Authors:
Klimenty Galkin, Junior Specialist, Threat Intelligence Department, PT Expert Security Center
Alexander Badayev, Specialist, Threat Intelligence Department, PT Expert Security Center
Key findings
- New attacks have been discovered that we have attributed to the PhaseShifters group.
- The attack uses a well-known steganography technique that replicates attacks from the TA558 group, as described in one of our previous articles.
- The attackers use one of the Spanish-language crypters described in an article by experts at the company eSentire regarding the Blind Eagle group.
- The group uses BitBucket and GitHub repositories to store encoded payloads.
- There is a possibility that all repositories belong to the found service offering a subscription to crypters and obfuscators.
- It appears that the same repository can be used by multiple groups from all around the world. For example, BitBucket repositories were discovered that were used in attacks on both Russia and Ukraine.
- The found BitBucket repository again raised the question of the similarity of the PhaseShifters group to another group discovered in 2020.
Introduction
In the process of monitoring attacks on Russian organizations, specialists from the Threat Intelligence department of the Positive Technologies Expert Security Center discovered phishing emails and files addressed to various Russian companies, including state-owned ones. After analyzing the context of the attack, as well as the downloaded malware, we were able to attribute these files to the PhaseShifters group.
PhaseShifters (Sticky Werewolf) are a hacker group that conducts espionage and attacks against various industries in Russia and Belarus, as well as Polish government organizations.
We named the group "PhaseShifters" because, from the moment of its discovery, we noticed a change in techniques that closely followed those of the UAC-0050 group. This is why the name was inspired by "phase shift", which refers to the difference between two quantities that change periodically over time with the same frequency.
In their attacks, the group uses phishing emails—supposedly sent by officials—that contain a request to review a document and sign it. The document is contained as an attachment inside a password-protected archive.
The malware used by the attackers includes Rhadamanthys, DarkTrack RAT, Meta Stealer, and others.
We have been observing a high level of activity from PhaseShifters since spring 2023. From the very beginning of this time, we noticed that practically the same attack patterns were being used as those from the UAC-0050 group, which was discovered in 2020. We are therefore inclined to believe that they may be one and the same group, although this will require further observation to be confirmed.
In the process of searching for similar attacks, dozens of different malicious files were discovered, with subjects such as resumes, supplementary agreements, and so on. These files were sent to various organizations in the industrial sector, as well as to research centers and government agencies.
However, the attack did not use standard techniques for this group, but rather techniques that were obviously and clearly associated with groups from another region: TA558 and Blind Eagle.
In this study, we will present an analysis of the PhaseShifters group's new attack chain, which has been used since at least June 2024, and also highlight its similarities to other hacker groups.
Detected attacks
First files discovered
At the end of June 2024, during the process of researching threats, we discovered an archive called Копия трудовой.docx.rar (Russian for "Work record book copy"). Presumably, the archive was distributed as an attachment in emails to various companies in Russia. The archive was protected with a password, which could presumably be found in the body of the email.
We gained access to a file located in this archive — Копия трудовой.docx.exe SHA-256:
60414E88A21DF60B0CACCDF498B41AA7C75C10D880AB61A620F5B13BA2FAEBD1
The file Копия трудовой.docx.rar uploaded several files to the system, including an executable file with the provocative name putin_***.exe, as well as a decoy document with photographs of the passport of a citizen of the Republic of Belarus.
When run, the file with the provocative name launched powershell scripts that, during operation, received images with the malware loader and the payload of the last stage from the BitBucket repositories.
- https://bitbucket.org/hgdfhdfgd/test/downloads/new_image.jpg?14441723
- https://bitbucket.org/fasf24124/fdgfytrj/downloads/roAScpm.txt
In the case of the first BitBucket, which contained images with steganography, the repository contained the following files:
The person who committed the code to the repository was a certain Nano. This repository is currently inactive, meaning that there is no way to find out this user's email.
The images depicted the Atacama Desert in Chile.
The second repository, which acted as storage for the final load, is still functioning. According to the metadata, it was originally created on March 4, 2024 by a certain user with the nickname siniy34240.
At the time of the analysis, this BitBucket contained 46 files with different names, although some of them were identical in content.
This BitBucket was subsequently mentioned by researchers at the OffZone conference.
This chain used Bulgarian C2, which is linked to other similar attacks and files such as:
- ru***
- ***pen**
- vvp_***
These files were also talked about at the aforementioned conference.
Later on, in September 2024, several more documents were discovered that worked in a similar way:
- Заявление об актуализации персональных данных.rar (f0d402ffd0b57202feadee1a0b831a27a4b8135933cddb3d99232fbb20d3e138) (Russian for “Request to update personal data”)
- ФГУП «*******» (1ff8d5c5cb7e1949e55b602aad6d7253216a4ac55727703557410d2c47d561b8.bin) (draft supplementary agreement from a Federal State Unitary Enterprise [Russian abbreviation FGUP/ФГУП] with variable name—see example in fig. 7 below)
- Проект распоряжения правительства Курской области.pdf.zip (Russian for “Draft order of the local government of Kursk oblast”)
- Договор.pdf.rar (Russian for “Contract”)
- etc.
General description of the attacks
A diagram of the attack chain is presented below. The yellow boxes contain additional information, descriptions of obfuscation techniques, links used, and other indicators of compromise. The main attack vector path is shown in red, with an alternative path shown in blue.
The victim receives an email containing an archive with a password. The archive contains an executable file and a stub document. The password for the archive can be found in the text of the email. Usually, it's a short password consisting only of digits. As soon as the user opens the archive and runs the executable file, the stub opens.
The executable file then downloads a malicious obfuscated .vbs or .bat script into the system. In general, the obfuscation algorithm is as follows (commands from a .bat file are taken as an example):
- The entire script is divided into blocks of SET and GOTO commands.
- Each of these blocks is labeled with unreadable symbols.
- Each of these blocks stores a piece of a powershell script and goes on to set a variable with another part of the script.
- The final tag concatenates all the generated blocks
As a result, string concatenation occurs as follows:
Where final_ps_payload is the final obfuscation tag, ps_payload_N is a part of the powershell script, and N is the number of parts of the powershell script. The names of the tag and variables have been changed for ease of understanding.
The powershell script is then launched, which looks something like this:
As can be seen in the script, the # symbol is replaced with another one in order to obtain the correct Base64 string. As it subsequently turned out, there may be more than one symbol: It is possible to replace a block of several symbols, even in Unicode encoding.
The decoding results in another powershell script that looks like this:
Let's take a look at the script's operating algorithm:
- There is a function called "DownloadDataFromLinks", which goes through an array of links and tries to download a file with a .jpg extension.
- If any of the links are active and have returned an image, the bytes of the image are written to a variable called $imageBytes.
- The file contains two tags, between which the script receives the payload in Base64.
- The payload is decoded.
- The payload is the Ande Loader, which is prepared for launch via the method [System.Reflection.Assembly]::Load.
- The payload is downloaded from C2 and injected into the legitimate process RegAsm using the la method from the downloaded payload.
Having studied the source code of the loader that is injected into the process, we can say that the main purpose of the la method is to call the Ande method, which will in its turn embed the malware through a legitimate process. Another function of the method is to embed the parent script to run on startup or to remain in the system for a certain period of time. The method itself takes five parameters:
- adress: A string with an inverted link to download the payload;
- enablestartup: A string that stores a digit from the set {0,1,2}. The value of this parameter determines whether or not the malware will be embedded to run on startup and how it will be implemented if so;
- startupname: A string with the name of the executable file embedded to run on startup in the event that enablestartup = True;
- injection:: The name of the process into which the malware code is to be embedded;
- persistence:: A string parameter that acts as a Boolean value. If persistence = "1″ and enablestartup = "0″, a .bat script is created that, in a cycle of 1000 iterations once per minute, checks for the presence of the injection process among the active processes. If this is not the case, it launches the <startupname >.vbs file, which should then start the entire chain again.
The code for the la method can be seen in the screenshots below.
The most important things among the parameters—and, in general, the script as a whole—are the links to download the payload. During the investigation of the set of files described above, no other file storage locations were found other than the BitBucket and GitHub repositories. At the time of writing this article, the repository containing the latest payload from the examined attack was no longer available, but there are many other repositories online that contain the encoded payloads. Inside the text files is an inverted Base64 string of bytes from the executable file.
The final payload in the attack chain under examination is a remote access trojan called DarkTrack RAT, which, according to experts, was used by the group in attacks from 2023 and 2024. The majority of recent attacks have been using the same attacker server: 45.143.166[.]100:52336.
In addition to DarkTrack RAT, the repositories contain malware families such as AsyncRAT, Redline, Remcos, njRAT, XWorm, and more. This set of Trojans and stealers is used by several groups, including TA558, Blind Eagle, and others. Moreover, it's interesting to note that some samples have been downloaded over 46,000 times. This number of downloads indicates a mass use of files that is not typical for traditional APTs, but rather for malware distribution services.
Crypters used: Crypter-As-A-Service
When searching for similar elements in powershell scripts, as well as .bat and .vbs files, we identified several obfuscation features:
- Obfuscation through the use of SET, GOTO (.bat files) or Call (.vbs) functions.
- The presence of the $codigo variable in the powershell script obtained after deobfuscation. It's worth noting that "codigo" is the Portuguese and Spanish translation of the word "code".
- The $codigo variable contains a string with a Base64-encoded powershell script, and, in order for it to be correct, it is necessary to replace one character or sequence of characters with another.
- The final powershell script downloads the payload, which is a malware loader. In this case, the loader itself is downloaded as a text file, inside of which is a Base64-encoded executable file.
By identifying the features of the scripts, it was possible to find shared aspects with the attacks of the group TA558, as we described in April 2024, as well as with the attacks of Blind Eagle, as described by eSentire in February 2024. The most interesting thing is that the second report talks about the use of crypters and obfuscators that are distributed on shadow forums, in conjunction with the Ande Loader. Having compared this with the attacks of the PhaseShifters group, we came to the same conclusion.
However, the question remains open about the obfuscators and crypters used, and why PhaseShifters decided to use these ones in particular. Specialists from eSentire have already conducted an analysis of several crypters that were used by the BlindEagle group: VBS-Crypter, VBS-Crypter Simples, UpCry (UpCrypter), F*ckCrypter.
From the analysis of the tools, several features can be identified:
- The use of the $codigo variable, which also contains an encoded powershell script.
- Working with text files that contain a loader in C#.
- The retrieval of the method from the loader, as well as how it is passed to the payload as an inverted reference argument.
In addition, in some lines of the crypter, you can find the nicknames of the authors who created these utilities:
- NoDetectOn
- Pjoao1578
- MR_AHMED
- Roda
We also discovered a BitBucket repository with commits from a user nicknamed Roda that contained encoded loaders from which methods are called, as was the case in our analysis above. The interesting thing about this BitBucket is the number of downloads: Namely, at the time of our investigation, the number of downloads totaled almost a million.
The obfuscation techniques and generated powershell scripts work in the same way as in the attack we described, with one exception: There is no interaction with the BitBucket or GitHub services to obtain the image. However, the versions of the crypters are quite old, and therefore everything could have changed, including the type of the generated script.
After further research, we discovered a GitHub repository with the name NoDetectOn, which contained images selling subscriptions to obfuscators and crypters.
Searching the text of one of the images takes us to a site selling these obfuscators, which offers a subscription to obfuscators for VBS and BAT files at two rates: Public and private. The prices start from $100 per month for an obfuscator for just one file type.
This organization also has a GitHub repository that correlates with the name NoDetectOn.
The ZIP repository consists of several files containing an inverted Base64 string, as well as an image with the title new_image. The contents of the files are as follows:
The image that is currently in the repository (or rather, what is depicted in it) has already been encountered by us in attacks by the TA558 group, only the image was located at a different link.
Therefore, in this investigation, we made the assumption that TA558, Blind Eagle, and now PhaseShifters as well are using a subscription service for obfuscators and crypters. This is due to the use of the same obfuscation structure, the same variable inside the powershell script, a similar form of storing the payload (text files or images with Base64 in them), and the use of the same repositories with the payload (discussed in more detail below).
Moreover, the CaaS (Crypter-as-a-Service) that we discovered is most likely an association of all the developers whose nicknames are listed above.
However, besides this, we found another group that used the same techniques, the same crypter. We assume that PhaseShifters has been copying the techniques of another group.
It's not just the BitBucket that's the same: Similarities with UAC-0050
Some details about UAC-0050
UAC-0050 (UAC-0096) is a hacker group that has been attacking government organizations in Ukraine since 2020–2021, though it has also attacked companies in Poland, Belarus, Moldova, and the Baltic countries as well as companies in Russia. The group's attacks most often use phishing emails in combination with the well-known malware Remcos RAT, Quasar RAT, Meduza Stealer, and Remote Utilities. However, judging by the attacks carried out, their arsenal isn't limited to these tools alone.
In 2023, the group used Remote Utilities in attacks on Polish and Ukrainian organizations; in January 2024, they began to disguise Remote Utilities as the legitimate application CCleaner. In the last attack mentioned, the group used BitBucket. In March 2024, the expert BushidoToken discussed the connection between UAC-0050 and the DaVinci Group.
Indirect similarities. Techniques used
Previously, we mentioned a number of attacks carried out by the group. These used the following:
- A phishing email with important content (court documents, scanned documents, copies with a bank mark, an evacuation plan, etc.) with an attachment OR containing a link to download a file.
- The attachments take the form of a decoy document AND/OR an archive that is password-protected.
- The password is specified in the body of the email or in the name of a text file inside the archive, and consists of N digits.
- The archive contains a malicious executable file from the previously listed malware.
Looking at this set of facts, it's possible to draw a parallel between the PhaseShifters and UAC-0050 groups. The most similar aspects are seen in attacks by PhaseShifters on companies in Belarus with malware that is disguised as an installer for the CCleaner utility and is an SFX archive with obfuscated AutoIt scripts.
AutoIt scripts were used by both groups for about six months, then both groups stopped using them around the same time. An interesting note about these scripts was that only three groups were observed to use the AutoIt loader, namely: PhaseShifters, UAC-0050, and the pro-Palestinian group Handala, leading researchers from Intezer to name this loader the Handala loader.
Just like UAC-0050, PhaseShifters has attacked Polish organizations. The PhaseShifters group, as confirmed by specialists from the company FACCT, did this in February 2024, whereas the UAC-0050 group was attacking Poland in November and December 2023. Based on the similarity of the techniques used during phishing, as well as the disguising of the malware, we can assume that there is a connection between these two groups. It is not yet possible to say whether they are one and the same: More precise facts are needed to determine this.
Precise similarities in current attacks
It turns out that the attack chain under examination, which uses subscription-based crypters and obfuscators, is used not only by PhaseShifters, but also by UAC-0050. Moreover, there's very little time difference between the two groups using this kind of attack chain: PhaseShifters began using a similar chain in June and July 2024, while UAC-0050 also started using it in July 2024. Furthermore, both groups continue to use this attack pattern at present.
Let's look at the relationship diagram that we were able to create based on the detected attacks (Figure 31). In this diagram, white has been used to highlight the UAC-0050 group's use of some of the repositories from the general list, while yellow represents similar links that only pertain to the PhaseShifters group. The analysis of the attack chain is shown in green, with additional information in purple.
As can be seen in the diagram, some repositories are used by both groups. Even if the interrelation with the image can be explained by the purchase of the same crypter, as mentioned previously, the use of the same payload repository is more difficult to explain. The fact of the matter is that the latest repository containing the malware is specified by the user in obfuscators as a link to the payload. It turns out that both groups specified these links manually.
The report on OffZone also cites an example of the last BitBucket used for the final payload as an argument in favor of the location of the attackers. As it turns out, bitbucket.org/fasf24124 hosted both DarkTrack used by the PhaseShifters group and Amethyst used by the Sapphire Werewolf group.
Now let's take a look at the attacks by the PhaseShifters and UAC-0050 groups that also use the same repository.
On the part of the UAC-0050 group, the repository was used in the attack chain file Копія з позначкою банку.vbs (Ukrainian for "Copy with bank mark.vbs") by loading the file https://bitbucket.org/sdgw/sdge/downloads/meduza.txt as a payload, which becomes Meduza Stealer when decoded using Base64.
The PhaseShifters group used this repository in an attack chain with the file Проект распоряжения правительства Курской области.pdf.zip (Russian for "Draft order of the government of Kursk oblast.pdf.zip") The payload was downloaded from the link https://bitbucket.org/sdgw/sdge/downloads/mbFgnhd.txt, which turned out to be DarkTrack RAT, typical malware for them.
Thus, the same repository contained Meduza Stealer, the use of which is prohibited by the rules of the shadow forum for attacks on Russian organizations and Russian users in general, and DarkTrack RAT, which was detected in attacks on the Russian Federation. A news story mentioning these repositories was then released on October 15, 2024. This has resulted in a rather strange situation.
There is a possibility that the newest version of the crypter provides attackers with a subscription interface that allows them to download malware, and the repositories themselves belong to the creators of the crypters. If this is the case, the malware being located in the same repository must be an accident or a coincidence.
It was also interesting to understand what kind of image was located in the repositories during the attack (or was in them at any other point). However, since the https://bitbucket.org/shieldadas/gsdghjj/ repository has now been removed, the information can be found either on sandbox launches or elsewhere, Telegram for example. As it turns out, the messenger has automatic functionality for creating a preview of a file or page accessible via a link. What's more, each of these previews is most likely saved on the messenger servers, meaning that each time the user accesses the link, the preview is first checked on the servers and, if it exists, it is then given to the user. This is how we managed to see the image that was in the repository at some point via the link.
Other similarities in indicators
At the beginning of January 2024, as mentioned previously, hacker attacks were carried out on Ukrainian organizations with email subjects such as "Запит судових документів". (Ukrainian for "Request for court documents"). This attack has been attributed to the UAC-0050 group. Among the indicators of compromise, one domain was involved: rmssrv[.]ru. This domain is interesting because it was also found in phishing emails from October 2021, though these were targeted at Russian organizations at that time. According to the National Coordinating Center for Computer Incidents (NCCCI), these emails were sent on behalf of the Federal Tax Service of Russia and contained a malicious attachment (password-protected archive).
Moreover, in that same year of 2021, this domain was used in emails targeted at Ukrainian government organizations. The emails were allegedly from the Patrol Police Department of Kyiv.
It's interesting to note that, in its report, the NCCCI has attached an example of the attack and a screenshot of the malicious archive. The archive contained a password, as well as the executable file itself and additional .rar archives marked as "part1" and "part2".
UAC-0050 uses the same naming technique; we haven't seen anything like it from other groups thus far.
We have seen many similar divisions of the archive into parts from the group. For example, in the attack on Moldova.
In both the examples given, the UAC-0050 group used the Handala loader in the attacks with AutoIt scripts, the similarities of which we previously discussed.
Conclusion on the relationship
We can establish that the PhaseShifters group is copying the techniques of UAC-0050, and we have already observed a tendency that the copying begins after a small interval of a few weeks.
The copying is practically identical, to the extent that we are more inclined to believe that PhaseShifters and UAC-0050 may actually be one group in the capacity of a third party that is attacking both countries.
Conclusions
The PhaseShifters group is continuing to attack Russian organizations from various sectors. In recent attempts, the attack chain contains steganography techniques that have already been used by other groups.
An analysis of the current chain has led us to BitBucket repositories that belong to the creators of Spanish-language crypters or services with subscriptions to special tools, such as CryptersAndTools.
Since PhaseShifters uses images from BitBucket repositories that are shared by other groups, it is impossible to attribute attacks to any specific group for these BitBucket repos in particular. However, two types of repositories were used in the attacks.
Due to the shared repository with the final payload, as well as the similarities in the attack chains examined by our team, the question of shared aspects between UAC-0050 and PhaseShifters was raised again.
That said, a repeated analysis of the groups' attacks showed significant overlaps between them in a variety of aspects, both in the tools and techniques that were used. The only significant difference between the groups is the final malware used, but this point is negligible.
At present, we are inclined to believe that the PhaseShifters and UAC-0050 are one and the same group. However, further research is needed to confirm this, since it is also possible that PhaseShifters is simply copying UAC-0050's attack chain.
Indicators of compromise
File indicators
File name | MD5 | SHA-1 | SHA-256 |
---|---|---|---|
Договор АО-***-******-№-12904ДО.pdf.exe | b388dc8131fd81f81576fb3c1ec2e891 | 759036faa3e742fb30bf7d35c9b991fcba2def2e | 8eadd27519eb9a97959c7417696f906ce4de01e49e1321a466a2748e888db2a5 |
Дополнительное соглашени.pdf.exe | 2e8a9103a92a2b897692ce24c88d530c | a9cc98ca9f454f18c20777fce5cb91868925d4d7 | f75d1d3c22ad03094098e20f73b01ea1d112b76ca52c3d0946f24d5c5d272951 |
Об авиаинциденте.pdf.exe | 159dd6c962c8c15bab8e1cabf28eea87 | a7e2ea509f3d24ed9e8148bcd0c4ca71c4401ee6 | 52ca602680b3599d7f62bd33e9846d9092b5016bda77465cad6cfb46bca1af7b |
Договор.pdf.exe | d69165cfd5e6da160c2a60bad8a9daff | 466caab305aace6234238a45b5dad9d6c0f182ff | 5fd43ae47a37af3f2975e4a9c5bb91ccbf1556e07e98ba91ba0ff25ab3a2b91f |
Предписание ****.pdf.exe | 5e3147137a49b00a102d5538d05077a3 | 9567a69801e8fcc647cea2a4ba53228b2f64a936 | 03beaec07cf5b4a818406819145591b393ebd1f353c00ba6b4ec7d9d2bb77c39 |
se16.txt | 33fe8d665d1df9b4fe716e30ab88253d | b9b687aeb4b21b67db2a948c69cd9cc6e7927334 | 4b5e68c6b34253a92926a3704b8c5a52d8384f5d1688dbed552e3ec99bdd3e0a |
server.txt | 408c7ca69f1a25e43fb724635330fe34 | c2e1b175c7fa938c15910c218b332d3188e0fdaf | e6291596fc62e6589037fe1b9188692260877ad627280d620e571b0779778c1a |
serv.bat | 6c9f4e20674c9d8612e2f3820d32f49d | 8ac178d78178155d9d6a81e525352edfe9496804 | 4c54d42f09f4a412c91927eafa7f4899dda996c5b5b3929d0a33b696c6cbeedf |
Перечень комплектующих.pdf.exe | 78128c6a00bb58fdc1228cc6c856288f | b927e1be735c9670ea7a4cca3b6c3f5d16b4e59f | e025dfc5c8a1057e1e9fa1df385ee396a1d480a7ff02fd01c74ff40c8f372bbf |
Резюме.docx.exe | 55f793b97e0bf8258ae9896b10b57dde | 34fa113e508e354d43e2f5e7613fabca43213d83 | d6132f3c8b4c46a53c3e68b08a4e26985bdb66638dcc812f57f5444a33532fbd |
Лагеря.exe | b1a3dfa9ba32eb0400c16294b4285e8c | 9cbbb25e1e57c7df9ec571b471364efd8b9980f0 | 043f8a226b2cd4f81279f736ec3c65105b212ff4e71d89d540a62a7e41aedbf3 |
Копия трудовой.docx.exe Гособоронзаказ.docx.exe | 6a5cb8007261d0ef578c02de549e5b6f | f14a1505471dd77efc07cfcfd4e5248fce09d495 | 60414e88a21df60b0caccdf498b41aa7c75c10d880ab61a620f5b13ba2faebd1 |
putin_h**lo.exe | df5671afa8a8170a515c589e1b342d52 | ae327ecd6f312f5860fe35bacfa36cb9768852bb | 6e9d23e7b4a677651ccb362fa6833ca13deef184a45a801cb1d7d1f542210809 |
roAScpm.txt | 80e1ffa2c3c8b031c19fdb2eb061de12 | aa77562cf918b7d6847b6743e0f78c18ae4ddc58 | a53f6d7e18e3544c40874330bc1af7b6600f4460d34417b0b0a444b49c0f267a |
список с карточкой 010724.zip | 7e6cf0a3df371233b9be778aa6e28fb7 | ab2773616e3e6207d3b8638a5f0e99e8a1f965ad | 56d32ca1ba0042b4537bd7559b665d24785bf28586bef5901ea90b606c40d039 |
dts.bat | ac016863ff9cb26ddc1173da42a442d1 | 3fb4058642619f1dc90febe9794742ef172975d2 | 330d3eee12c2d4c05abdac1cd9fbcb88b6f2f257b7f12f06332b9e63ce3b51e7 |
Копия трудовой.docx.zip | f02f33c5b8d664ac44c17c1f564cb3d2 | c10f20b2c74c53a838cfcd2b290cc528456f6c71 | 13fdbbe873978c9c46188ddf6b2f650e842ed69f76ebd6fc5242e4f144b882f1 |
Трудовая книга.docx.exe | 55a505b3a045610c58e1812790dff7db | 370436540a97bffb1207b55cc2839ba67b4efe05 | 2fb19586318b7dfd7bbacca8bc49682ce2ac842d72f70348715b12a7e2d9e189 |
Network indicators
Indicator | Indicator type | Purpose |
---|---|---|
https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?\d+ | General. The image from the repository is used in attacks by several groups | A GitHub repository with an image that contains the payload |
https://bitbucket.org/hgdfhdfgd/test/downloads/new_image.jpg?\d+ | General. The image from the repository is used in attacks by several groups | A BitBucket repository with an image that contains the payload with Ande Loader |
https://bitbucket.org/gopal4/start/downloads/new_image?\d+ | General. The image from the repository is used in attacks by several groups | A BitBucket repository with an image that contains the payload with Ande Loader |
https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?\d+ | General. The image from the repository is used in attacks by several groups | A BitBucket repository with an image that contains the payload with Ande Loader |
https://bitbucket.org/gdffffffff/ddddd/downloads/img_test.jpg?\d+ | General. The image from the repository is used in attacks by several groups | A BitBucket repository with an image that contains the payload with Ande Loader |
https://bitbucket.org/shieldadas/gsdghjj/downloads/img_test.jpg?\d+ | General. The image from the repository is used in attacks by several groups | A BitBucket repository with an image that contains the payload with Ande Loader |
https://bitbucket.org/rulmerurk/ertertqw/downloads/.*\.txt | Individual indicator for PhaseShifters | A BitBucket repository with an encoded malicious payload |
https://bitbucket.org/fasf24124/fdgfytrj/downloads/.*\.txt | Individual indicator for PhaseShifters | A BitBucket repository with an encoded malicious payload |
https://bitbucket.org/fwfsfw/fwf/downloads/.*\.txt | General indicator. The repository is used by several groups around the world. | A BitBucket repository with an encoded malicious payload |
https://bitbucket.org/rfd344/erd/downloads/.*\.txt | General indicator. The repository is used by several groups around the world. | A BitBucket repository with an encoded malicious payload |
https://bitbucket.org/sdgw/sdge/downloads/.*\.txt | General indicator. The repository is used by several groups around the world. | A BitBucket repository with an encoded malicious payload |
45.143.166.100 | Individual. Only used by the PhaseShifters group | DarkTrack C2 |
94.156.79.57 | DarkTrack C2 |
The MITRE matrix
Reconnaissance | ||
T1135 | Network Share Discovery | The PhaseShifters group scanned network folders accessible via the SMB protocol |
Resource Development | ||
T1588.001 | Obtain Capabilities: Malware | The PhaseShifters group allegedly purchased a crypter or a subscription to a crypter |
T1608.001 | Stage Capabilities: Upload Malware | The PhaseShifters group uploaded malware to BitBucket by themselves or via third parties |
Initial Access | ||
T1566.001 | Phishing: Spearphishing Attachment | The PhaseShifters group sent phishing emails to various companies and attached the requested archives with a password, which was in the body of the email |
Execution | ||
T1059.001 | Command and Scripting Interpreter: PowerShell | The PhaseShifters group launched obfuscated scripts using powershell |
T1059.003 | Command and Scripting Interpreter: Windows Command Shell | The PhaseShifters group launched obfuscated files using cmd.exe |
T1059.005 | Command and Scripting Interpreter: Visual Basic | The PhaseShifters group used obfuscated VB scripts |
Persistence | ||
T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | The PhaseShifters group's malicious files were embedded in the Startup folder |
Defense Evasion | ||
T1027 | Obfuscated Files or Information | The PhaseShifters group used Base64 to encrypt the payload |
T1027.002 | Obfuscated Files or Information: Software Packing | The PhaseShifters group used UPX and Themida |
T1027.003 | Obfuscated Files or Information: Steganography | The PhaseShifters group used steganography techniques in images located on BitBucket |
T1027.010 | Obfuscated Files or Information: Command Obfuscation | The PhaseShifters group used a crypter that obfuscated powershell code |
T1036 | Masquerading | The PhaseShifters group disguised .exe files using icons of legitimate programs and other extensions |
T1036.007 | Masquerading: Double File Extension | The PhaseShifters group disguised .exe, .docx or .lnk files using double extensions (e.g. .docx.exe) |
T1036.008 | Masquerading: Masquerade File Type | On the BitBucket repository used by PhaseShifters, malicious files were stored in encoded form with the extension .txt |
T1140 | Deobfuscate/Decode Files or Information | The PhaseShifters group's malware decoded the payload received during the infection process |
T1564.003 | Hide Artifacts: Hidden Window | The crypter used by the PhaseShifters group used the -hidden flag to conceal the execution of the powershell script |
Discovery | ||
T1057 | Process Discovery | The PhaseShifters group used powershell commands to search for and complete certain processes |
T1012 | Query Registry | The PhaseShifters group collected information on the registry |
Command And Control | ||
T1102 | Web Service | The PhaseShifters group used BitBucket and GitHub to download the malware |
T1105 | Ingress Tool Transfer | The PhaseShifters group used Ande Loader to download additional malware |
T1571 | Non-Standard Port | The PhaseShifters group used non-standard ports in the attacks, e.g. 1443 and 49162, for communication via TCP protocol |
T1132.001 | Data Encoding: Standard Encoding | The PhaseShifters group used the standard protocol TLS 1.2 as well as Base64-encoded strings for the encryption of transmitted data |
Verdicts by Positive Technologies products
PT SIEM
Double_File_Extension_Masquerading |
Suspicious_Directory_For_Process |
Suspicious_Connection |
Script_Files_Execution |
Suspicious_process_execution_sequence |
Execute_Malicious_Command |
Malicious_Office_Document |
PT Sandbox
Backdoor.Win32.Generic.n |
tool_mem_ZZ_HeavensGate |
Trojan-Downloader.PowerShell.Generic.b |
Trojan-Downloader.Win32.Generic.n |
Trojan-Downloader.Win32.Ozone.n |
Trojan-Dropper.PowerShell.LOLBinStage.a |
Trojan-Dropper.Win32.LOLBin.a |
Trojan-Spy.Win32.Generic.d |
Trojan.PowerShell.Generic.a |
Trojan.PowerShell.PSLiner.b |
Trojan.Script.Generic.a |
Trojan.Win32.Generic.a |
Trojan.Win32.Generic.g |
Trojan.Win32.Inject.a |
Win64.Injected.Heur |
Backdoor.Win32.Generic.n |
PT NAD
REMOTE [PTsecurity] DarkTrack sid: 10000144, 10000431 |
REMOTE [PTsecurity] DarkTrack Successful Connection sid: 11003005 |
POLICY [PTsecurity] Access to a file sharing service (github) sid: 10010210 |
POLICY [PTsecurity] Access to a file sharing service (bitbucket.org) sid: 10010211 |
ET MALWARE NetWire / Ozone / Darktrack Alien RAT — Client KeepAlive sid: 2021978 |
Get in touch
will contact you shortly