|
Void O |
|
Rabisu O |
|
’s O |
|
Use O |
|
of O |
|
RomCom O |
|
Backdoor O |
|
Shows O |
|
a O |
|
|
|
O |
|
Growing O |
|
Shift O |
|
in O |
|
Threat O |
|
Actors O |
|
’ O |
|
Goals O |
|
|
|
O |
|
trendmicro.com/en_us/research/23/e/void-rabisu-s-use-of-romcom-backdoor-shows-a-growing-shift-in-th.html O |
|
|
|
O |
|
May O |
|
30 O |
|
, O |
|
2023 O |
|
|
|
|
|
O |
|
Cyber O |
|
Threats O |
|
|
|
O |
|
Void O |
|
Rabisu O |
|
, O |
|
a O |
|
malicious O |
|
actor O |
|
believed O |
|
to O |
|
be O |
|
associated O |
|
with O |
|
the O |
|
RomCom O |
|
backdoor O |
|
, O |
|
was O |
|
|
|
O |
|
thought O |
|
to O |
|
be O |
|
driven O |
|
by O |
|
financial O |
|
gain O |
|
because O |
|
of O |
|
its O |
|
ransomware O |
|
attacks O |
|
. O |
|
But O |
|
in O |
|
this O |
|
blog O |
|
|
|
O |
|
entry O |
|
, O |
|
we O |
|
discuss O |
|
how O |
|
the O |
|
use O |
|
of O |
|
the O |
|
RomCom O |
|
backdoor O |
|
in O |
|
recent O |
|
attacks O |
|
shows O |
|
how O |
|
Void O |
|
|
|
O |
|
Rabisu O |
|
's O |
|
motives O |
|
seem O |
|
to O |
|
have O |
|
changed O |
|
since O |
|
at O |
|
least O |
|
October O |
|
2022 O |
|
. O |
|
|
|
O |
|
By O |
|
: O |
|
Feike O |
|
Hacquebord O |
|
, O |
|
Stephen O |
|
Hilt O |
|
, O |
|
Fernando O |
|
Merces O |
|
, O |
|
Lord O |
|
Alfred O |
|
Remorin O |
|
May O |
|
30 O |
|
, O |
|
2023 O |
|
|
|
O |
|
Read O |
|
time O |
|
: O |
|
( O |
|
words O |
|
) O |
|
|
|
|
|
O |
|
With O |
|
contributions O |
|
from O |
|
Veronica O |
|
Chierzi O |
|
and O |
|
Jayvee O |
|
Mark O |
|
Villaroman O |
|
|
|
O |
|
Since O |
|
the O |
|
start O |
|
of O |
|
the O |
|
war O |
|
in O |
|
Ukraine O |
|
in O |
|
February O |
|
2022 O |
|
, O |
|
the O |
|
number O |
|
of O |
|
cyber O |
|
campaigns O |
|
|
|
O |
|
against O |
|
Ukraine O |
|
and O |
|
North O |
|
Atlantic O |
|
Treaty O |
|
Organization O |
|
( O |
|
NATO O |
|
) O |
|
countries O |
|
has O |
|
increased O |
|
|
|
O |
|
significantly O |
|
. O |
|
These O |
|
campaigns O |
|
come O |
|
from O |
|
many O |
|
different O |
|
angles O |
|
: O |
|
known O |
|
advanced O |
|
persistent O |
|
|
|
O |
|
threat O |
|
( O |
|
APT O |
|
) O |
|
actors O |
|
, O |
|
APT O |
|
actors O |
|
that O |
|
were O |
|
not O |
|
publicly O |
|
reported O |
|
on O |
|
before O |
|
, O |
|
and O |
|
cyber O |
|
|
|
O |
|
mercenaries O |
|
, O |
|
hacktivists O |
|
, O |
|
and O |
|
criminal O |
|
actors O |
|
who O |
|
appear O |
|
to O |
|
have O |
|
shifted O |
|
from O |
|
purely O |
|
financial O |
|
|
|
O |
|
motives O |
|
to O |
|
geopolitical O |
|
goals O |
|
. O |
|
In O |
|
the O |
|
past O |
|
, O |
|
these O |
|
actors O |
|
had O |
|
different O |
|
motivations O |
|
, O |
|
mode O |
|
of O |
|
|
|
O |
|
operations O |
|
, O |
|
and O |
|
targets O |
|
, O |
|
but O |
|
the O |
|
line O |
|
between O |
|
their O |
|
campaigns O |
|
has O |
|
started O |
|
to O |
|
blur O |
|
: O |
|
Not O |
|
only O |
|
is O |
|
|
|
O |
|
an O |
|
overlap O |
|
in O |
|
their O |
|
targeting O |
|
becoming O |
|
apparent O |
|
, O |
|
but O |
|
the O |
|
distinction O |
|
between O |
|
their O |
|
modes O |
|
of O |
|
|
|
O |
|
operation O |
|
is O |
|
less O |
|
clear O |
|
. O |
|
For O |
|
instance O |
|
, O |
|
in O |
|
2022 O |
|
, O |
|
one O |
|
of O |
|
Conti O |
|
’s O |
|
affiliates O |
|
was O |
|
found O |
|
to O |
|
be O |
|
using O |
|
|
|
O |
|
its O |
|
initial O |
|
access O |
|
techniques O |
|
against O |
|
Ukraine O |
|
instead O |
|
of O |
|
using O |
|
them O |
|
to O |
|
spread O |
|
ransomware O |
|
. O |
|
|
|
O |
|
Another O |
|
example O |
|
of O |
|
this O |
|
is O |
|
Void O |
|
Rabisu O |
|
, O |
|
also O |
|
known O |
|
as O |
|
Tropical O |
|
Scorpius O |
|
, O |
|
an O |
|
actor O |
|
believed O |
|
|
|
O |
|
to O |
|
be O |
|
associated O |
|
with O |
|
Cuba O |
|
ransomware O |
|
and O |
|
the O |
|
RomCom O |
|
backdoor O |
|
. O |
|
Because O |
|
of O |
|
its O |
|
many O |
|
|
|
O |
|
ransomware O |
|
attacks O |
|
, O |
|
Void O |
|
Rabisu O |
|
was O |
|
believed O |
|
to O |
|
be O |
|
financially O |
|
motivated O |
|
, O |
|
even O |
|
though O |
|
its O |
|
|
|
O |
|
associated O |
|
Cuba O |
|
ransomware O |
|
allegedly O |
|
attacked O |
|
the O |
|
parliament O |
|
of O |
|
Montenegro O |
|
in O |
|
August O |
|
|
|
O |
|
2022 O |
|
, O |
|
which O |
|
could O |
|
be O |
|
considered O |
|
part O |
|
of O |
|
a O |
|
geopolitical O |
|
agenda O |
|
. O |
|
The O |
|
motives O |
|
of O |
|
Void O |
|
Rabisu O |
|
|
|
O |
|
seem O |
|
to O |
|
have O |
|
changed O |
|
since O |
|
at O |
|
least O |
|
October O |
|
2022 O |
|
, O |
|
when O |
|
Void O |
|
Rabisu O |
|
’s O |
|
associated O |
|
|
|
O |
|
RomCom O |
|
backdoor O |
|
was O |
|
reported O |
|
to O |
|
have O |
|
been O |
|
used O |
|
in O |
|
attacks O |
|
against O |
|
the O |
|
Ukrainian O |
|
|
|
O |
|
government O |
|
and O |
|
military O |
|
: O |
|
In O |
|
a O |
|
campaign O |
|
in O |
|
December O |
|
2022 O |
|
, O |
|
a O |
|
fake O |
|
version O |
|
of O |
|
the O |
|
Ukrainian O |
|
|
|
O |
|
army O |
|
’s O |
|
DELTA O |
|
situational O |
|
awareness O |
|
website O |
|
was O |
|
used O |
|
to O |
|
lure O |
|
targets O |
|
into O |
|
installing O |
|
the O |
|
|
|
O |
|
RomCom O |
|
backdoor O |
|
. O |
|
Normally O |
|
, O |
|
this O |
|
kind O |
|
of O |
|
brazen O |
|
attack O |
|
would O |
|
be O |
|
thought O |
|
to O |
|
be O |
|
the O |
|
work O |
|
of O |
|
a O |
|
|
|
|
|
O |
|
1/27 O |
|
|
|
|
|
O |
|
nation O |
|
state O |
|
- O |
|
sponsored O |
|
actor O |
|
, O |
|
but O |
|
in O |
|
this O |
|
case O |
|
, O |
|
the O |
|
indicators O |
|
clearly O |
|
pointed O |
|
towards O |
|
Void O |
|
|
|
O |
|
Rabisu O |
|
, O |
|
and O |
|
some O |
|
of O |
|
the O |
|
tactics O |
|
, O |
|
techniques O |
|
, O |
|
and O |
|
procedures O |
|
( O |
|
TTPs O |
|
) O |
|
used O |
|
were O |
|
typically O |
|
|
|
O |
|
associated O |
|
with O |
|
cybercrime O |
|
. O |
|
|
|
O |
|
Trend O |
|
Micro O |
|
’s O |
|
telemetry O |
|
and O |
|
research O |
|
corroborates O |
|
that O |
|
the O |
|
RomCom O |
|
backdoor O |
|
has O |
|
been O |
|
|
|
O |
|
used O |
|
in O |
|
geopolitically O |
|
motivated O |
|
attacks O |
|
since O |
|
at O |
|
least O |
|
October O |
|
2022 O |
|
, O |
|
with O |
|
targets O |
|
that O |
|
|
|
O |
|
included O |
|
organizations O |
|
in O |
|
Ukraine O |
|
’s O |
|
energy O |
|
and O |
|
water O |
|
utility O |
|
sectors O |
|
. O |
|
Targets O |
|
outside O |
|
of O |
|
|
|
O |
|
Ukraine O |
|
were O |
|
observed O |
|
as O |
|
well O |
|
, O |
|
such O |
|
as O |
|
a O |
|
provincial O |
|
local O |
|
government O |
|
that O |
|
provides O |
|
help O |
|
to O |
|
|
|
O |
|
Ukrainian O |
|
refugees O |
|
, O |
|
a O |
|
parliament O |
|
member O |
|
of O |
|
a O |
|
European O |
|
country O |
|
, O |
|
a O |
|
European O |
|
defense O |
|
|
|
O |
|
company O |
|
, O |
|
and O |
|
various O |
|
IT O |
|
service O |
|
providers O |
|
in O |
|
Europe O |
|
and O |
|
the O |
|
US O |
|
. O |
|
Independent O |
|
research O |
|
from O |
|
|
|
O |
|
Google O |
|
showed O |
|
that O |
|
RomCom O |
|
was O |
|
being O |
|
used O |
|
in O |
|
campaigns O |
|
against O |
|
attendees O |
|
of O |
|
the O |
|
|
|
O |
|
Masters O |
|
of O |
|
Digital O |
|
conference O |
|
, O |
|
a O |
|
conference O |
|
organized O |
|
by O |
|
DIGITALEUROPE O |
|
, O |
|
and O |
|
the O |
|
Munich O |
|
|
|
O |
|
Security O |
|
Conference O |
|
. O |
|
|
|
O |
|
In O |
|
this O |
|
blog O |
|
entry O |
|
, O |
|
we O |
|
will O |
|
discuss O |
|
how O |
|
the O |
|
use O |
|
of O |
|
the O |
|
RomCom O |
|
backdoor O |
|
fits O |
|
into O |
|
the O |
|
current O |
|
|
|
O |
|
landscape O |
|
, O |
|
where O |
|
politically O |
|
motivated O |
|
attacks O |
|
are O |
|
not O |
|
committed O |
|
by O |
|
nation O |
|
- O |
|
state O |
|
actors O |
|
|
|
O |
|
alone O |
|
. O |
|
Even O |
|
though O |
|
we O |
|
can O |
|
not O |
|
confirm O |
|
coordination O |
|
between O |
|
the O |
|
different O |
|
attacks O |
|
, O |
|
Ukraine O |
|
|
|
O |
|
and O |
|
countries O |
|
who O |
|
support O |
|
Ukraine O |
|
are O |
|
being O |
|
targeted O |
|
by O |
|
various O |
|
actors O |
|
, O |
|
like O |
|
APT O |
|
actors O |
|
, O |
|
|
|
O |
|
hacktivists O |
|
, O |
|
cyber O |
|
mercenaries O |
|
, O |
|
and O |
|
cybercriminals O |
|
like O |
|
Void O |
|
Rabisu O |
|
. O |
|
We O |
|
will O |
|
also O |
|
delve O |
|
into O |
|
|
|
O |
|
how O |
|
RomCom O |
|
has O |
|
evolved O |
|
over O |
|
time O |
|
and O |
|
how O |
|
the O |
|
backdoor O |
|
is O |
|
spread O |
|
both O |
|
by O |
|
methods O |
|
that O |
|
|
|
O |
|
look O |
|
like O |
|
APT O |
|
, O |
|
as O |
|
well O |
|
as O |
|
methods O |
|
used O |
|
by O |
|
prominent O |
|
cybercriminal O |
|
campaigns O |
|
taking O |
|
place O |
|
|
|
O |
|
currently O |
|
, O |
|
to O |
|
show O |
|
that O |
|
RomCom O |
|
is O |
|
using O |
|
more O |
|
detection O |
|
evasion O |
|
techniques O |
|
that O |
|
are O |
|
popular O |
|
|
|
O |
|
among O |
|
the O |
|
most O |
|
impactful O |
|
cybercriminals O |
|
. O |
|
|
|
O |
|
We O |
|
assess O |
|
that O |
|
RomCom O |
|
makes O |
|
use O |
|
of O |
|
the O |
|
same O |
|
third O |
|
- O |
|
party O |
|
services O |
|
that O |
|
are O |
|
being O |
|
utilized O |
|
|
|
O |
|
by O |
|
other O |
|
criminal O |
|
actors O |
|
as O |
|
well O |
|
, O |
|
like O |
|
malware O |
|
signing O |
|
and O |
|
binary O |
|
encryption O |
|
. O |
|
RomCom O |
|
has O |
|
|
|
O |
|
been O |
|
spread O |
|
through O |
|
numerous O |
|
lure O |
|
sites O |
|
that O |
|
are O |
|
sometimes O |
|
set O |
|
up O |
|
in O |
|
rapid O |
|
bursts O |
|
. O |
|
These O |
|
|
|
O |
|
lure O |
|
sites O |
|
are O |
|
most O |
|
likely O |
|
only O |
|
meant O |
|
for O |
|
a O |
|
small O |
|
number O |
|
of O |
|
targets O |
|
, O |
|
thus O |
|
making O |
|
discovery O |
|
|
|
O |
|
and O |
|
analysis O |
|
more O |
|
difficult O |
|
. O |
|
Void O |
|
Rabisu O |
|
is O |
|
one O |
|
of O |
|
the O |
|
most O |
|
evident O |
|
examples O |
|
of O |
|
financially O |
|
|
|
O |
|
motivated O |
|
threat O |
|
actors O |
|
whose O |
|
goals O |
|
and O |
|
motivations O |
|
are O |
|
becoming O |
|
more O |
|
aligned O |
|
under O |
|
|
|
O |
|
extraordinary O |
|
geopolitical O |
|
circumstances O |
|
, O |
|
and O |
|
we O |
|
anticipate O |
|
that O |
|
this O |
|
will O |
|
happen O |
|
more O |
|
in O |
|
the O |
|
|
|
O |
|
future O |
|
. O |
|
|
|
O |
|
RomCom O |
|
campaigns O |
|
|
|
O |
|
We O |
|
have O |
|
been O |
|
tracking O |
|
RomCom O |
|
campaigns O |
|
since O |
|
the O |
|
summer O |
|
of O |
|
2022 O |
|
, O |
|
and O |
|
since O |
|
then O |
|
, O |
|
|
|
O |
|
have O |
|
seen O |
|
an O |
|
escalation O |
|
in O |
|
its O |
|
detection O |
|
evasion O |
|
methods O |
|
: O |
|
Not O |
|
only O |
|
do O |
|
the O |
|
malware O |
|
samples O |
|
|
|
O |
|
routinely O |
|
use O |
|
VMProtect O |
|
to O |
|
make O |
|
both O |
|
manual O |
|
and O |
|
automated O |
|
sandbox O |
|
analysis O |
|
more O |
|
|
|
O |
|
difficult O |
|
, O |
|
they O |
|
also O |
|
utilize O |
|
binary O |
|
padding O |
|
techniques O |
|
on O |
|
the O |
|
payload O |
|
files O |
|
. O |
|
This O |
|
adds O |
|
a O |
|
|
|
O |
|
significant O |
|
amount O |
|
of O |
|
overlay O |
|
bytes O |
|
to O |
|
the O |
|
files O |
|
, O |
|
increasing O |
|
the O |
|
size O |
|
of O |
|
the O |
|
malicious O |
|
payload O |
|
|
|
O |
|
( O |
|
we O |
|
've O |
|
seen O |
|
a O |
|
file O |
|
with O |
|
1.7 O |
|
gigabytes O |
|
) O |
|
. O |
|
Additionally O |
|
, O |
|
a O |
|
new O |
|
routine O |
|
has O |
|
been O |
|
recently O |
|
added O |
|
|
|
O |
|
that O |
|
involves O |
|
the O |
|
encryption O |
|
of O |
|
the O |
|
payload O |
|
files O |
|
, O |
|
which O |
|
can O |
|
only O |
|
be O |
|
decrypted O |
|
if O |
|
a O |
|
certain O |
|
key O |
|
|
|
O |
|
is O |
|
downloaded O |
|
to O |
|
activate O |
|
the O |
|
payload O |
|
. O |
|
|
|
|
|
O |
|
2/27 O |
|
|
|
|
|
O |
|
In O |
|
addition O |
|
to O |
|
these O |
|
technical O |
|
evasion O |
|
techniques O |
|
, O |
|
RomCom O |
|
is O |
|
being O |
|
distributed O |
|
using O |
|
lure O |
|
|
|
O |
|
sites O |
|
that O |
|
often O |
|
appear O |
|
legitimate O |
|
and O |
|
are O |
|
being O |
|
utilized O |
|
in O |
|
narrow O |
|
targeting O |
|
. O |
|
This O |
|
makes O |
|
|
|
O |
|
automated O |
|
blocking O |
|
of O |
|
these O |
|
lure O |
|
websites O |
|
through O |
|
web O |
|
reputation O |
|
systems O |
|
harder O |
|
. O |
|
Void O |
|
|
|
O |
|
Rabisu O |
|
has O |
|
been O |
|
using O |
|
Google O |
|
Ads O |
|
to O |
|
entice O |
|
their O |
|
targets O |
|
to O |
|
visit O |
|
the O |
|
lure O |
|
sites O |
|
, O |
|
similar O |
|
to O |
|
a O |
|
|
|
O |
|
campaign O |
|
that O |
|
distributed O |
|
IcedID O |
|
botnet O |
|
in O |
|
December O |
|
2022 O |
|
. O |
|
A O |
|
key O |
|
difference O |
|
is O |
|
that O |
|
while O |
|
|
|
O |
|
IcedID O |
|
’s O |
|
targeting O |
|
was O |
|
wider O |
|
, O |
|
Void O |
|
Rabisu O |
|
probably O |
|
opted O |
|
for O |
|
narrower O |
|
targeting O |
|
that O |
|
Google O |
|
|
|
O |
|
Ads O |
|
offers O |
|
to O |
|
its O |
|
advertisers O |
|
. O |
|
RomCom O |
|
campaigns O |
|
also O |
|
make O |
|
use O |
|
of O |
|
highly O |
|
targeted O |
|
spear O |
|
|
|
O |
|
phishing O |
|
emails O |
|
. O |
|
|
|
O |
|
On O |
|
the O |
|
RomCom O |
|
lure O |
|
sites O |
|
, O |
|
targets O |
|
are O |
|
offered O |
|
trojanized O |
|
versions O |
|
of O |
|
legitimate O |
|
applications O |
|
, O |
|
|
|
O |
|
like O |
|
chat O |
|
apps O |
|
such O |
|
as O |
|
AstraChat O |
|
and O |
|
Signal O |
|
, O |
|
PDF O |
|
readers O |
|
, O |
|
remote O |
|
desktop O |
|
apps O |
|
, O |
|
password O |
|
|
|
O |
|
managers O |
|
, O |
|
and O |
|
other O |
|
tools O |
|
, O |
|
that O |
|
are O |
|
typically O |
|
used O |
|
by O |
|
system O |
|
administrators O |
|
. O |
|
|
|
O |
|
dirwinstat.com O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
April O |
|
4 O |
|
, O |
|
2023 O |
|
) O |
|
|
|
|
|
O |
|
3/27 O |
|
|
|
|
|
O |
|
devolrdm.com O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
March O |
|
23 O |
|
, O |
|
2023 O |
|
) O |
|
|
|
|
|
O |
|
vectordmanagesoft.com O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
March O |
|
22 O |
|
, O |
|
2023 O |
|
) O |
|
|
|
|
|
O |
|
4/27 O |
|
|
|
|
|
O |
|
cozy-sofware.com O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
March O |
|
13 O |
|
, O |
|
2023 O |
|
) O |
|
|
|
|
|
O |
|
devolutionrdp.com O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
March O |
|
6 O |
|
, O |
|
2023 O |
|
) O |
|
|
|
|
|
O |
|
5/27 O |
|
|
|
|
|
O |
|
astrachats.com O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
February O |
|
27 O |
|
, O |
|
|
|
O |
|
2023 O |
|
) O |
|
|
|
|
|
O |
|
chatgpt4beta.com O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
February O |
|
23 O |
|
, O |
|
|
|
O |
|
2023 O |
|
) O |
|
|
|
|
|
O |
|
6/27 O |
|
|
|
|
|
O |
|
singularlabs.org O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
January O |
|
30 O |
|
, O |
|
|
|
O |
|
2023 O |
|
) O |
|
|
|
|
|
O |
|
gotomeet.us O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
December O |
|
14 O |
|
, O |
|
|
|
O |
|
2022 O |
|
) O |
|
|
|
|
|
O |
|
7/27 O |
|
|
|
|
|
O |
|
gllmp.com O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
December O |
|
8 O |
|
, O |
|
|
|
O |
|
2022 O |
|
) O |
|
|
|
|
|
O |
|
lnfo-messengers.com O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
November O |
|
3 O |
|
, O |
|
|
|
O |
|
2022 O |
|
) O |
|
|
|
|
|
O |
|
8/27 O |
|
|
|
|
|
O |
|
pass-shield.com O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
October O |
|
15 O |
|
, O |
|
|
|
O |
|
2022 O |
|
) O |
|
|
|
|
|
O |
|
pdffreader.com O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
October O |
|
12 O |
|
, O |
|
|
|
O |
|
2022 O |
|
) O |
|
|
|
|
|
O |
|
9/27 O |
|
|
|
|
|
O |
|
10/27 O |
|
|
|
|
|
O |
|
veeame.com O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
September O |
|
, O |
|
9 O |
|
|
|
O |
|
2022 O |
|
) O |
|
|
|
|
|
O |
|
npm-solar.com O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
July O |
|
31 O |
|
, O |
|
2022 O |
|
) O |
|
|
|
|
|
O |
|
11/27 O |
|
|
|
|
|
O |
|
advanced-ipscanners.com O |
|
|
|
O |
|
( O |
|
as O |
|
of O |
|
July O |
|
20 O |
|
, O |
|
2022 O |
|
) O |
|
|
|
|
|
O |
|
Table O |
|
1 O |
|
. O |
|
RomCom O |
|
lure O |
|
sites O |
|
|
|
O |
|
Image O |
|
credit O |
|
: O |
|
DomainTools O |
|
|
|
O |
|
As O |
|
reported O |
|
by O |
|
the O |
|
Ukrainian O |
|
Computer O |
|
Emergency O |
|
Response O |
|
Team O |
|
( O |
|
CERT O |
|
- O |
|
UA O |
|
) O |
|
in O |
|
the O |
|
fall O |
|
of O |
|
|
|
O |
|
2022 O |
|
, O |
|
RomCom O |
|
was O |
|
used O |
|
in O |
|
specific O |
|
campaigns O |
|
against O |
|
Ukrainian O |
|
targets O |
|
, O |
|
including O |
|
the O |
|
|
|
O |
|
Ukrainian O |
|
government O |
|
and O |
|
the O |
|
Ukrainian O |
|
military O |
|
. O |
|
Trend O |
|
Micro O |
|
’s O |
|
telemetry O |
|
confirms O |
|
this O |
|
|
|
O |
|
targeting O |
|
, O |
|
and O |
|
, O |
|
as O |
|
shown O |
|
in O |
|
a O |
|
selection O |
|
of O |
|
the O |
|
numerous O |
|
RomCom O |
|
campaigns O |
|
over O |
|
time O |
|
|
|
O |
|
( O |
|
Table O |
|
1 O |
|
) O |
|
, O |
|
it O |
|
is O |
|
immediately O |
|
clear O |
|
that O |
|
RomCom O |
|
already O |
|
had O |
|
Ukrainian O |
|
- O |
|
language O |
|
social O |
|
|
|
O |
|
engineering O |
|
lures O |
|
back O |
|
in O |
|
October O |
|
and O |
|
November O |
|
2022 O |
|
. O |
|
|
|
O |
|
We O |
|
count O |
|
a O |
|
few O |
|
dozen O |
|
lure O |
|
websites O |
|
that O |
|
have O |
|
been O |
|
set O |
|
up O |
|
since O |
|
July O |
|
2022 O |
|
. O |
|
RomCom O |
|
shows O |
|
|
|
O |
|
a O |
|
mix O |
|
in O |
|
their O |
|
targeting O |
|
methodologies O |
|
, O |
|
mixing O |
|
typical O |
|
cybercriminal O |
|
TTPs O |
|
with O |
|
TTPs O |
|
that O |
|
are O |
|
|
|
O |
|
more O |
|
common O |
|
for O |
|
APT O |
|
actors O |
|
. O |
|
For O |
|
example O |
|
, O |
|
RomCom O |
|
used O |
|
spear O |
|
phishing O |
|
against O |
|
a O |
|
|
|
O |
|
member O |
|
of O |
|
a O |
|
European O |
|
parliament O |
|
in O |
|
March O |
|
2022 O |
|
, O |
|
but O |
|
targeted O |
|
a O |
|
European O |
|
defense O |
|
|
|
O |
|
company O |
|
in O |
|
October O |
|
2022 O |
|
with O |
|
a O |
|
Google O |
|
Ads O |
|
advertisement O |
|
that O |
|
led O |
|
to O |
|
an O |
|
intermediary O |
|
|
|
O |
|
landing O |
|
site O |
|
that O |
|
would O |
|
redirect O |
|
to O |
|
a O |
|
RomCom O |
|
lure O |
|
site O |
|
. O |
|
That O |
|
intermediary O |
|
landing O |
|
site O |
|
used O |
|
|
|
O |
|
the O |
|
domain O |
|
name O |
|
“ O |
|
kagomadb[.]com O |
|
, O |
|
” O |
|
which O |
|
was O |
|
later O |
|
used O |
|
for O |
|
Qakbot O |
|
and O |
|
Gozi O |
|
payloads O |
|
in O |
|
|
|
O |
|
December O |
|
2022 O |
|
. O |
|
|
|
|
|
O |
|
12/27 O |
|
|
|
|
|
O |
|
Among O |
|
the O |
|
targets O |
|
we O |
|
have O |
|
seen O |
|
based O |
|
on O |
|
Trend O |
|
Micro O |
|
’s O |
|
telemetry O |
|
were O |
|
a O |
|
water O |
|
utility O |
|
|
|
O |
|
company O |
|
, O |
|
entities O |
|
in O |
|
the O |
|
financial O |
|
and O |
|
energy O |
|
sectors O |
|
, O |
|
and O |
|
an O |
|
IT O |
|
company O |
|
in O |
|
Ukraine O |
|
. O |
|
Outside O |
|
|
|
O |
|
Ukraine O |
|
, O |
|
other O |
|
targets O |
|
included O |
|
a O |
|
local O |
|
government O |
|
agency O |
|
that O |
|
supports O |
|
Ukrainian O |
|
refugees O |
|
, O |
|
|
|
O |
|
a O |
|
defense O |
|
company O |
|
in O |
|
Europe O |
|
, O |
|
a O |
|
high O |
|
- O |
|
profile O |
|
European O |
|
politician O |
|
, O |
|
several O |
|
IT O |
|
service O |
|
|
|
O |
|
providers O |
|
in O |
|
Europe O |
|
and O |
|
the O |
|
US O |
|
, O |
|
a O |
|
bank O |
|
in O |
|
South O |
|
America O |
|
, O |
|
and O |
|
a O |
|
couple O |
|
of O |
|
targets O |
|
located O |
|
in O |
|
|
|
O |
|
Asia O |
|
. O |
|
Combined O |
|
with O |
|
the O |
|
targets O |
|
that O |
|
were O |
|
published O |
|
by O |
|
CERT O |
|
- O |
|
UA O |
|
and O |
|
Google O |
|
, O |
|
a O |
|
clear O |
|
|
|
O |
|
picture O |
|
emerges O |
|
of O |
|
the O |
|
RomCom O |
|
backdoor O |
|
’s O |
|
targets O |
|
: O |
|
select O |
|
Ukrainian O |
|
targets O |
|
and O |
|
allies O |
|
of O |
|
|
|
O |
|
Ukraine O |
|
. O |
|
|
|
O |
|
RomCom O |
|
3.0 O |
|
: O |
|
The O |
|
AstraChat O |
|
Campaign O |
|
|
|
O |
|
In O |
|
this O |
|
section O |
|
, O |
|
we O |
|
will O |
|
analyze O |
|
one O |
|
of O |
|
the O |
|
RomCom O |
|
backdoor O |
|
samples O |
|
that O |
|
was O |
|
used O |
|
in O |
|
|
|
O |
|
February O |
|
2023 O |
|
against O |
|
targets O |
|
in O |
|
Eastern O |
|
Europe O |
|
. O |
|
Previous O |
|
RomCom O |
|
versions O |
|
analyzed O |
|
by O |
|
|
|
O |
|
Palo O |
|
Alto O |
|
's O |
|
Unit O |
|
42 O |
|
use O |
|
a O |
|
modular O |
|
architecture O |
|
and O |
|
support O |
|
up O |
|
to O |
|
20 O |
|
different O |
|
commands O |
|
. O |
|
|
|
O |
|
Since O |
|
then O |
|
, O |
|
the O |
|
malware O |
|
evolved O |
|
significantly O |
|
in O |
|
terms O |
|
of O |
|
the O |
|
number O |
|
of O |
|
supported O |
|
|
|
O |
|
commands O |
|
, O |
|
but O |
|
its O |
|
modular O |
|
architecture O |
|
remains O |
|
almost O |
|
unchanged O |
|
. O |
|
The O |
|
threat O |
|
actor O |
|
behind O |
|
|
|
O |
|
RomCom O |
|
3.0 O |
|
also O |
|
makes O |
|
use O |
|
of O |
|
different O |
|
techniques O |
|
to O |
|
drop O |
|
and O |
|
execute O |
|
the O |
|
malware O |
|
. O |
|
This O |
|
|
|
O |
|
analysis O |
|
is O |
|
based O |
|
on O |
|
a O |
|
campaign O |
|
that O |
|
embedded O |
|
RomCom O |
|
3.0 O |
|
in O |
|
an O |
|
AstraChat O |
|
instant O |
|
|
|
O |
|
messaging O |
|
software O |
|
installation O |
|
package O |
|
. O |
|
|
|
O |
|
Dropper O |
|
|
|
O |
|
The O |
|
file O |
|
astrachat.msi O |
|
is O |
|
a O |
|
Microsoft O |
|
Installer O |
|
( O |
|
MSI O |
|
) O |
|
archive O |
|
. O |
|
Despite O |
|
installing O |
|
files O |
|
related O |
|
to O |
|
|
|
O |
|
legitimate O |
|
AstraChat O |
|
software O |
|
, O |
|
it O |
|
unpacks O |
|
a O |
|
malicious O |
|
InstallA.dll O |
|
file O |
|
and O |
|
calls O |
|
its O |
|
Main O |
|
( O |
|
) O |
|
|
|
O |
|
function O |
|
( O |
|
Figure O |
|
1 O |
|
) O |
|
. O |
|
|
|
|
|
O |
|
Figure O |
|
1 O |
|
. O |
|
CustomAction O |
|
table O |
|
from O |
|
a O |
|
RomCom O |
|
MSI O |
|
dropper O |
|
|
|
O |
|
The O |
|
InstallA.dll O |
|
file O |
|
extracts O |
|
three O |
|
Dynamic O |
|
Link O |
|
Libraries O |
|
( O |
|
DLLs O |
|
) O |
|
files O |
|
under O |
|
the O |
|
|
|
O |
|
% O |
|
PUBLIC%\Libraries O |
|
folder O |
|
: O |
|
|
|
O |
|
prxyms O |
|
< O |
|
number>.dll O |
|
|
|
O |
|
13/27 O |
|
|
|
|
|
O |
|
winipfile O |
|
< O |
|
number>.dll0 O |
|
|
|
O |
|
netid O |
|
< O |
|
number>.dll0 O |
|
|
|
O |
|
The O |
|
number O |
|
in O |
|
these O |
|
DLL O |
|
files O |
|
is O |
|
an O |
|
integer O |
|
number O |
|
based O |
|
on O |
|
the O |
|
Machine O |
|
GUID O |
|
read O |
|
from O |
|
|
|
O |
|
Windows O |
|
Registry O |
|
at O |
|
HKLM\SOFTWARE\Microsoft\Cryptography\MachineGuid O |
|
. O |
|
|
|
O |
|
Persistence O |
|
|
|
O |
|
For O |
|
persistence O |
|
, O |
|
RomCom O |
|
uses O |
|
COM O |
|
hijacking O |
|
, O |
|
hence O |
|
its O |
|
name O |
|
. O |
|
InstallA.dll O |
|
writes O |
|
the O |
|
|
|
O |
|
following O |
|
registry O |
|
value O |
|
in O |
|
Windows O |
|
Registry O |
|
: O |
|
|
|
O |
|
[ O |
|
HKEY_CURRENT_USER\SOFTWARE\Classes\CLSID\{C90250F3 O |
|
- O |
|
4D7D-4991 O |
|
- O |
|
9B69A5C5BC1C2AE6}\InProcServer32 O |
|
] O |
|
|
|
O |
|
@="%PUBLIC%\\Libraries\\prxyms O |
|
< O |
|
number>.dll O |
|
" O |
|
|
|
O |
|
This O |
|
overwrites O |
|
the O |
|
same O |
|
key O |
|
under O |
|
the O |
|
HKEY_LOCAL_MACHINE O |
|
hive O |
|
, O |
|
causing O |
|
processes O |
|
|
|
O |
|
that O |
|
request O |
|
this O |
|
Class O |
|
ID O |
|
( O |
|
CLSID O |
|
) O |
|
to O |
|
load O |
|
the O |
|
RomCom O |
|
loader O |
|
DLL O |
|
at O |
|
|
|
O |
|
% O |
|
PUBLIC%\Libraries\prxyms O |
|
< O |
|
number>.dll O |
|
. O |
|
One O |
|
such O |
|
process O |
|
is O |
|
explorer.exe O |
|
, O |
|
which O |
|
is O |
|
|
|
O |
|
restarted O |
|
by O |
|
RomCom O |
|
dropper O |
|
, O |
|
so O |
|
the O |
|
loader O |
|
DLL O |
|
is O |
|
called O |
|
. O |
|
|
|
O |
|
The O |
|
RomCom O |
|
loader O |
|
also O |
|
redirects O |
|
calls O |
|
to O |
|
its O |
|
exported O |
|
functions O |
|
to O |
|
the O |
|
legit O |
|
actxprxy.dll O |
|
by O |
|
|
|
O |
|
making O |
|
use O |
|
of O |
|
forwarded O |
|
exports O |
|
( O |
|
Figure O |
|
2 O |
|
) O |
|
. O |
|
|
|
|
|
O |
|
Figure O |
|
2 O |
|
. O |
|
Forwarded O |
|
exports O |
|
from O |
|
the O |
|
RomCom O |
|
3.0 O |
|
loader O |
|
( O |
|
prxyms O |
|
< O |
|
number>.dll O |
|
) O |
|
|
|
O |
|
However O |
|
, O |
|
before O |
|
a O |
|
call O |
|
is O |
|
forwarded O |
|
, O |
|
the O |
|
malicious O |
|
code O |
|
at O |
|
the O |
|
DLL O |
|
entry O |
|
point O |
|
of O |
|
RomCom O |
|
|
|
O |
|
loader O |
|
runs O |
|
. O |
|
This O |
|
code O |
|
uses O |
|
rundll32.exe O |
|
to O |
|
execute O |
|
the O |
|
exported O |
|
Main O |
|
( O |
|
) O |
|
function O |
|
from O |
|
both O |
|
|
|
O |
|
winipfile O |
|
< O |
|
number>.dll0 O |
|
and O |
|
netid O |
|
< O |
|
number>.dll0 O |
|
. O |
|
|
|
O |
|
Architecture O |
|
|
|
O |
|
RomCom O |
|
3.0 O |
|
is O |
|
divided O |
|
into O |
|
three O |
|
components O |
|
: O |
|
a O |
|
loader O |
|
, O |
|
a O |
|
network O |
|
component O |
|
that O |
|
interacts O |
|
|
|
O |
|
with O |
|
the O |
|
command O |
|
- O |
|
and O |
|
- O |
|
control O |
|
( O |
|
C&C O |
|
) O |
|
server O |
|
, O |
|
and O |
|
a O |
|
worker O |
|
component O |
|
that O |
|
performs O |
|
the O |
|
|
|
O |
|
actions O |
|
on O |
|
the O |
|
victim O |
|
’s O |
|
machine O |
|
. O |
|
The O |
|
network O |
|
component O |
|
is O |
|
handled O |
|
by O |
|
netid O |
|
< O |
|
number>.dll0 O |
|
, O |
|
|
|
O |
|
which O |
|
is O |
|
responsible O |
|
for O |
|
receiving O |
|
commands O |
|
from O |
|
the O |
|
C&C O |
|
server O |
|
and O |
|
sending O |
|
back O |
|
their O |
|
|
|
O |
|
results O |
|
. O |
|
When O |
|
this O |
|
component O |
|
receives O |
|
a O |
|
command O |
|
, O |
|
the O |
|
command O |
|
is O |
|
sent O |
|
through O |
|
a O |
|
|
|
|
|
O |
|
14/27 O |
|
|
|
|
|
O |
|
localhost O |
|
socket O |
|
to O |
|
winipfile O |
|
< O |
|
number>.dll0 O |
|
, O |
|
which O |
|
handles O |
|
the O |
|
worker O |
|
component O |
|
, O |
|
as O |
|
shown O |
|
|
|
O |
|
in O |
|
Figure O |
|
3 O |
|
. O |
|
If O |
|
initial O |
|
loopback O |
|
addresses O |
|
or O |
|
ports O |
|
are O |
|
in O |
|
use O |
|
, O |
|
both O |
|
components O |
|
try O |
|
to O |
|
find O |
|
other O |
|
|
|
O |
|
available O |
|
combinations O |
|
. O |
|
|
|
|
|
O |
|
Figure O |
|
3 O |
|
. O |
|
Overall O |
|
RomCom O |
|
3.0 O |
|
architecture O |
|
|
|
O |
|
Bot O |
|
Commands O |
|
|
|
O |
|
RomCom O |
|
3.0 O |
|
commands O |
|
are O |
|
received O |
|
as O |
|
responses O |
|
to O |
|
HTTP O |
|
POST O |
|
requests O |
|
made O |
|
by O |
|
the O |
|
|
|
O |
|
malware O |
|
network O |
|
component O |
|
. O |
|
|
|
|
|
O |
|
Figure O |
|
4 O |
|
. O |
|
RomCom O |
|
3.0 O |
|
command O |
|
structure O |
|
|
|
O |
|
15/27 O |
|
|
|
|
|
O |
|
Figure O |
|
4 O |
|
shows O |
|
an O |
|
example O |
|
of O |
|
command O |
|
5 O |
|
– O |
|
a O |
|
command O |
|
to O |
|
download O |
|
a O |
|
file O |
|
to O |
|
the O |
|
victim O |
|
's O |
|
|
|
O |
|
machine O |
|
– O |
|
being O |
|
received O |
|
. O |
|
The O |
|
ID O |
|
used O |
|
for O |
|
communication O |
|
is O |
|
0x950 O |
|
, O |
|
and O |
|
command O |
|
0x05 O |
|
is O |
|
|
|
O |
|
received O |
|
with O |
|
additional O |
|
data O |
|
. O |
|
In O |
|
this O |
|
case O |
|
, O |
|
the O |
|
additional O |
|
data O |
|
tells O |
|
the O |
|
malware O |
|
running O |
|
on O |
|
|
|
O |
|
the O |
|
infected O |
|
machine O |
|
that O |
|
the O |
|
downloaded O |
|
file O |
|
should O |
|
occupy O |
|
939 O |
|
( O |
|
0x3ac O |
|
– O |
|
1 O |
|
) O |
|
4 O |
|
KB O |
|
blocks O |
|
. O |
|
|
|
O |
|
The O |
|
file O |
|
itself O |
|
is O |
|
downloaded O |
|
in O |
|
a O |
|
separate O |
|
response O |
|
, O |
|
so O |
|
in O |
|
this O |
|
instance O |
|
, O |
|
the O |
|
final O |
|
file O |
|
size O |
|
on O |
|
|
|
O |
|
the O |
|
victim O |
|
’s O |
|
side O |
|
will O |
|
be O |
|
3,846,144 O |
|
bytes O |
|
. O |
|
As O |
|
an O |
|
evasion O |
|
technique O |
|
, O |
|
null O |
|
bytes O |
|
are O |
|
appended O |
|
|
|
O |
|
to O |
|
the O |
|
file O |
|
to O |
|
achieve O |
|
this O |
|
result O |
|
. O |
|
The O |
|
contents O |
|
of O |
|
the O |
|
additional O |
|
data O |
|
field O |
|
may O |
|
vary O |
|
according O |
|
|
|
O |
|
to O |
|
the O |
|
command O |
|
. O |
|
|
|
O |
|
In O |
|
RomCom O |
|
3.0 O |
|
, O |
|
we O |
|
could O |
|
enumerate O |
|
42 O |
|
valid O |
|
commands O |
|
, O |
|
as O |
|
shown O |
|
in O |
|
Table O |
|
2 O |
|
. O |
|
This O |
|
is O |
|
a O |
|
|
|
O |
|
high O |
|
number O |
|
of O |
|
commands O |
|
for O |
|
a O |
|
regular O |
|
backdoor O |
|
, O |
|
but O |
|
a O |
|
few O |
|
commands O |
|
are O |
|
simply O |
|
variations O |
|
|
|
O |
|
of O |
|
others O |
|
. O |
|
|
|
O |
|
Command O |
|
|
|
|
|
O |
|
Purpose O |
|
( O |
|
from O |
|
the O |
|
victim O |
|
’s O |
|
perspective O |
|
) O |
|
|
|
|
|
O |
|
1 O |
|
|
|
|
|
O |
|
Send O |
|
information O |
|
about O |
|
connected O |
|
drives O |
|
|
|
|
|
O |
|
2 O |
|
|
|
|
|
O |
|
Send O |
|
a O |
|
list O |
|
of O |
|
file O |
|
names O |
|
under O |
|
a O |
|
specified O |
|
directory O |
|
|
|
|
|
O |
|
3 O |
|
|
|
|
|
O |
|
Start O |
|
cmd.exe O |
|
to O |
|
run O |
|
an O |
|
existing O |
|
program O |
|
|
|
|
|
O |
|
4 O |
|
|
|
|
|
O |
|
Upload O |
|
a O |
|
specified O |
|
file O |
|
to O |
|
the O |
|
C&C O |
|
server O |
|
|
|
|
|
O |
|
5 O |
|
|
|
|
|
O |
|
Download O |
|
a O |
|
file O |
|
to O |
|
the O |
|
victim O |
|
's O |
|
machine O |
|
|
|
|
|
O |
|
6 O |
|
|
|
|
|
O |
|
Delete O |
|
a O |
|
specified O |
|
file O |
|
in O |
|
the O |
|
victim O |
|
's O |
|
machine O |
|
|
|
|
|
O |
|
7 O |
|
|
|
|
|
O |
|
Delete O |
|
a O |
|
specified O |
|
directory O |
|
in O |
|
the O |
|
victim O |
|
's O |
|
machine O |
|
|
|
|
|
O |
|
8 O |
|
|
|
|
|
O |
|
Spawn O |
|
a O |
|
given O |
|
process O |
|
with O |
|
PID O |
|
spoofing O |
|
( O |
|
the O |
|
PID O |
|
is O |
|
also O |
|
given O |
|
as O |
|
part O |
|
of O |
|
|
|
O |
|
the O |
|
command O |
|
data O |
|
) O |
|
|
|
|
|
O |
|
12 O |
|
|
|
|
|
O |
|
Call O |
|
startWorker O |
|
( O |
|
) O |
|
from O |
|
% O |
|
PUBLIC%\Libraries\PhotoDirector.dll O |
|
, O |
|
then O |
|
send O |
|
|
|
O |
|
% O |
|
PUBLIC%\Libraries\PhotoDirector.zip O |
|
to O |
|
the O |
|
C&C O |
|
server O |
|
and O |
|
delete O |
|
it O |
|
|
|
|
|
O |
|
13 O |
|
|
|
|
|
O |
|
Call O |
|
startWorker O |
|
( O |
|
) O |
|
from O |
|
% O |
|
PUBLIC%\Libraries\PhotoDirector.dll O |
|
and O |
|
write O |
|
|
|
O |
|
screen O |
|
information O |
|
to O |
|
% O |
|
PUBLIC%\Libraries\update.conf O |
|
|
|
|
|
O |
|
14 O |
|
|
|
|
|
O |
|
Upload O |
|
% O |
|
PUBLIC%\Libraries\PhotoDirector.zip O |
|
to O |
|
the O |
|
C&C O |
|
server O |
|
and O |
|
delete O |
|
|
|
O |
|
it O |
|
|
|
|
|
O |
|
15 O |
|
|
|
|
|
O |
|
Send O |
|
a O |
|
list O |
|
of O |
|
running O |
|
process O |
|
with O |
|
its O |
|
PIDs O |
|
|
|
|
|
O |
|
16 O |
|
|
|
|
|
O |
|
Send O |
|
a O |
|
list O |
|
of O |
|
installed O |
|
software O |
|
|
|
|
|
O |
|
17 O |
|
|
|
|
|
O |
|
Delete O |
|
the O |
|
worker O |
|
component O |
|
( O |
|
winipfile O |
|
< O |
|
number>.dll0 O |
|
) O |
|
|
|
|
|
O |
|
18 O |
|
|
|
|
|
O |
|
Download O |
|
a O |
|
file O |
|
and O |
|
save O |
|
it O |
|
to O |
|
% O |
|
PUBLIC%\Libraries\PhotoDirector.dll O |
|
|
|
|
|
O |
|
16/27 O |
|
|
|
|
|
O |
|
19 O |
|
|
|
|
|
O |
|
Download O |
|
a O |
|
file O |
|
, O |
|
save O |
|
it O |
|
to O |
|
% O |
|
PUBLIC%\Libraries\BrowserData\procsys.dll O |
|
, O |
|
|
|
O |
|
and O |
|
call O |
|
its O |
|
stub O |
|
( O |
|
) O |
|
exported O |
|
function O |
|
|
|
|
|
O |
|
20 O |
|
|
|
|
|
O |
|
Download O |
|
a O |
|
ZIP O |
|
archive O |
|
likely O |
|
containing O |
|
3proxy O |
|
and O |
|
plink O |
|
( O |
|
see O |
|
command O |
|
21 O |
|
) O |
|
|
|
|
|
O |
|
21 O |
|
|
|
|
|
O |
|
Use O |
|
3proxy O |
|
and O |
|
plink O |
|
to O |
|
set O |
|
up O |
|
a O |
|
proxy O |
|
via O |
|
SSH O |
|
. O |
|
The O |
|
IP O |
|
address O |
|
, O |
|
password O |
|
, O |
|
|
|
O |
|
local O |
|
, O |
|
and O |
|
remote O |
|
ports O |
|
are O |
|
received O |
|
as O |
|
command O |
|
parameters O |
|
. O |
|
SSH O |
|
server O |
|
|
|
O |
|
username O |
|
is O |
|
fixed O |
|
as O |
|
“ O |
|
john O |
|
. O |
|
” O |
|
|
|
|
|
O |
|
22 O |
|
|
|
|
|
O |
|
Kill O |
|
the O |
|
3proxy.exe O |
|
and O |
|
plink.exe O |
|
processes O |
|
|
|
|
|
O |
|
23 O |
|
|
|
|
|
O |
|
Download O |
|
a O |
|
file O |
|
and O |
|
save O |
|
it O |
|
to O |
|
% O |
|
PUBLIC%\Libraries\upd O |
|
- O |
|
fil O |
|
< O |
|
number>.dll0 O |
|
to O |
|
|
|
O |
|
update O |
|
the O |
|
worker O |
|
|
|
|
|
O |
|
24 O |
|
|
|
|
|
O |
|
Send O |
|
the O |
|
contents O |
|
of O |
|
% O |
|
PUBLIC%\Libraries\BrowserData\Result O |
|
|
|
|
|
O |
|
25 O |
|
|
|
|
|
O |
|
Duplicate O |
|
the O |
|
worker O |
|
|
|
|
|
O |
|
26 O |
|
|
|
|
|
O |
|
Send O |
|
the O |
|
Windows O |
|
version O |
|
|
|
|
|
O |
|
29 O |
|
|
|
|
|
O |
|
Download O |
|
freeSSHd O |
|
from O |
|
the O |
|
C&C O |
|
server O |
|
|
|
|
|
O |
|
30 O |
|
|
|
|
|
O |
|
Run O |
|
freeSSHd O |
|
and O |
|
use O |
|
plink O |
|
to O |
|
create O |
|
a O |
|
reverse O |
|
connection O |
|
with O |
|
|
|
O |
|
51.195.49.215 O |
|
using O |
|
“ O |
|
john O |
|
” O |
|
as O |
|
the O |
|
username O |
|
and O |
|
|
|
O |
|
“ O |
|
eK6czNHWCT569L1xK9ZH O |
|
” O |
|
as O |
|
the O |
|
password O |
|
|
|
|
|
O |
|
31 O |
|
|
|
|
|
O |
|
Kill O |
|
the O |
|
freeSSHd O |
|
process O |
|
|
|
|
|
O |
|
32 O |
|
|
|
|
|
O |
|
Send O |
|
.txt O |
|
, O |
|
.rtf O |
|
, O |
|
.xls O |
|
, O |
|
.xlsx O |
|
, O |
|
.ods O |
|
, O |
|
.cmd O |
|
, O |
|
.pdf O |
|
, O |
|
.vbs O |
|
, O |
|
.ps1 O |
|
, O |
|
.one O |
|
, O |
|
.kdb O |
|
, O |
|
.kdb O |
|
, O |
|
.doc O |
|
, O |
|
|
|
O |
|
.doc O |
|
, O |
|
.odt O |
|
, O |
|
.eml O |
|
, O |
|
.msg O |
|
, O |
|
and O |
|
.email O |
|
files O |
|
in O |
|
Downloads O |
|
, O |
|
Documents O |
|
, O |
|
and O |
|
|
|
O |
|
Desktop O |
|
folders O |
|
under O |
|
% O |
|
USERPROFILE% O |
|
|
|
|
|
O |
|
34 O |
|
|
|
|
|
O |
|
Run O |
|
AnyDesk O |
|
on O |
|
the O |
|
victim O |
|
’s O |
|
machine O |
|
on O |
|
a O |
|
hidden O |
|
window O |
|
and O |
|
send O |
|
the O |
|
|
|
O |
|
AnyDesk O |
|
ID O |
|
to O |
|
the O |
|
C&C O |
|
server O |
|
|
|
|
|
O |
|
35 O |
|
|
|
|
|
O |
|
Kill O |
|
the O |
|
AnyDesk O |
|
process O |
|
and O |
|
delete O |
|
its O |
|
executable O |
|
|
|
|
|
O |
|
36 O |
|
|
|
|
|
O |
|
Download O |
|
the O |
|
AnyDesk O |
|
executable O |
|
and O |
|
save O |
|
it O |
|
to O |
|
|
|
O |
|
% O |
|
PUBLIC%\Libraries\dsk.exe O |
|
|
|
|
|
O |
|
38 O |
|
|
|
|
|
O |
|
Download O |
|
a O |
|
file O |
|
and O |
|
save O |
|
it O |
|
to O |
|
% O |
|
PUBLIC%\Libraries\wallet.exe O |
|
|
|
|
|
O |
|
39 O |
|
|
|
|
|
O |
|
Download O |
|
a O |
|
file O |
|
and O |
|
save O |
|
it O |
|
to O |
|
% O |
|
PUBLIC%\Libraries\7z.dll O |
|
|
|
|
|
O |
|
40 O |
|
|
|
|
|
O |
|
Download O |
|
a O |
|
file O |
|
and O |
|
save O |
|
it O |
|
to O |
|
% O |
|
PUBLIC%\Libraries\7z.exe O |
|
|
|
|
|
O |
|
41 O |
|
|
|
|
|
O |
|
Send O |
|
the O |
|
contents O |
|
of O |
|
% O |
|
PUBLIC%\Libraries\tempFolder O |
|
compressed O |
|
with O |
|
7Zip O |
|
|
|
|
|
O |
|
42 O |
|
|
|
|
|
O |
|
Download O |
|
a O |
|
file O |
|
and O |
|
save O |
|
it O |
|
to O |
|
% O |
|
PUBLIC%\Libraries\7za.exe O |
|
|
|
|
|
O |
|
17/27 O |
|
|
|
|
|
O |
|
43 O |
|
|
|
|
|
O |
|
Use O |
|
% O |
|
PUBLIC%\Libraries\7za.exe O |
|
to O |
|
compress O |
|
a O |
|
given O |
|
folder O |
|
to O |
|
a O |
|
fold.zip O |
|
|
|
O |
|
archive O |
|
and O |
|
send O |
|
the O |
|
compressed O |
|
archive O |
|
to O |
|
the O |
|
C&C O |
|
server O |
|
|
|
|
|
O |
|
44 O |
|
|
|
|
|
O |
|
Kill O |
|
the O |
|
PhotoDirector.dll O |
|
process O |
|
|
|
|
|
O |
|
45 O |
|
|
|
|
|
O |
|
Download O |
|
a O |
|
file O |
|
and O |
|
save O |
|
it O |
|
to O |
|
% O |
|
PUBLIC%\Libraries\msg.dll O |
|
|
|
|
|
O |
|
46 O |
|
|
|
|
|
O |
|
Call O |
|
stW O |
|
( O |
|
) O |
|
function O |
|
exported O |
|
by O |
|
% O |
|
PUBLIC%\Libraries\msg.dll O |
|
|
|
|
|
O |
|
47 O |
|
|
|
|
|
O |
|
Download O |
|
a O |
|
file O |
|
and O |
|
save O |
|
it O |
|
to O |
|
% O |
|
PUBLIC%\Libraries\FileInfo.dll O |
|
|
|
|
|
O |
|
48 O |
|
|
|
|
|
O |
|
Call O |
|
fSt O |
|
( O |
|
) O |
|
function O |
|
exported O |
|
by O |
|
% O |
|
PUBLIC%\Libraries\FileInfo.dll O |
|
|
|
|
|
O |
|
49 O |
|
|
|
|
|
O |
|
Update O |
|
the O |
|
network O |
|
component O |
|
|
|
|
|
O |
|
Table O |
|
2 O |
|
. O |
|
RomCom O |
|
3.0 O |
|
commands O |
|
|
|
O |
|
Additional O |
|
Malware O |
|
|
|
O |
|
Based O |
|
on O |
|
messages O |
|
sent O |
|
back O |
|
to O |
|
the O |
|
C&C O |
|
server O |
|
and O |
|
how O |
|
the O |
|
commands O |
|
use O |
|
these O |
|
files O |
|
, O |
|
|
|
O |
|
we O |
|
can O |
|
infer O |
|
the O |
|
purpose O |
|
of O |
|
a O |
|
few O |
|
additional O |
|
components O |
|
: O |
|
|
|
O |
|
PhotoDirector.dll O |
|
– O |
|
a O |
|
program O |
|
that O |
|
takes O |
|
one O |
|
or O |
|
more O |
|
screenshots O |
|
and O |
|
compresses O |
|
|
|
O |
|
them O |
|
in O |
|
a O |
|
% O |
|
PUBLIC%\Libraries\PhotoDirector.zip O |
|
archive O |
|
|
|
O |
|
procsys.dll O |
|
– O |
|
a O |
|
stealer O |
|
known O |
|
as O |
|
STEALDEAL O |
|
to O |
|
retrieve O |
|
browser O |
|
cookies O |
|
and O |
|
write O |
|
|
|
O |
|
them O |
|
to O |
|
% O |
|
PUBLIC%\Libraries\BrowserData\Result O |
|
|
|
O |
|
wallet.exe O |
|
– O |
|
a O |
|
crypto O |
|
wallet O |
|
grabber O |
|
that O |
|
writes O |
|
stolen O |
|
information O |
|
to O |
|
|
|
O |
|
% O |
|
PUBLIC%\Libraries\tempFolder O |
|
|
|
O |
|
msg.dll O |
|
– O |
|
an O |
|
Instant O |
|
Messaging O |
|
grabber O |
|
to O |
|
steal O |
|
chat O |
|
messages O |
|
|
|
O |
|
FileInfo.dll O |
|
– O |
|
a O |
|
stealer O |
|
of O |
|
FTP O |
|
credentials O |
|
, O |
|
or O |
|
a O |
|
component O |
|
to O |
|
make O |
|
the O |
|
victim O |
|
’s O |
|
|
|
O |
|
machine O |
|
upload O |
|
files O |
|
to O |
|
an O |
|
FTP O |
|
server O |
|
|
|
O |
|
Despite O |
|
these O |
|
additional O |
|
pieces O |
|
of O |
|
malware O |
|
, O |
|
RomCom O |
|
3.0 O |
|
also O |
|
seems O |
|
to O |
|
have O |
|
commands O |
|
to O |
|
|
|
O |
|
download O |
|
and O |
|
run O |
|
legitimate O |
|
software O |
|
: O |
|
|
|
O |
|
dsk.exe O |
|
– O |
|
a O |
|
portable O |
|
version O |
|
of O |
|
AnyDesk O |
|
software O |
|
|
|
O |
|
7z.dll O |
|
, O |
|
7z.exe O |
|
, O |
|
and O |
|
7za.exe O |
|
– O |
|
files O |
|
related O |
|
to O |
|
the O |
|
7 O |
|
- O |
|
Zip O |
|
program O |
|
|
|
O |
|
STEALDEAL O |
|
|
|
O |
|
The O |
|
stealer O |
|
that O |
|
is O |
|
downloaded O |
|
through O |
|
RomCom O |
|
’s O |
|
C&C O |
|
servers O |
|
is O |
|
a O |
|
relatively O |
|
simple O |
|
one O |
|
|
|
O |
|
that O |
|
steals O |
|
stored O |
|
credentials O |
|
and O |
|
browsing O |
|
history O |
|
from O |
|
the O |
|
following O |
|
browsers O |
|
: O |
|
|
|
O |
|
Google O |
|
Chrome O |
|
|
|
O |
|
Microsoft O |
|
Edge O |
|
|
|
O |
|
Mozilla O |
|
Firefox O |
|
|
|
|
|
O |
|
18/27 O |
|
|
|
|
|
O |
|
Chromium O |
|
|
|
O |
|
Chrome O |
|
Beta O |
|
|
|
O |
|
Yandex O |
|
Browser O |
|
|
|
O |
|
The O |
|
stealer O |
|
also O |
|
collects O |
|
information O |
|
on O |
|
installed O |
|
mail O |
|
clients O |
|
. O |
|
The O |
|
stolen O |
|
data O |
|
is O |
|
stored O |
|
locally O |
|
|
|
O |
|
on O |
|
the O |
|
victim O |
|
’s O |
|
machine O |
|
at O |
|
% O |
|
PUBLIC%\Libraries\BrowserData\Result O |
|
, O |
|
and O |
|
through O |
|
C&C O |
|
|
|
O |
|
command O |
|
24 O |
|
, O |
|
this O |
|
data O |
|
is O |
|
exfiltrated O |
|
through O |
|
a O |
|
RomCom O |
|
C&C O |
|
server O |
|
. O |
|
We O |
|
detected O |
|
the O |
|
|
|
O |
|
stealer O |
|
as O |
|
TrojanSpy O |
|
. O |
|
Win64.STEALDEAL O |
|
, O |
|
which O |
|
is O |
|
also O |
|
known O |
|
as O |
|
SneakyStealer O |
|
. O |
|
|
|
O |
|
Evasion O |
|
Techniques O |
|
|
|
O |
|
RomCom O |
|
3.0 O |
|
binaries O |
|
are O |
|
protected O |
|
with O |
|
VMProtect O |
|
. O |
|
Some O |
|
binaries O |
|
are O |
|
also O |
|
signed O |
|
with O |
|
|
|
O |
|
valid O |
|
certificates O |
|
. O |
|
Because O |
|
the O |
|
actors O |
|
decided O |
|
to O |
|
use O |
|
VMProtect O |
|
’s O |
|
anti O |
|
- O |
|
VM O |
|
feature O |
|
, O |
|
any O |
|
|
|
O |
|
attempt O |
|
to O |
|
run O |
|
it O |
|
in O |
|
a O |
|
virtual O |
|
machine O |
|
( O |
|
VM O |
|
) O |
|
without O |
|
modification O |
|
or O |
|
VM O |
|
hardening O |
|
will O |
|
cause O |
|
|
|
O |
|
the O |
|
malware O |
|
to O |
|
show O |
|
an O |
|
error O |
|
message O |
|
and O |
|
exit O |
|
( O |
|
Figure O |
|
5 O |
|
) O |
|
. O |
|
|
|
|
|
O |
|
Figure O |
|
5 O |
|
. O |
|
Default O |
|
VMProtect O |
|
anti O |
|
- O |
|
VM O |
|
detection O |
|
in O |
|
RomCom O |
|
3.0 O |
|
samples O |
|
|
|
O |
|
Another O |
|
interesting O |
|
technique O |
|
RomCom O |
|
uses O |
|
is O |
|
the O |
|
ability O |
|
to O |
|
add O |
|
null O |
|
bytes O |
|
appended O |
|
to O |
|
the O |
|
|
|
O |
|
files O |
|
received O |
|
from O |
|
a O |
|
C&C O |
|
server O |
|
. O |
|
Making O |
|
the O |
|
file O |
|
bigger O |
|
can O |
|
be O |
|
an O |
|
attempt O |
|
to O |
|
avoid O |
|
sandbox O |
|
|
|
O |
|
products O |
|
or O |
|
security O |
|
software O |
|
scanners O |
|
that O |
|
impose O |
|
a O |
|
file O |
|
size O |
|
limit O |
|
. O |
|
|
|
O |
|
In O |
|
later O |
|
versions O |
|
of O |
|
RomCom O |
|
, O |
|
the O |
|
binary O |
|
that O |
|
is O |
|
hosted O |
|
on O |
|
a O |
|
lure O |
|
site O |
|
contains O |
|
an O |
|
encrypted O |
|
|
|
O |
|
payload O |
|
. O |
|
To O |
|
correctly O |
|
decrypt O |
|
the O |
|
payload O |
|
, O |
|
it O |
|
will O |
|
need O |
|
to O |
|
reach O |
|
out O |
|
to O |
|
a O |
|
web O |
|
server O |
|
at O |
|
the O |
|
IP O |
|
|
|
O |
|
address O |
|
94.142.138.244 O |
|
and O |
|
download O |
|
the O |
|
decryption O |
|
key O |
|
. O |
|
We O |
|
suspect O |
|
this O |
|
website O |
|
is O |
|
a O |
|
|
|
O |
|
third O |
|
- O |
|
party O |
|
service O |
|
that O |
|
is O |
|
also O |
|
being O |
|
used O |
|
by O |
|
other O |
|
malware O |
|
, O |
|
including O |
|
the O |
|
Vidar O |
|
stealer O |
|
that O |
|
is O |
|
|
|
O |
|
also O |
|
known O |
|
as O |
|
StealC. O |
|
Also O |
|
, O |
|
recent O |
|
RomCom O |
|
droppers O |
|
have O |
|
stopped O |
|
dropping O |
|
the O |
|
worker O |
|
|
|
O |
|
component O |
|
. O |
|
Instead O |
|
, O |
|
the O |
|
network O |
|
component O |
|
downloads O |
|
it O |
|
from O |
|
the O |
|
C&C O |
|
server O |
|
. O |
|
|
|
O |
|
Packet O |
|
Structure O |
|
and O |
|
Communications O |
|
Flow O |
|
|
|
|
|
O |
|
19/27 O |
|
|
|
|
|
O |
|
Based O |
|
on O |
|
our O |
|
observations O |
|
of O |
|
the O |
|
communication O |
|
between O |
|
victim O |
|
machines O |
|
and O |
|
RomCom O |
|
|
|
O |
|
C&C O |
|
servers O |
|
, O |
|
we O |
|
were O |
|
able O |
|
to O |
|
determine O |
|
what O |
|
the O |
|
packet O |
|
structure O |
|
of O |
|
this O |
|
communication O |
|
|
|
O |
|
looks O |
|
like O |
|
( O |
|
Figure O |
|
6 O |
|
) O |
|
. O |
|
Initially O |
|
, O |
|
the O |
|
client O |
|
will O |
|
reach O |
|
out O |
|
to O |
|
the O |
|
server O |
|
with O |
|
information O |
|
on O |
|
the O |
|
|
|
O |
|
victim O |
|
’s O |
|
computer O |
|
, O |
|
such O |
|
as O |
|
its O |
|
Universally O |
|
Unique O |
|
Identifier O |
|
( O |
|
UUID O |
|
) O |
|
, O |
|
username O |
|
, O |
|
and O |
|
the O |
|
|
|
O |
|
computer O |
|
name O |
|
. O |
|
The O |
|
server O |
|
will O |
|
then O |
|
respond O |
|
with O |
|
a O |
|
session O |
|
ID O |
|
that O |
|
is O |
|
four O |
|
bytes O |
|
long O |
|
, O |
|
as O |
|
|
|
O |
|
mentioned O |
|
previously O |
|
. O |
|
This O |
|
session O |
|
ID O |
|
is O |
|
then O |
|
incremented O |
|
by O |
|
one O |
|
on O |
|
the O |
|
first O |
|
byte O |
|
by O |
|
the O |
|
|
|
O |
|
C&C O |
|
server O |
|
with O |
|
each O |
|
command O |
|
that O |
|
is O |
|
sent O |
|
to O |
|
the O |
|
victim O |
|
machine O |
|
. O |
|
|
|
|
|
O |
|
Figure O |
|
6 O |
|
. O |
|
Packet O |
|
structure O |
|
of O |
|
the O |
|
observed O |
|
packets O |
|
|
|
O |
|
One O |
|
of O |
|
the O |
|
first O |
|
commands O |
|
we O |
|
observed O |
|
was O |
|
command O |
|
3 O |
|
, O |
|
which O |
|
uses O |
|
cmd.exe O |
|
to O |
|
run O |
|
a O |
|
|
|
O |
|
Nltest O |
|
command O |
|
with O |
|
the O |
|
argument O |
|
/domain_trusts O |
|
. O |
|
This O |
|
is O |
|
done O |
|
to O |
|
gather O |
|
information O |
|
on O |
|
any O |
|
|
|
O |
|
domains O |
|
that O |
|
the O |
|
victim O |
|
machine O |
|
may O |
|
know O |
|
about O |
|
. O |
|
Once O |
|
the O |
|
command O |
|
is O |
|
finished O |
|
, O |
|
it O |
|
returns O |
|
|
|
O |
|
the O |
|
results O |
|
of O |
|
the O |
|
command O |
|
with O |
|
the O |
|
Session O |
|
ID O |
|
five O |
|
bytes O |
|
in O |
|
; O |
|
the O |
|
first O |
|
four O |
|
bytes O |
|
are O |
|
unknown O |
|
|
|
O |
|
at O |
|
this O |
|
time O |
|
, O |
|
but O |
|
we O |
|
observed O |
|
the O |
|
first O |
|
byte O |
|
will O |
|
be O |
|
0x01 O |
|
if O |
|
it O |
|
is O |
|
returning O |
|
data O |
|
to O |
|
the O |
|
server O |
|
, O |
|
or O |
|
|
|
O |
|
0x00 O |
|
if O |
|
it O |
|
is O |
|
receiving O |
|
data O |
|
from O |
|
the O |
|
server O |
|
. O |
|
The O |
|
C&C O |
|
server O |
|
then O |
|
appears O |
|
to O |
|
ask O |
|
for O |
|
specific O |
|
|
|
O |
|
information O |
|
in O |
|
an O |
|
automated O |
|
manner O |
|
, O |
|
as O |
|
the O |
|
same O |
|
requests O |
|
are O |
|
sent O |
|
in O |
|
quick O |
|
succession O |
|
|
|
O |
|
( O |
|
Figure O |
|
7 O |
|
) O |
|
. O |
|
From O |
|
our O |
|
analysis O |
|
, O |
|
we O |
|
have O |
|
determined O |
|
that O |
|
the O |
|
server O |
|
is O |
|
asking O |
|
for O |
|
the O |
|
victim O |
|
|
|
O |
|
machine O |
|
to O |
|
: O |
|
|
|
O |
|
20/27 O |
|
|
|
|
|
O |
|
1 O |
|
. O |
|
Return O |
|
ntlest O |
|
/domain_trusts O |
|
with O |
|
command O |
|
3 O |
|
|
|
O |
|
2 O |
|
. O |
|
Download O |
|
StealDeal O |
|
to O |
|
collect O |
|
certain O |
|
information O |
|
|
|
O |
|
3 O |
|
. O |
|
Use O |
|
StealDeal O |
|
to O |
|
collect O |
|
cookies O |
|
and O |
|
other O |
|
information O |
|
from O |
|
the O |
|
victim O |
|
’s O |
|
machine O |
|
|
|
O |
|
4 O |
|
. O |
|
Collect O |
|
files O |
|
from O |
|
the O |
|
Desktop O |
|
, O |
|
Documents O |
|
, O |
|
and O |
|
Downloads O |
|
folders O |
|
using O |
|
command O |
|
32 O |
|
|
|
|
|
O |
|
Figure O |
|
7 O |
|
. O |
|
Flow O |
|
of O |
|
the O |
|
communication O |
|
between O |
|
the O |
|
C&C O |
|
server O |
|
and O |
|
victim O |
|
machine O |
|
|
|
O |
|
Use O |
|
of O |
|
fake O |
|
companies O |
|
and O |
|
websites O |
|
|
|
O |
|
The O |
|
malware O |
|
uses O |
|
certificates O |
|
to O |
|
lend O |
|
credibility O |
|
to O |
|
the O |
|
software O |
|
that O |
|
the O |
|
targeted O |
|
victims O |
|
|
|
O |
|
download O |
|
. O |
|
On O |
|
the O |
|
surface O |
|
, O |
|
the O |
|
companies O |
|
that O |
|
are O |
|
signing O |
|
these O |
|
binaries O |
|
look O |
|
like O |
|
legitimate O |
|
|
|
O |
|
companies O |
|
that O |
|
have O |
|
undergone O |
|
the O |
|
process O |
|
of O |
|
becoming O |
|
a O |
|
signer O |
|
of O |
|
these O |
|
certificates O |
|
. O |
|
|
|
O |
|
However O |
|
, O |
|
a O |
|
closer O |
|
look O |
|
at O |
|
these O |
|
companies O |
|
’ O |
|
websites O |
|
reveals O |
|
several O |
|
oddities O |
|
, O |
|
including O |
|
nonexistent O |
|
phone O |
|
numbers O |
|
, O |
|
stock O |
|
photos O |
|
of O |
|
executives O |
|
, O |
|
office O |
|
addresses O |
|
that O |
|
do O |
|
not O |
|
seem O |
|
to O |
|
|
|
O |
|
match O |
|
. O |
|
This O |
|
leads O |
|
us O |
|
to O |
|
believe O |
|
these O |
|
are O |
|
either O |
|
fake O |
|
companies O |
|
or O |
|
legitimate O |
|
companies O |
|
that O |
|
|
|
O |
|
are O |
|
being O |
|
abused O |
|
in O |
|
order O |
|
to O |
|
pass O |
|
the O |
|
checks O |
|
needed O |
|
to O |
|
become O |
|
an O |
|
authorized O |
|
signer O |
|
of O |
|
|
|
O |
|
binaries O |
|
. O |
|
|
|
O |
|
The O |
|
RomCom O |
|
3.0 O |
|
sample O |
|
that O |
|
was O |
|
used O |
|
in O |
|
the O |
|
AstraChat O |
|
campaign O |
|
was O |
|
signed O |
|
by O |
|
a O |
|
|
|
O |
|
Canadian O |
|
company O |
|
called O |
|
Noray O |
|
Consulting O |
|
Ltd. O |
|
, O |
|
which O |
|
has O |
|
a O |
|
LinkedIn O |
|
page O |
|
( O |
|
Figure O |
|
8) O |
|
, O |
|
a O |
|
|
|
O |
|
website O |
|
, O |
|
and O |
|
even O |
|
a O |
|
listing O |
|
in O |
|
a O |
|
business O |
|
registry O |
|
in O |
|
Canada O |
|
( O |
|
Figure O |
|
9 O |
|
) O |
|
. O |
|
|
|
|
|
O |
|
21/27 O |
|
|
|
|
|
O |
|
Figure O |
|
8 O |
|
. O |
|
Screenshot O |
|
of O |
|
Noray O |
|
Consulting O |
|
's O |
|
LinkedIn O |
|
page O |
|
|
|
|
|
O |
|
Figure O |
|
9 O |
|
. O |
|
Ontario O |
|
business O |
|
registry O |
|
search O |
|
results O |
|
for O |
|
Noray O |
|
Consulting O |
|
|
|
O |
|
The O |
|
company O |
|
’s O |
|
LinkedIn O |
|
page O |
|
goes O |
|
on O |
|
to O |
|
mention O |
|
that O |
|
Noray O |
|
Consulting O |
|
works O |
|
on O |
|
SOX O |
|
|
|
O |
|
compliance O |
|
, O |
|
an O |
|
annual O |
|
audit O |
|
mandated O |
|
by O |
|
the O |
|
Sarbanes O |
|
- O |
|
Oxley O |
|
Act O |
|
( O |
|
SOX O |
|
) O |
|
, O |
|
as O |
|
well O |
|
as O |
|
other O |
|
|
|
O |
|
areas O |
|
of O |
|
risk O |
|
control O |
|
. O |
|
However O |
|
, O |
|
the O |
|
LinkedIn O |
|
page O |
|
also O |
|
points O |
|
to O |
|
a O |
|
website O |
|
, O |
|
noray[.]ca O |
|
, O |
|
that O |
|
|
|
O |
|
does O |
|
not O |
|
exist O |
|
. O |
|
|
|
|
|
O |
|
22/27 O |
|
|
|
|
|
O |
|
As O |
|
the O |
|
company O |
|
claims O |
|
to O |
|
be O |
|
based O |
|
in O |
|
Ontario O |
|
according O |
|
to O |
|
its O |
|
LinkedIn O |
|
page O |
|
, O |
|
we O |
|
looked O |
|
for O |
|
|
|
O |
|
any O |
|
information O |
|
about O |
|
it O |
|
in O |
|
public O |
|
records O |
|
for O |
|
businesses O |
|
in O |
|
Canada O |
|
. O |
|
It O |
|
appears O |
|
that O |
|
in O |
|
2020 O |
|
, O |
|
|
|
O |
|
the O |
|
owners O |
|
of O |
|
Noray O |
|
Consulting O |
|
. O |
|
Changed O |
|
the O |
|
name O |
|
of O |
|
the O |
|
company O |
|
to O |
|
just O |
|
“ O |
|
Noray O |
|
. O |
|
” O |
|
This O |
|
new O |
|
|
|
O |
|
company O |
|
name O |
|
is O |
|
not O |
|
related O |
|
to O |
|
any O |
|
of O |
|
the O |
|
things O |
|
mentioned O |
|
in O |
|
this O |
|
blog O |
|
post O |
|
or O |
|
, O |
|
from O |
|
what O |
|
|
|
O |
|
we O |
|
can O |
|
tell O |
|
, O |
|
is O |
|
doing O |
|
anything O |
|
malicious O |
|
. O |
|
It O |
|
appears O |
|
that O |
|
the O |
|
actors O |
|
are O |
|
watching O |
|
out O |
|
for O |
|
|
|
O |
|
companies O |
|
that O |
|
become O |
|
inactive O |
|
, O |
|
or O |
|
in O |
|
a O |
|
similar O |
|
status O |
|
, O |
|
then O |
|
will O |
|
appropriate O |
|
these O |
|
|
|
O |
|
companies O |
|
’ O |
|
names O |
|
. O |
|
|
|
O |
|
Internet O |
|
searches O |
|
for O |
|
Noray O |
|
Consulting O |
|
show O |
|
that O |
|
its O |
|
main O |
|
website O |
|
has O |
|
a O |
|
non O |
|
- O |
|
matching O |
|
|
|
O |
|
domain O |
|
name O |
|
, O |
|
firstbyteconsulting[.]com O |
|
. O |
|
The O |
|
website O |
|
used O |
|
to O |
|
be O |
|
for O |
|
a O |
|
company O |
|
that O |
|
|
|
O |
|
specialized O |
|
in O |
|
project O |
|
management O |
|
. O |
|
This O |
|
domain O |
|
appears O |
|
to O |
|
have O |
|
expired O |
|
in O |
|
2020 O |
|
, O |
|
but O |
|
was O |
|
|
|
O |
|
bought O |
|
and O |
|
repurposed O |
|
to O |
|
resemble O |
|
the O |
|
website O |
|
from O |
|
before O |
|
2020 O |
|
. O |
|
What O |
|
ties O |
|
this O |
|
domain O |
|
to O |
|
|
|
O |
|
Noray O |
|
Consulting O |
|
now O |
|
is O |
|
that O |
|
the O |
|
address O |
|
details O |
|
on O |
|
the O |
|
website O |
|
match O |
|
that O |
|
which O |
|
is O |
|
found O |
|
on O |
|
|
|
O |
|
Noray O |
|
Consulting O |
|
’s O |
|
LinkedIn O |
|
page O |
|
: O |
|
a O |
|
Canadian O |
|
company O |
|
in O |
|
Milton O |
|
, O |
|
Ontario O |
|
. O |
|
The O |
|
contact O |
|
page O |
|
|
|
O |
|
has O |
|
a O |
|
map O |
|
that O |
|
shows O |
|
the O |
|
company O |
|
’s O |
|
location O |
|
, O |
|
but O |
|
the O |
|
map O |
|
is O |
|
in O |
|
Russian O |
|
( O |
|
Figure O |
|
10 O |
|
) O |
|
. O |
|
This O |
|
|
|
O |
|
could O |
|
mean O |
|
that O |
|
the O |
|
person O |
|
who O |
|
made O |
|
this O |
|
Google O |
|
map O |
|
had O |
|
their O |
|
primary O |
|
language O |
|
set O |
|
to O |
|
|
|
O |
|
Russian O |
|
, O |
|
which O |
|
would O |
|
be O |
|
unusual O |
|
for O |
|
a O |
|
seemingly O |
|
Canadian O |
|
- O |
|
based O |
|
company O |
|
. O |
|
|
|
|
|
O |
|
Figure O |
|
10 O |
|
. O |
|
Screenshot O |
|
of O |
|
the O |
|
website O |
|
’s O |
|
contact O |
|
page O |
|
map O |
|
|
|
O |
|
We O |
|
also O |
|
found O |
|
that O |
|
the O |
|
people O |
|
mentioned O |
|
on O |
|
their O |
|
website O |
|
are O |
|
likely O |
|
stock O |
|
images O |
|
or O |
|
AIgenerated O |
|
photos O |
|
of O |
|
people O |
|
who O |
|
are O |
|
not O |
|
related O |
|
in O |
|
any O |
|
way O |
|
to O |
|
the O |
|
business O |
|
, O |
|
as O |
|
shown O |
|
in O |
|
|
|
O |
|
Figure O |
|
11 O |
|
. O |
|
|
|
|
|
O |
|
23/27 O |
|
|
|
|
|
O |
|
Figure O |
|
11 O |
|
. O |
|
Screenshot O |
|
of O |
|
the O |
|
website O |
|
’s O |
|
team O |
|
members O |
|
page O |
|
|
|
O |
|
Further O |
|
investigation O |
|
reveals O |
|
that O |
|
Figure O |
|
11 O |
|
has O |
|
a O |
|
number O |
|
of O |
|
red O |
|
flags O |
|
: O |
|
|
|
O |
|
None O |
|
of O |
|
these O |
|
people O |
|
appear O |
|
to O |
|
have O |
|
real O |
|
personas O |
|
on O |
|
the O |
|
internet O |
|
|
|
O |
|
Reverse O |
|
image O |
|
search O |
|
reveals O |
|
these O |
|
are O |
|
stock O |
|
photo O |
|
images O |
|
used O |
|
on O |
|
several O |
|
sites O |
|
|
|
O |
|
Two O |
|
members O |
|
of O |
|
the O |
|
team O |
|
have O |
|
the O |
|
same O |
|
job O |
|
title O |
|
of O |
|
" O |
|
Manager O |
|
, O |
|
HR O |
|
Process O |
|
and O |
|
|
|
O |
|
Compensation O |
|
" O |
|
|
|
O |
|
We O |
|
have O |
|
also O |
|
observed O |
|
that O |
|
the O |
|
text O |
|
in O |
|
other O |
|
parts O |
|
of O |
|
Noray O |
|
Consulting O |
|
’s O |
|
website O |
|
has O |
|
been O |
|
at O |
|
|
|
O |
|
least O |
|
partially O |
|
copied O |
|
from O |
|
other O |
|
websites O |
|
. O |
|
This O |
|
illustrates O |
|
that O |
|
these O |
|
actors O |
|
are O |
|
trying O |
|
to O |
|
make O |
|
|
|
O |
|
the O |
|
sites O |
|
believable O |
|
, O |
|
offering O |
|
what O |
|
seems O |
|
like O |
|
realistic O |
|
services O |
|
that O |
|
were O |
|
lifted O |
|
from O |
|
real O |
|
|
|
O |
|
companies O |
|
found O |
|
online O |
|
. O |
|
|
|
O |
|
Void O |
|
Rabisu O |
|
has O |
|
had O |
|
many O |
|
lure O |
|
websites O |
|
that O |
|
attempt O |
|
to O |
|
convince O |
|
targets O |
|
to O |
|
download O |
|
|
|
O |
|
trojanized O |
|
legitimate O |
|
applications O |
|
. O |
|
These O |
|
lure O |
|
sites O |
|
look O |
|
legitimate O |
|
at O |
|
first O |
|
, O |
|
but O |
|
usually O |
|
have O |
|
|
|
O |
|
similar O |
|
oddities O |
|
on O |
|
the O |
|
websites O |
|
. O |
|
For O |
|
example O |
|
, O |
|
a O |
|
site O |
|
that O |
|
had O |
|
a O |
|
business O |
|
address O |
|
of O |
|
a O |
|
|
|
O |
|
shopping O |
|
mall O |
|
, O |
|
and O |
|
the O |
|
contact O |
|
phone O |
|
number O |
|
of O |
|
a O |
|
grocery O |
|
store O |
|
. O |
|
|
|
|
|
O |
|
24/27 O |
|
|
|
|
|
O |
|
Figure O |
|
12 O |
|
. O |
|
Screenshot O |
|
of O |
|
the O |
|
contact O |
|
information O |
|
of O |
|
a O |
|
Void O |
|
Rabisu O |
|
lure O |
|
site O |
|
|
|
O |
|
We O |
|
can O |
|
link O |
|
the O |
|
two O |
|
Canadian O |
|
companies O |
|
that O |
|
were O |
|
used O |
|
to O |
|
sign O |
|
RomCom O |
|
binaries O |
|
in O |
|
the O |
|
|
|
O |
|
AstraChat O |
|
campaign O |
|
and O |
|
a O |
|
campaign O |
|
against O |
|
the O |
|
Ukrainian O |
|
armed O |
|
forces O |
|
with O |
|
more O |
|
than O |
|
80 O |
|
|
|
O |
|
other O |
|
mostly O |
|
Canadian O |
|
companies O |
|
in O |
|
total O |
|
, O |
|
based O |
|
on O |
|
an O |
|
analysis O |
|
of O |
|
internet O |
|
infrastructure O |
|
. O |
|
|
|
O |
|
Among O |
|
these O |
|
80 O |
|
other O |
|
mostly O |
|
Canadian O |
|
companies O |
|
, O |
|
about O |
|
two O |
|
dozen O |
|
companies O |
|
were O |
|
used O |
|
|
|
O |
|
to O |
|
sign O |
|
other O |
|
malware O |
|
binaries O |
|
like O |
|
Emotet O |
|
, O |
|
Matanbuchus O |
|
Loader O |
|
, O |
|
BatLoader O |
|
, O |
|
another O |
|
|
|
O |
|
backdoor O |
|
known O |
|
as O |
|
SolarMarker O |
|
, O |
|
and O |
|
coinminers O |
|
. O |
|
This O |
|
makes O |
|
us O |
|
believe O |
|
that O |
|
Void O |
|
Rabisu O |
|
is O |
|
|
|
O |
|
likely O |
|
to O |
|
be O |
|
using O |
|
a O |
|
third O |
|
- O |
|
party O |
|
service O |
|
that O |
|
aids O |
|
in O |
|
signing O |
|
binaries O |
|
with O |
|
certificates O |
|
of O |
|
|
|
O |
|
seemingly O |
|
legitimate O |
|
Canadian O |
|
companies O |
|
. O |
|
|
|
O |
|
Conclusions O |
|
and O |
|
Recommendations O |
|
|
|
O |
|
The O |
|
war O |
|
against O |
|
Ukraine O |
|
has O |
|
made O |
|
cyber O |
|
campaigns O |
|
against O |
|
Ukraine O |
|
, O |
|
Eastern O |
|
Europe O |
|
, O |
|
and O |
|
|
|
O |
|
NATO O |
|
countries O |
|
more O |
|
visible O |
|
for O |
|
two O |
|
reasons O |
|
: O |
|
the O |
|
number O |
|
of O |
|
attacks O |
|
has O |
|
increased O |
|
|
|
O |
|
dramatically O |
|
, O |
|
and O |
|
both O |
|
the O |
|
private O |
|
and O |
|
public O |
|
sectors O |
|
are O |
|
looking O |
|
closely O |
|
at O |
|
what O |
|
happens O |
|
in O |
|
|
|
O |
|
Ukraine O |
|
. O |
|
More O |
|
information O |
|
from O |
|
intelligence O |
|
agencies O |
|
is O |
|
being O |
|
declassified O |
|
by O |
|
Western O |
|
|
|
O |
|
governments O |
|
, O |
|
so O |
|
privately O |
|
- O |
|
owned O |
|
companies O |
|
can O |
|
investigate O |
|
further O |
|
for O |
|
themselves O |
|
. O |
|
Another O |
|
|
|
O |
|
important O |
|
factor O |
|
is O |
|
that O |
|
many O |
|
actors O |
|
who O |
|
previously O |
|
had O |
|
different O |
|
motivations O |
|
are O |
|
becoming O |
|
|
|
O |
|
more O |
|
aligned O |
|
towards O |
|
the O |
|
same O |
|
goal O |
|
, O |
|
even O |
|
when O |
|
their O |
|
campaigns O |
|
do O |
|
not O |
|
appear O |
|
to O |
|
be O |
|
part O |
|
of O |
|
|
|
O |
|
a O |
|
coordinated O |
|
effort O |
|
. O |
|
|
|
O |
|
The O |
|
line O |
|
is O |
|
blurring O |
|
between O |
|
cybercrime O |
|
driven O |
|
by O |
|
financial O |
|
gain O |
|
and O |
|
APT O |
|
attacks O |
|
motivated O |
|
|
|
O |
|
by O |
|
geopolitics O |
|
, O |
|
espionage O |
|
, O |
|
disruption O |
|
, O |
|
and O |
|
warfare O |
|
. O |
|
Since O |
|
the O |
|
rise O |
|
of O |
|
Ransomware O |
|
- O |
|
as O |
|
- O |
|
aService O |
|
( O |
|
RaaS O |
|
) O |
|
, O |
|
cybercriminals O |
|
are O |
|
now O |
|
using O |
|
advanced O |
|
tactics O |
|
and O |
|
targeted O |
|
attacks O |
|
that O |
|
|
|
O |
|
were O |
|
previously O |
|
thought O |
|
to O |
|
be O |
|
the O |
|
domain O |
|
of O |
|
APT O |
|
actors O |
|
. O |
|
Inversely O |
|
, O |
|
tactics O |
|
and O |
|
techniques O |
|
|
|
O |
|
that O |
|
were O |
|
previously O |
|
used O |
|
by O |
|
financially O |
|
motivated O |
|
actors O |
|
are O |
|
increasingly O |
|
being O |
|
used O |
|
in O |
|
|
|
O |
|
attacks O |
|
with O |
|
geopolitical O |
|
goals O |
|
. O |
|
|
|
|
|
O |
|
25/27 O |
|
|
|
|
|
O |
|
Currently O |
|
, O |
|
APT O |
|
actors O |
|
like O |
|
Pawn O |
|
Storm O |
|
and O |
|
APT29 O |
|
, O |
|
cyber O |
|
mercenaries O |
|
like O |
|
Void O |
|
Balaur O |
|
, O |
|
|
|
O |
|
hacktivism O |
|
groups O |
|
like O |
|
Killnet O |
|
, O |
|
along O |
|
with O |
|
cybercriminals O |
|
like O |
|
former O |
|
Conti O |
|
affiliates O |
|
and O |
|
Void O |
|
|
|
O |
|
Rabisu O |
|
, O |
|
are O |
|
targeting O |
|
Ukraine O |
|
and O |
|
its O |
|
allies O |
|
, O |
|
but O |
|
their O |
|
campaigns O |
|
do O |
|
not O |
|
yet O |
|
look O |
|
coordinated O |
|
. O |
|
|
|
O |
|
We O |
|
expect O |
|
that O |
|
significant O |
|
geopolitical O |
|
events O |
|
like O |
|
the O |
|
current O |
|
war O |
|
against O |
|
Ukraine O |
|
will O |
|
|
|
O |
|
accelerate O |
|
the O |
|
alignment O |
|
of O |
|
the O |
|
campaigns O |
|
of O |
|
threat O |
|
actors O |
|
who O |
|
reside O |
|
in O |
|
the O |
|
same O |
|
|
|
O |
|
geographic O |
|
region O |
|
. O |
|
This O |
|
will O |
|
lead O |
|
to O |
|
new O |
|
challenges O |
|
for O |
|
defenders O |
|
, O |
|
as O |
|
attacks O |
|
can O |
|
then O |
|
come O |
|
|
|
O |
|
from O |
|
many O |
|
different O |
|
angles O |
|
, O |
|
and O |
|
it O |
|
will O |
|
be O |
|
less O |
|
clear O |
|
who O |
|
is O |
|
the O |
|
actor O |
|
responsible O |
|
for O |
|
them O |
|
. O |
|
|
|
O |
|
Based O |
|
on O |
|
our O |
|
analysis O |
|
, O |
|
we O |
|
believe O |
|
the O |
|
following O |
|
activity O |
|
should O |
|
be O |
|
monitored O |
|
in O |
|
endpoints O |
|
: O |
|
|
|
O |
|
Downloading O |
|
and O |
|
executing O |
|
MSI O |
|
packages O |
|
that O |
|
contain O |
|
entries O |
|
in O |
|
CustomAction O |
|
tables O |
|
|
|
O |
|
referring O |
|
to O |
|
DLL O |
|
exported O |
|
functions O |
|
|
|
O |
|
Writing O |
|
access O |
|
to O |
|
SOFTWARE\Classes\CLSID\<CSLID O |
|
> O |
|
under O |
|
both O |
|
|
|
O |
|
HKEY_CURRENT_USER O |
|
( O |
|
HKCU O |
|
) O |
|
and O |
|
HKEY_LOCAL_MACHINE O |
|
( O |
|
HKLM O |
|
) O |
|
, O |
|
which O |
|
can O |
|
|
|
O |
|
be O |
|
a O |
|
sign O |
|
of O |
|
COM O |
|
hijacking O |
|
|
|
O |
|
Initiation O |
|
of O |
|
localhost O |
|
sockets O |
|
by O |
|
rundll32.exe O |
|
, O |
|
as O |
|
RomCom O |
|
DLLs O |
|
are O |
|
loaded O |
|
by O |
|
this O |
|
|
|
O |
|
process O |
|
— O |
|
we O |
|
observed O |
|
that O |
|
RomCom O |
|
listens O |
|
on O |
|
the O |
|
port O |
|
range O |
|
5554 O |
|
- O |
|
5600 O |
|
when O |
|
|
|
O |
|
setting O |
|
up O |
|
localhost O |
|
sockets O |
|
|
|
O |
|
Binary O |
|
padding O |
|
with O |
|
null O |
|
bytes O |
|
, O |
|
a O |
|
known O |
|
technique O |
|
to O |
|
evade O |
|
scanners O |
|
. O |
|
Although O |
|
|
|
O |
|
RomCom O |
|
did O |
|
n’t O |
|
use O |
|
this O |
|
feature O |
|
in O |
|
our O |
|
tests O |
|
, O |
|
it O |
|
is O |
|
present O |
|
in O |
|
command O |
|
5 O |
|
. O |
|
We O |
|
included O |
|
a O |
|
|
|
O |
|
YARA O |
|
ruleset O |
|
to O |
|
look O |
|
for O |
|
such O |
|
files O |
|
in O |
|
our O |
|
GitHub O |
|
research O |
|
repository O |
|
. O |
|
|
|
O |
|
Binary O |
|
padding O |
|
with O |
|
non O |
|
- O |
|
zero O |
|
data O |
|
, O |
|
which O |
|
we O |
|
observed O |
|
in O |
|
one O |
|
sample O |
|
when O |
|
it O |
|
was O |
|
|
|
O |
|
dropping O |
|
another O |
|
. O |
|
This O |
|
alone O |
|
is O |
|
not O |
|
malicious O |
|
, O |
|
but O |
|
it O |
|
is O |
|
worth O |
|
flagging O |
|
once O |
|
detected O |
|
for O |
|
|
|
O |
|
further O |
|
investigation O |
|
. O |
|
|
|
O |
|
Endpoint O |
|
solutions O |
|
like O |
|
Trend O |
|
Micro O |
|
's O |
|
Smart O |
|
Protection O |
|
Suites O |
|
and O |
|
Worry O |
|
- O |
|
Free O |
|
Business O |
|
|
|
O |
|
Security O |
|
solutions O |
|
also O |
|
offer O |
|
protection O |
|
for O |
|
both O |
|
users O |
|
and O |
|
businesses O |
|
against O |
|
threats O |
|
like O |
|
|
|
O |
|
RomCom O |
|
. O |
|
These O |
|
solutions O |
|
come O |
|
equipped O |
|
with O |
|
behavior O |
|
- O |
|
monitoring O |
|
capabilities O |
|
that O |
|
enable O |
|
|
|
O |
|
them O |
|
to O |
|
detect O |
|
malicious O |
|
files O |
|
, O |
|
scripts O |
|
, O |
|
and O |
|
messages O |
|
. O |
|
They O |
|
can O |
|
also O |
|
block O |
|
all O |
|
related O |
|
|
|
O |
|
malicious O |
|
URLs O |
|
. O |
|
Additionally O |
|
, O |
|
the O |
|
Trend O |
|
Micro O |
|
™ O |
|
Deep O |
|
Discovery O |
|
™ O |
|
solution O |
|
includes O |
|
an O |
|
email O |
|
|
|
O |
|
inspection O |
|
layer O |
|
that O |
|
can O |
|
identify O |
|
and O |
|
protect O |
|
enterprises O |
|
from O |
|
malicious O |
|
attachments O |
|
and O |
|
|
|
O |
|
URLs O |
|
. O |
|
By O |
|
leveraging O |
|
these O |
|
powerful O |
|
tools O |
|
, O |
|
users O |
|
and O |
|
businesses O |
|
can O |
|
effectively O |
|
defend O |
|
|
|
O |
|
themselves O |
|
against O |
|
the O |
|
damaging O |
|
effects O |
|
of O |
|
RomCom O |
|
and O |
|
other O |
|
similar O |
|
threats O |
|
. O |
|
|
|
O |
|
Indicators O |
|
of O |
|
Compromise O |
|
|
|
O |
|
Download O |
|
the O |
|
full O |
|
list O |
|
of O |
|
indicators O |
|
here O |
|
. O |
|
|
|
O |
|
MITRE O |
|
ATT&CK O |
|
|
|
O |
|
ID O |
|
|
|
|
|
O |
|
Name O |
|
|
|
|
|
O |
|
Description O |
|
|
|
|
|
O |
|
26/27 O |
|
|
|
|
|
O |
|
T1583.008 O |
|
|
|
|
|
O |
|
Acquire O |
|
Infrastructure O |
|
: O |
|
|
|
O |
|
Malvertising O |
|
|
|
|
|
O |
|
RomCom O |
|
uses O |
|
malvertising O |
|
to O |
|
redirect O |
|
targets O |
|
|
|
O |
|
to O |
|
lure O |
|
websites O |
|
from O |
|
which O |
|
to O |
|
download O |
|
fake O |
|
|
|
O |
|
installer O |
|
applications O |
|
|
|
|
|
O |
|
T1566.002 O |
|
|
|
|
|
O |
|
Phishing O |
|
: O |
|
Spear O |
|
Phishing O |
|
|
|
O |
|
Link O |
|
|
|
|
|
O |
|
RomCom O |
|
sent O |
|
highly O |
|
targeted O |
|
spear O |
|
phishing O |
|
|
|
O |
|
emails O |
|
|
|
|
|
O |
|
T1027.002 O |
|
|
|
|
|
O |
|
Obfuscated O |
|
Files O |
|
or O |
|
|
|
O |
|
Information O |
|
: O |
|
Software O |
|
|
|
O |
|
Packing O |
|
|
|
|
|
O |
|
RomCom O |
|
uses O |
|
VMProtect O |
|
|
|
|
|
O |
|
T1027.001 O |
|
|
|
|
|
O |
|
Obfuscated O |
|
Files O |
|
or O |
|
|
|
O |
|
Information O |
|
: O |
|
Binary O |
|
|
|
O |
|
Padding O |
|
|
|
|
|
O |
|
RomCom O |
|
uses O |
|
binary O |
|
padding O |
|
on O |
|
dropped O |
|
files O |
|
|
|
O |
|
to O |
|
avoid O |
|
security O |
|
solutions O |
|
|
|
|
|
O |
|
T1546.015 O |
|
|
|
|
|
O |
|
Event O |
|
Triggered O |
|
Execution O |
|
: O |
|
|
|
O |
|
Component O |
|
Object O |
|
Model O |
|
|
|
O |
|
Hijacking O |
|
|
|
|
|
O |
|
RomCom O |
|
uses O |
|
COM O |
|
hijacking O |
|
for O |
|
persistence O |
|
|
|
|
|
O |
|
T1571 O |
|
|
|
|
|
O |
|
Non O |
|
- O |
|
Standard O |
|
Port O |
|
|
|
|
|
O |
|
RomCom O |
|
listens O |
|
on O |
|
port O |
|
ranges O |
|
5554 O |
|
to O |
|
5600 O |
|
|
|
O |
|
for O |
|
communication O |
|
between O |
|
dropped O |
|
|
|
O |
|
components O |
|
|
|
|
|
O |
|
T1071.001 O |
|
|
|
|
|
O |
|
Application O |
|
Layer O |
|
Protocol O |
|
: O |
|
|
|
O |
|
Web O |
|
Protocols O |
|
|
|
|
|
O |
|
RomCom O |
|
uses O |
|
HTTPS O |
|
for O |
|
C&C O |
|
|
|
O |
|
communications O |
|
|
|
|
|
O |
|
T1555.003 O |
|
|
|
|
|
O |
|
Credentials O |
|
from O |
|
Password O |
|
|
|
O |
|
Stores O |
|
: O |
|
Credentials O |
|
from O |
|
|
|
O |
|
Web O |
|
Browsers O |
|
|
|
|
|
O |
|
RomCom O |
|
uses O |
|
a O |
|
stealer O |
|
to O |
|
gather O |
|
credentials O |
|
|
|
O |
|
of O |
|
several O |
|
browsers O |
|
|
|
|
|
O |
|
T1113 O |
|
|
|
|
|
O |
|
Screen O |
|
Capture O |
|
|
|
|
|
O |
|
RomCom O |
|
can O |
|
capture O |
|
screenshots O |
|
of O |
|
the O |
|
|
|
O |
|
victim O |
|
's O |
|
machine O |
|
|
|
|
|
O |
|
T1219 O |
|
|
|
|
|
O |
|
Remote O |
|
Access O |
|
Software O |
|
|
|
|
|
O |
|
RomCom O |
|
's O |
|
backdoor O |
|
has O |
|
a O |
|
functionality O |
|
to O |
|
run O |
|
|
|
O |
|
AnyDesk O |
|
application O |
|
|
|
|
|
O |
|
27/27 O |