{"id":9832,"date":"2017-10-12T07:40:16","date_gmt":"2017-10-12T15:40:16","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/12\/news-3605\/"},"modified":"2017-10-12T07:40:16","modified_gmt":"2017-10-12T15:40:16","slug":"news-3605","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/10\/12\/news-3605\/","title":{"rendered":"PDF Phishing Leads to Nanocore RAT, Targets French Nationals"},"content":{"rendered":"<p><strong>Credit to Author: Joie Salvio and Rommel Joven| Date: Thu, 12 Oct 2017 12:54:00 +0000<\/strong><\/p>\n<div class=\"entry\">\n<p>Malware developers use a variety of distribution methods in order to confuse users and evade certain AV solutions. Recently, <a href=\"https:\/\/fortiguard.com\/\">FortiGuard Labs<\/a> found a phishing campaign targeting French Nationals. In this campaign, a PDF file with an embedded javascript is used to download the payload from a Google Drive shared link. As it turns out, the downloaded file is an HTA (HTML Application) file, a format that is becoming more and more common as a malware launch point. It is usually used as a downloader for the actual binary payload. However in this campaign, the binary payload, which was later found to be a&nbsp;<a href=\"https:\/\/fortiguard.com\/encyclopedia\/virus\/7521361\/msil-nanocore-bt-tr\">NanoCore RAT client<\/a>, is actually embedded in the obfuscated HTA. This way, the HTA effectively serves as a wrapper to try and slip passed traditional file type-based scanning in the network as well as anti-spam services.<\/p>\n<h3>Kill Chain Analysis<\/h3>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/pdf_1.png\" style=\"width: 550px; height: 310px;\" \/><\/p>\n<p align=\"center\"><em>Fig. 1 Kill Chain<\/em><\/p>\n<p>In this <a href=\"https:\/\/www.fortinet.com\/products\/security-subscriptions\/anti-spam.html\">spam email campaign<\/a>, threat actors bait French-speaking users to open a PDF attachment through a fake bank loan offer.<\/p>\n<p align=\"center\"><strong><img decoding=\"async\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/pdf_2.png\" style=\"width: 564px; height: 360px;\" \/><\/strong><\/p>\n<p align=\"center\"><em>Fig. 2 Spam mail in French with attached malicious PDF<\/em><\/p>\n<p>When an unsuspecting user opens the PDF, an embedded Javascript is executed that attempts to download a malicious HTA file from a Google Drive shared link. Fortunately, this event triggers a security warning prompt from Adobe Reader. To get past this warning, however, the threat actors exploit the reputation of the Google download site, which many users may assume to be secured, helping assure them that the file to be downloaded can be trusted. In addition, the PDF text also falsely claims that the user has an outdated Flash Player, implying that the file to be downloaded is a required update.<\/p>\n<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/pdf_3.png\" style=\"width: 579px; height: 418px;\" \/><\/p>\n<p align=\"center\"><em>Fig. 3 Javascript in PDF attempts to download from Google Drive<\/em><\/p>\n<p>Google Drive has its own security measures and scans a requested file for viruses before the file is downloaded or shared. Below is the image shown by Google Drive for shared links that are flagged as malicious.<\/p>\n<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/pdf_4.png\" style=\"width: 525px; height: 112px;\" \/><\/p>\n<p align=\"center\"><em>Fig. 4 Google Drive shared link flagged as malicious<\/em><\/p>\n<p>In our analysis, however, for some reason the infected file wasn&rsquo;t detected as malicious, making it an effective attack vector. The downloaded file is an HTA with a VBScript that decodes the embedded binary payload, which is then written to the user&rsquo;s <em>%TEMP% <\/em>and executed. After further investigation, the payload was found out to be NanoCore RAT (Remote Administration Tool).<\/p>\n<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/pdf_5.png\" style=\"width: 601px; height: 221px;\" \/><\/p>\n<p align=\"center\"><em>Fig. 5 HTA with embedded binary payload<\/em><\/p>\n<h3>NanoCore<\/h3>\n<p>NanoCore is not a new name in the RAT industry. With a price tag of US$25, NanoCore has been in circulation since as early as 2013 according to some reports. RATs have been hanging in that delicate balance between surveillance and theft, or between simply being an administration tool and an arsenal for cybercrime. As a case in point, it has been reported that NanoCore&rsquo;s <a href=\"https:\/\/thehackernews.com\/2017\/07\/nanocore-rat-pleads-guilty.html\">author has pled guilty<\/a> to selling the tool to cybercriminals. This has not stopped crooks from distributing it however, especially since cracked versions of the tool&rsquo;s builder are being distributed in hacking forums for free.<\/p>\n<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/pdf_6.png\" style=\"border-width: 0px; border-style: solid; width: 601px; height: 359px;\" \/><\/p>\n<p align=\"center\"><em>Fig. 6 Decompiled NanoCore client<\/em><\/p>\n<p>Remote control, file manipulations, download-execute, and password retrievers are just some of the capabilities that NanoCore offers to whoever gets their hands on the builder. Below is a screenshot of a cracked version of the latest NanoCore Builder (1.2.2.0), which was released way back in 2015.<\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/pdf_7.png\" style=\"border-width: 0px; border-style: solid; width: 601px; height: 333px;\" \/><\/p>\n<p align=\"center\"><em>Fig. 7 Cracked version of NanoCore (1.2.2.0 builder)<\/em><\/p>\n<h3>Solution<\/h3>\n<ol>\n<li><a href=\"https:\/\/www.fortinet.com\/products\/email-security\/fortimail.html\">FortiMail <\/a>blocks all spam emails.<\/li>\n<li><a href=\"https:\/\/www.fortinet.com\/products\/security-subscriptions\/antivirus.html\">FortiGuard Antivirus<\/a> service detects all related samples. (see IOC)<\/li>\n<li><a href=\"https:\/\/www.fortinet.com\/products\/security-subscriptions\/web-filtering.html\">FortiGuard Webfilter<\/a> service blocks and tags the download URL and C&amp;C as malicious.<\/li>\n<\/ol>\n<p>*Download URL has been reported to Google Drive.<\/p>\n<h3>Conclusion<\/h3>\n<p>Focusing on intrinsic details such as the filename and the download site&rsquo;s reputation, threat actors continue to use creative ways to gain the trust of users. As shown in this article, this campaign abuses the reputation of Google Drive to deliver a malware, which also includes its own techniques to evade basic security measures.<\/p>\n<p>Furthermore, it seems clear that the case of a RAT developer being found guilty of aiding cybercriminals has not affected the credentials of similar applications circulating in the security industry. And with cracked versions of the tool being accessible to all, along with all the potential benefits of a free administration tool, some curious minds are certain to take the bait. As a result, we are giving the same advice for NanoCore that we did in our previous <a href=\"https:\/\/blog.fortinet.com\/2016\/08\/29\/german-speakers-targeted-by-spam-leading-to-ozone-rat\">Ozone RAT article<\/a>. Not only is its distribution a free ticket to jail, there are scammers out there baiting users with &ldquo;cracked versions&rdquo; of the builder, which might turn out to be trojanized or the malware client itself.<\/p>\n<p>-= FortiGuard Lion Team =-<\/p>\n<h3>IOC<\/h3>\n<p>3f4541fd800b71b1cfc25b665174e8ba7f1ef2c467e124252fea408598d89a65 &#8211; PDF\/Dloader.GD!tr<\/p>\n<p>cce86a03876eac85f779fa248d86ecaea6aecef9a783a58899f5ea3ed3b8c857 &#8211; MSIL\/Nanocore.BT!tr<\/p>\n<p>d547a836f83e166be6c1e639c61889bdbcf429a9b1ea50a45e2f51e80a2eff31 &#8211; VBS\/Dropper.GD!tr<\/p>\n<h3>C&amp;C:<\/h3>\n<p>42.202.71.145:47581<\/p>\n<p>41.207.196.84:47581<\/p>\n<p>Download URL:<\/p>\n<p>hxxps:\/\/drive.google.com\/uc?export=download&amp;id=0B70ITLgO5DnyUzQ3WWZiQVlzTms<\/p>\n<\/div<br \/><a href=\"https:\/\/blog.fortinet.com\/2017\/10\/12\/pdf-phishing-leads-to-nanocore-rat-targets-french-nationals\" target=\"bwo\" >https:\/\/blog.fortinet.com\/feed<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/pdf_1.png\"\/><\/p>\n<p><strong>Credit to Author: Joie Salvio and Rommel Joven| Date: Thu, 12 Oct 2017 12:54:00 +0000<\/strong><\/p>\n<p>Recently, FortiGuard Labs found a phishing campaign targeting French Nationals. In this campaign, a PDF file with an embedded javascript is used to download the payload from a Google Drive shared link. As it turns out, the downloaded file is an HTA (HTML Application) file, a format that is becoming more and more common as a malware launch point. It is usually used as a downloader for the actual binary payload. However in this campaign,&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-9832","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9832"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9832\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}