-pill[.]top<br>ads-tooth[.]top<br>ads-analyze[.]top<\/pre>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2024\/03\/fakebat-delivered-via-several-active-malvertising-campaigns\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A number of software brands are being impersonated with malicious ads and fake sites to distribute malware. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12040],"class_list":["post-24145","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24145"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24145\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24145"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}