{"id":24218,"date":"2024-03-22T12:10:06","date_gmt":"2024-03-22T20:10:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/03\/22\/news-17948\/"},"modified":"2024-03-22T12:10:06","modified_gmt":"2024-03-22T20:10:06","slug":"news-17948","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/03\/22\/news-17948\/","title":{"rendered":"New Go loader pushes Rhadamanthys stealer"},"content":{"rendered":"\n<p>Malware loaders (also known as droppers or downloaders) are a popular commodity in the criminal underground. Their primary function is to successfully compromise a machine and deploy one or multiple additional payloads.<\/p>\n<p>A good loader avoids detection and identifies victims as legitimate (i.e. not sandboxes) before pushing other malware. This part is quite critical as the value of a loader is directly tied to the satisfaction of its &#8220;customers&#8221;.<\/p>\n<p>In this blog post, we describe a malvertising campaign with a loader that was new to us. The program is written in the Go language and uses an interesting technique to deploy its follow-up payload, the Rhadamanthys stealer.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-malicious-ad-targets-system-administrators\">Malicious ad targets system administrators<\/h2>\n<p>PuTTY is a very popular SSH and Telnet client for Windows that has been used by IT admins for years. The threat actor bought an ad that claims to be the PuTTY homepage and appeared at the top of the Google search results page, right before the official website.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"736\" height=\"720\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_8d1f4a.png\" alt=\"\" class=\"wp-image-107107\" \/><\/figure>\n<p>In this example, the ad looks suspicious simply because ad snippet shows a domain name (<em>arnaudpairoto[.]com<\/em>) that is completely unrelated. This is not always the case, and we continue to see many malicious ads that exactly match the impersonated brand.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-fake-putty-site\">Fake PuTTY site<\/h2>\n<p>The ad URL points to the attacker controlled domain where they can easily defeat security checks by showing a &#8220;legitimate&#8221; page to visitors that are not real victims. For example, a crawler, sandbox or scanner, will see this half finished blog:<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1034\" height=\"787\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_70b0ee.png?w=1024\" alt=\"\" class=\"wp-image-107198\" \/><\/figure>\n<p>Real victims coming from the US will be redirected to a fake site instead that looks and feels exactly like putty.org. One of the big differences though is the download link.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"754\" height=\"674\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_bb66c1.png\" alt=\"\" class=\"wp-image-107113\" \/><\/figure>\n<p>The malicious payload is downloaded via a 2 step redirection chain which is something we don&#8217;t always see.<\/p>\n<pre class=\"wp-block-preformatted\">puttyconnect[.]info\/1.php<br>HTTP\/1.1 302 Found<br>Location: astrosphere[.]world\/onserver3.php<\/pre>\n<pre class=\"wp-block-preformatted\">astrosphere[.]world\/onserver3.php<br>HTTP\/1.1 200 OK<br>Server: nginx\/1.24.0<br>Content-Type: application\/octet-stream<br>Content-Length: 13198274<br>Connection: keep-alive<br>Content-Description: File Transfer<br>Content-Disposition: attachment; filename=\"PuTTy.exe\"<\/pre>\n<p>We believe the astrosphere[.]world server is performing some checks for proxies while also logging the victim&#8217;s IP address. This IP address will later be checked before downloading the secondary payload.<\/p>\n<p>That PuTTy.exe is malware, a dropper written in the Go language (version 1.21.0).<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"967\" height=\"543\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_dbe86e.png\" alt=\"\" class=\"wp-image-107255\" \/><\/figure>\n<p>Its author may have given it the name &#8220;<em>Dropper 1.3<\/em>&#8220;:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"631\" height=\"316\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_79e970.png\" alt=\"\" class=\"wp-image-107115\" \/><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-follow-up-payload\">Follow-up payload<\/h2>\n<p>Upon executing the dropper, there is an IP check for the victim&#8217;s public IP address. This is likely done to only continue with users that have gone through the malicious ad and downloaded the malware from the fake site.<\/p>\n<pre class=\"wp-block-preformatted\">zodiacrealm[.]info\/api.php?action=check_ip&amp;ip=[IP Address]<\/pre>\n<p>If a match is found, the dropper proceeds to retrieve a follow-up payload from another server (192.121.16[.]228:22) as seen in the image below:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"725\" height=\"584\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_316552.png\" alt=\"\" class=\"wp-image-107118\" \/><\/figure>\n<p>To get this data, we see it uses the <a href=\"https:\/\/community.cisco.com\/t5\/security-knowledge-base\/sshv2\/ta-p\/3114418\">SSHv2<\/a> (Secure Shell 2.0) protocol implemented via OpenSSH on a Ubuntu server. We can only think of using this protocol to make the malware download more covert.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"713\" height=\"736\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_89d965.png\" alt=\"\" class=\"wp-image-107215\" \/><\/figure>\n<p>That payload is Rhadamanthys which is executed by the parent process PuTTy.exe:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"654\" height=\"180\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_28eb17.png\" alt=\"\" class=\"wp-image-107217\" \/><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-malvertising-loader-combo\">Malvertising \/ loader combo<\/h2>\n<p>We have seen different types of loaders via malvertising campaigns, including FakeBat which we <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2024\/03\/fakebat-delivered-via-several-active-malvertising-campaigns\">profiled<\/a> recently. Given how closely the loader is tied to the malvertising infrastructure it is quite likely that the same threat actor is controlling both. The service they offer to other criminals is one of malware delivery where they take care of the entire deployment process, from ad to loader to final payload.<\/p>\n<p>We reported this campaign to Google. Malwarebytes and <a href=\"https:\/\/www.threatdown.com\/\">ThreatDown<\/a> users are protected as we detect the fake PuTTY installer as <em>Trojan.Script.GO<\/em>.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"763\" height=\"277\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image_b6122c.png\" alt=\"\" class=\"wp-image-107241\" \/><\/figure>\n<p>ThreatDown users that have <a href=\"https:\/\/www.threatdown.com\/products\/dns-filtering\/\">DNS Filtering<\/a> can enable ad blocking in their console to prevent attacks that originate from malicious ads.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-indicators-of-compromise\">Indicators of Compromise<\/h2>\n<p>Decoy ad domain<\/p>\n<pre class=\"wp-block-preformatted\">arnaudpairoto[.]com<\/pre>\n<p>Fake site<\/p>\n<pre class=\"wp-block-preformatted\">puttyconnect[.]info<\/pre>\n<p>PuTTY<\/p>\n<pre class=\"wp-block-preformatted\">astrosphere[.]world 0caa772186814dbf84856293f102c7538980bcd31b70c1836be236e9fa05c48d<\/pre>\n<p>IP check<\/p>\n<pre class=\"wp-block-preformatted\">zodiacrealm[.]info<\/pre>\n<p>Rhadamanthys<\/p>\n<pre class=\"wp-block-preformatted\">192.121.16[.]228:22 bea1d58d168b267c27b1028b47bd6ad19e249630abb7c03cfffede8568749203<\/pre>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2024\/03\/new-go-loader-pushes-rhadamanthys\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A malicious ad for the popular admin tool PuTTY leads victims to a fake site that downloads malware. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12040],"class_list":["post-24218","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-threat-intelligence"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24218"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24218\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}