{"id":21964,"date":"2023-05-11T09:44:01","date_gmt":"2023-05-11T17:44:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/05\/11\/news-15695\/"},"modified":"2023-05-11T09:44:01","modified_gmt":"2023-05-11T17:44:01","slug":"news-15695","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/05\/11\/news-15695\/","title":{"rendered":"Fake system update drops Aurora stealer via Invalid Printer loader"},"content":{"rendered":"<p>Malvertising seems to be enjoying a renaissance as of late, whether it is from ads on search engine results pages or via&nbsp;popular websites. Because browsers are more secure today than they were 5 or 10 years ago, the attacks that we are seeing all involve some form of social engineering.<\/p>\n<p>A threat actor is using malicious ads to redirect users to what looks like a Windows security update. The scheme is very well designed as it relies on the web browser to display a full screen animation that very much resembles what you&#8217;d expect from Microsoft.<\/p>\n<p>The fake&nbsp;security update is using a newly identified loader that at the time of the campaign was oblivious to malware sandboxes and bypassed practically all antivirus engines. We wrote a tool to &#8216;patch&#8217; this loader and identified its actual payload as Aurora stealer. In this blog post, we detail our findings and how this campaign is connected to other attacks.<\/p>\n<h2>A convincing &#8220;system update&#8221;<\/h2>\n<p>Windows users&nbsp;are quite familiar with system updates, often interrupting hours of work or popping up&nbsp;in the middle of an intense game. When that happens, they just want to install whatever needs to be installed and get on with their day.<\/p>\n<p>A threat actor is buying&nbsp;popunder ads targeting adult traffic and tricking victims with what appears to a system security update.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/easset_upload_file12739_265978_e.gif\" alt=\"\" width=\"1919\" height=\"1079\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 1: A fake system update hijacks the screen<\/em><\/p>\n<p>As convincing as it looks, what you see above is actually a browser&nbsp;window that is rendered in full screen. This becomes more obvious when downloading the update file named ChromeUpdate.exe.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/easset_upload_file94573_265978_e.png\" alt=\"\" width=\"874\" height=\"548\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/>Figure 2: The &#8216;Chrome update&#8217; downloaded from the web browser<\/p>\n<h2>Fully Undetectable (FUD) malware<\/h2>\n<p>While the file name appears as ChromeUpdate.exe, it uses the Cyrillic alphabet such that certain characters look similar but are different on disk. Its hex representation is&nbsp;%D0%A1hr%D0%BEm%D0%B5U%D1%80d%D0%B0t%D0%B5.exe as can be seen in the image below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/easset_upload_file63540_265978_e.png\" alt=\"\" width=\"587\" height=\"162\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\">Figure 3: Hex encoding and Cyrillic alphabet<\/p>\n<p>When we first&nbsp;ran the sample into a sandbox, we could not see anything obvious or that it was even malicious. The file would simply run and exit quickly. Over a&nbsp;couple of&nbsp;weeks, we collected&nbsp;nine&nbsp;different samples that looked more or less the same.<\/p>\n<p>We&nbsp;also noticed that the threat actor was uploading each of his new builds to VirusTotal, a service owned by Google, to check if they were being detected by antivirus engines. The first user to submit each new sample always uploaded them from Turkey (country code TR) and in many instances the file name looked like it had come fresh from the compiler (i.e. build1_enc_s.exe).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/easset_upload_file62991_265978_e.png\" alt=\"\" width=\"527\" height=\"490\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\">Figure 4: User submissions to VirusTotal<\/p>\n<p>While VirusTotal is no replacement&nbsp;for a full endpoint security product, with its 70 AV engines it is usually a good indicator to quickly check if a file is malicious or not. For more than 2 weeks, the samples had 0 detection on VT and it wasn&#8217;t until a <a href=\"https:\/\/blog.morphisec.com\/in2al5d-p3in4er\" target=\"_blank\">blog post<\/a> by Morphisec that detections started to appear. This&nbsp;new loader is called Invalid Printer and so far appears to have been used exclusively by this threat actor to bypass security products.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/easset_upload_file80098_265978_e.png\" alt=\"\" width=\"660\" height=\"712\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\">Figure 5: VirusTotal detections coincide with blog release<\/p>\n<p style=\"text-align: left;\">We actually stumbled upon Morphisec&#8217;s blog thanks to Threatray which identified similarities with a file we submitted to their sandbox. The service&#8217;s built-in OSINT identified similar samples and linked them with security articles.&nbsp;<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/easset_upload_file20038_265978_e.png\" alt=\"\" width=\"1918\" height=\"1079\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/>Figure 6: Threatray analysis page<\/p>\n<h2>Patching the loader<\/h2>\n<p>Invalid Printer performs a check&nbsp;on the computer&#8217;s graphic card and specifically its vendor ID which it compares against known manufacturers such as AMD, NVidia. Virtual machines and sandboxes in general do not use real hardware and will fail to pass the check.<\/p>\n<p>We were able to patch the samples we had collected and identify their payload. The patch consists of replacing the graphics card check with a random number and always returning true, therefore allowing the file to run in any sandbox.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/easset_upload_file84359_265978_e.png\" alt=\"\" width=\"632\" height=\"448\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/>Figure 7: Python script to patch loader<\/p>\n<p>The&nbsp;automated malware unpacking service from OpenAnalysis <a href=\"https:\/\/www.unpac.me\/\" target=\"_blank\">UnpacMe<\/a> now supports properly unpacking samples using the Invalid Printer loader. It allowed us to determine what malware family is being distributed as well as indicators of compromise. For example, one of&nbsp;our samples (31c425510fe7f353002b7eb9d101408dde0065b160b089095a2178d1904f3434) has the same command and control server (94.142.138[.]218) as one mentioned in Morphisec&#8217;s blog.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/easset_upload_file70894_265978_e.png\" alt=\"\" width=\"798\" height=\"671\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/>Figure 8: UnpacMe results page<\/p>\n<p style=\"text-align: left;\">In this specific malvertising campaign, the payload used was the Aurora Stealer, a popular piece of malware that is designed to harvest credentials from systems.<\/p>\n<h2>Campaign stats<\/h2>\n<p>The threat actor is using a panel to track high level stats about visitors to the fake system update web page. Based on the numbers from this panel, there were 27,146 potential unique victims and 585&nbsp;of them downloaded the malware during the past 49 days.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/easset_upload_file68526_265978_e.png\" alt=\"\" width=\"979\" height=\"789\" \/><\/p>\n<p style=\"text-align: center;\">Figure 9: Panel showing browser visits and downloads<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/easset_upload_file2801_265978_e.png\" alt=\"\" width=\"1079\" height=\"788\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\">Figure 10: Browser user-agents, IP addresses and geolocation<\/p>\n<h2>War and Russia references<\/h2>\n<p>We believe there is a single threat actor behind this malvertising campaign and others&nbsp;such as the one Morphisec uncovered. The malware author seems to take a very high interest in&nbsp;creating FUD malware and constantly uploads it to VirusTotal to verify, always using the same submitter profile.<\/p>\n<p>We couldn&#8217;t help but notice a possible reference to the war in Ukraine left within the fake Chrome Update page and commented out:<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/easset_upload_file60946_265978_e.png\" alt=\"\" width=\"848\" height=\"409\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/>Figure 11: Commented HTML code<\/p>\n<p>Some of the&nbsp;websites belonging to this threat actor were not loading malware but instead had a single YouTube video promoting the cities and landscapes of Russia:<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/easset_upload_file92521_265978_e.jpg\" alt=\"\" width=\"849\" height=\"441\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/>Figure 12: YouTube video about Russia in 12K HDR&nbsp;<\/p>\n<p>Additionally, we found some connections with tech support scams and even an Amadey panel that also appears to belong to the threat actor.<\/p>\n<h2>Protection<\/h2>\n<p>Malwarebytes already protected users from this malvertising campaign by blocking the malicious ads involved. We detect the payloads as Spyware.Aurora.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/easset_upload_file46480_265978_e.png\" alt=\"\" width=\"784\" height=\"511\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/easset_upload_file4963_265978_e.png\" alt=\"\" width=\"1220\" height=\"728\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>Special thanks to Roberto Santos for help with the sample and binary patching.<\/p>\n<h2>Indicators of Compromise<\/h2>\n<p><strong>Malvertising gate<\/strong><\/p>\n<pre>qqtube[.]ru<strong><br \/><\/strong>194.58.112[.]173<strong><br \/><\/strong><\/pre>\n<p><strong>Fake system update page<\/strong><\/p>\n<pre>activessd[.]ru<br \/>chistauyavoda[.]ru<br \/>xxxxxxxxxxxxxxx[.]ru<br \/>activehdd[.]ru<br \/>oled8kultra[.]ru<br \/>xhamster-18[.]ru<br \/>oled8kultra[.]site<br \/>activessd6[.]ru<br \/>activedebian[.]ru<br \/>shluhapizdec[.]ru<br \/>04042023[.]ru<br \/>clickaineasdfer[.]ru<br \/>moskovpizda[.]ru<br \/>pochelvpizdy[.]ru<br \/>evatds[.]ru<br \/>click7adilla[.]ru<br \/>grhfgetraeg6yrt[.]site<br \/>92.53.96[.]119<\/pre>\n<p><strong>Invalid Printer samples<\/strong><\/p>\n<pre dir=\"ltr\">d29f4ffcc9e2164800dcf5605668bdd4298bcd6e75b58bed9c42196b4225d590<br \/>5a07e02aec263f0c3e3a958f2b3c3d65a55240e5da30bbe77c60dba49d953b2c<br \/>193cec31ea298103fe55164ff6270a2adf70248b3a4d05127414d6981f72cef4<br \/>dac1bd40799564288bf55874543196c4ef6265d89e3228864be4d475258b9062<br \/>40b8acc3560ac0e1825755b3b05ef01c46bdbd184f35a15d0dc84ab44fa99061<br \/>31c425510fe7f353002b7eb9d101408dde0065b160b089095a2178d1904f3434<br \/>398faa3aab8cce7a12e3e3f698bc29514c5b10a4369cc386421913e31f95cfdc<br \/>93b9199ca9e1ee0afbe7cf6acccedd39f37f2dd603a3b1ea05084ab29ff79df7<br \/>4c80bd604ae430864c507d723c6a8c66f4f5e9ba246983c833870d05219bd3e5<\/pre>\n<p><strong>Aurora Stealer C2<\/strong><\/p>\n<pre>103.195.103[.]54:443<br \/>94.142.138[.]218:4561<\/pre>\n<p><strong>Amadey Stealer panel<\/strong><\/p>\n<pre>193.233.20[.]29\/games\/category\/Login.php<\/pre>\n<hr \/>\n<p dir=\"ltr\">Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\" class=\"blue-cta-bttn\">TRY NOW<\/a><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/fake-system-update-drops-new-highly-evasive-loader\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/threat-intelligence\" rel=\"category tag\">Threat Intelligence<\/a><\/p>\n<p>Tags: malvertising<\/p>\n<p>Tags:  Aurora stealer<\/p>\n<p>Tags:  loader<\/p>\n<p>Tags:  Amadey<\/p>\n<p>Not all system updates mean well, and some will even trick you into installing malware.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/fake-system-update-drops-new-highly-evasive-loader\" title=\"Fake system update drops Aurora stealer via Invalid Printer loader\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/fake-system-update-drops-new-highly-evasive-loader\">Fake system update drops Aurora stealer via Invalid Printer loader<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[29336,29335,21940,10531,12040],"class_list":["post-21964","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-amadey","tag-aurora-stealer","tag-loader","tag-malvertising","tag-threat-intelligence"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21964"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21964\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21964"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21964"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}