Phishing focusing on Polish SMBs continues through ModiLoader


ESET Analysis

ESET researchers detected a number of, widespread phishing campaigns focusing on SMBs in Poland throughout Might 2024, distributing varied malware households

Phishing targeting Polish SMBs continues via ModiLoader

Only a few months again, ESET Analysis printed a blogpost about huge phishing campaigns throughout Central and Japanese Europe carried out in the course of the second half of 2023. In these campaigns Rescoms malware (also referred to as Remcos), protected by AceCryptor, was delivered to potential victims with the objectives of credential theft and potential achieve of preliminary entry to firm networks.

Phishing campaigns focusing on the area didn’t cease in 2024. On this blogpost we current what current phishing campaigns appeared like and the way the selection of supply mechanism shifted away from AceCryptor to ModiLoader.

Key factors of this blogpost:

  • ESET detected 9 notable ModiLoader phishing campaigns throughout Might 2024 in Poland, Romania, and Italy.
  • These campaigns focused small and medium-sized companies.
  • Seven of the campaigns focused Poland, the place ESET merchandise protected over 21,000 customers.
  • Attackers deployed three malware households through ModiLoader: Rescoms, Agent Tesla, and Formbook.
  • Attackers used beforehand compromised e-mail accounts and firm servers, not solely to unfold malicious emails but in addition to host malware and gather stolen information.

Overview

Though the phishing campaigns have been ongoing all through the primary half of 2024, this blogpost focuses simply on Might 2024, as this was an eventful month. Throughout this era, ESET merchandise protected over 26,000 customers, over 21,000 (80%) of whom have been in Poland. Along with Poland, the place over 80% of potential victims have been positioned, Italy and Romania have been additionally focused by the phishing campaigns. In whole we registered 9 phishing campaigns, seven of which focused Poland all through Might, as will be seen in Determine 1.

figure1_ModiLoader hits by date chart
Determine 1. Hits of ModiLoader phishing campaigns in Poland throughout Might 2024

As compared with the campaigns that occurred in the course of the finish of 2023, we see a shift away from utilizing AceCryptor as a instrument of selection to guard and efficiently ship the malware. As a substitute, in all 9 campaigns, attackers used ModiLoader (aka DBatLoader) as the popular supply instrument of selection. The ultimate payload to be delivered and launched on the compromised machines assorted; we’ve detected campaigns delivering:

  • Formbook – data stealing malware found in 2016,
  • Agent Tesla – a distant entry trojan and data stealer, and
  • Rescoms RAT – distant management and surveillance software program, capable of steal delicate data.

Campaigns

On the whole, all campaigns adopted the same state of affairs. The focused firm acquired an e-mail message with a enterprise supply that might be so simple as “Please present your greatest value supply for the connected order no. 2405073”, as will be seen in Determine 2.

Figure 2. Example of a phishing email containing ModiLoader in the attachment
Determine 2. Instance of a phishing e-mail containing ModiLoader within the attachment

In different campaigns, e-mail messages have been extra verbose, such because the phishing e-mail in Determine 3, which will be translated as follows:

Hello,

We need to buy your product for our consumer.

Please discover the connected inquiry for step one of this buy.

The connected sheet comprises goal costs for many merchandise. I highlighted 10 components to give attention to pricing – the remainder of the objects are elective to cost (we’ll apply related value degree primarily based on different costs).

Please get again to me earlier than 28/05/2024

For those who want extra time, please let me know the way a lot you’ll need.

If in case you have any questions, please additionally let me know.

Figure 3. A more verbose phishing email example containing ModiLoader in the attachment
Determine 3. A extra verbose phishing e-mail instance containing ModiLoader within the attachment

As within the phishing campaigns of H2 2023, attackers impersonated current corporations and their workers because the strategy of selection to extend marketing campaign success charge. On this manner, even when the potential sufferer appeared for the standard crimson flags (except for potential translation errors), they have been simply not there, and the e-mail appeared as reputable because it might have.

Contained in the attachments

Emails from all campaigns contained a malicious attachment that the potential sufferer was incentivized to open, primarily based on the textual content of the e-mail. These attachments had names like RFQ8219000045320004.tar (as in Request for Citation) or ZAMÓWIENIE_NR.2405073.IMG (translation: ORDER_NO) and the file itself was both an ISO file or archive.

In campaigns the place an ISO file was despatched as an attachment, the content material was the ModiLoader executable (named equally or the identical because the ISO file itself) that might be launched if a sufferer tried to open the executable.

Within the different case, when a RAR archive was despatched as an attachment, the content material was a closely obfuscated batch script, with the identical title because the archive and with the .cmd file extension. This file additionally contained a base64-encoded ModiLoader executable, disguised as a PEM-encoded certificates revocation checklist. The script is liable for decoding and launching the embedded ModiLoader (Determine 4).

Figure 4. File with .cmd extension containing heavily obfuscated batch script (top) that decodes base64-encoded ModiLoader binary (bottom)
Determine 4. File with .cmd extension containing closely obfuscated batch script (high) that decodes base64-encoded ModiLoader binary (backside)

When ModiLoader is launched

ModiLoader is a Delphi downloader with a easy process – to obtain and launch malware. In two of the campaigns, ModiLoader samples have been configured to obtain the next-stage malware from a compromised server belonging to a Hungarian firm. In the remainder of the campaigns ModiLoader downloaded the subsequent stage from Microsoft’s OneDrive cloud storage. We noticed 4 accounts the place second-stage malware was hosted. The entire chain of compromise from receiving the malicious e-mail till launching the ultimate payload is summarized in Determine 5.

Figure 5. Chain of compromise of ModiLoader phishing campaigns in Poland during May 2024
Determine 5. Chain of compromise of ModiLoader phishing campaigns in Poland throughout Might 2024

Knowledge exfiltration

Three totally different malware households have been used as a closing payload: Agent Tesla, Rescoms, and Formbook. All these households are able to data stealing and thus permit attackers not solely to develop their datasets of stolen data, but in addition to arrange the bottom for his or her subsequent campaigns. Though the exfiltration mechanisms differ between malware households and campaigns, it’s value mentioning two examples of those mechanisms.

In a single marketing campaign, data was exfiltrated through SMTP to an tackle utilizing a site just like that of a German firm. Be aware that typosquatting was a well-liked method used within the Rescoms campaigns from the top of final yr. These older campaigns used typosquatted domains for sending phishing emails. One of many new campaigns used a typosquatted area for exfiltrating information. When somebody tried to go to net pages of this typosquatted area, they’d be instantly redirected to the online web page of the reputable (impersonated) firm.

In one other marketing campaign, we noticed information being exfiltrated to an internet server of a visitor home positioned in Romania (a rustic focused now and up to now by such campaigns). On this case, the online server appears reputable (so no typosquatting) and we consider that the lodging’s server had been compromised throughout earlier campaigns and abused for malicious actions.

Conclusion

Phishing campaigns focusing on small and medium-sized companies in Central and Japanese Europe are nonetheless going robust within the first half of 2024. Moreover, attackers reap the benefits of beforehand profitable assaults and actively use compromised accounts or machines to additional unfold malware or gather stolen data. In Might alone, ESET detected 9 ModiLoader phishing campaigns, and much more exterior this time-frame. In contrast to the second half of 2023, when Rescoms packed by AceCryptor was the popular malware of selection of the attackers, they didn’t hesitate to vary the malware they use to be extra profitable. As we introduced, there are a number of different malware households like ModiLoader or Agent Tesla within the arsenal of those attackers, prepared for use.

ESET Analysis affords non-public APT intelligence reviews and information feeds. For any inquiries about this service, go to the ESET Menace Intelligence web page.

IoCs

A complete checklist of indicators of compromise (IoCs) will be present in our GitHub repository.

Information

SHA-1

Filename

Detection

Description

E7065EF6D0CF45443DEF
30D3A3A35FD7300C4A56

doc023561361500.img

Win32/TrojanDownloader.
ModiLoader.ACM

Malicious attachment from phishing marketing campaign carried out in Poland throughout Might 2024.

31672B52259B4D514E68
DA5D199225FCFA72352B

doc023561361500__
079422732__202410502__
000023.pdf.exe

Win32/TrojanDownloader.
ModiLoader.ACM

ModiLoader executable from phishing marketing campaign carried out in Poland throughout Might 2024.

B71070F9ADB17C942CB6
92566E6020ACCA93726A

N/A

MSIL/Spy.Agent.CVT

Agent Tesla executable from phishing marketing campaign carried out in Poland throughout Might 2024.

D7561594C7478C4FE37C
26684005268EB582E13B

ZAMÓWIENIE_NR.2405073.
IMG

Win32/TrojanDownloader.
ModiLoader.ACR

Malicious attachment from phishing marketing campaign carried out in Poland throughout Might 2024.

47AF4CFC9B250AC4AE8C
DD0A2D2304D7CF60AACE

ZAMÓWIENIE_NR.2405073.
exe

Win32/TrojanDownloader.
ModiLoader.ACR

ModiLoader executable from phishing marketing campaign carried out in Poland throughout Might 2024.

2963AF32AB4D497CB41F
C85E54A9E5312D28BCDE

N/A

Win32/Formbook.AA

Formbook executable from phishing marketing campaign carried out in Poland throughout Might 2024.

5DAB001A2025AA91D278
163F39E7504004354F01

RFQ8219000045320004.
tar

Win32/TrojanDownloader.
ModiLoader.ACP.Gen

Malicious attachment from phishing marketing campaign carried out in Poland throughout Might 2024.

D88B10E4FD487BFCCA6A
711A9E33BB153674C757

RFQ8219000045320004.
cmd

Win32/TrojanDownloader.
ModiLoader.ACP.Gen

Malicious batch script from phishing marketing campaign carried out in Poland throughout Might 2024.

F0295F2E46CEBFFAF789
2A5B33BA54122781C20B

N/A

Win32/TrojanDownloader.
ModiLoader.ADB

ModiLoader executable from phishing marketing campaign carried out in Poland throughout Might 2024.

3C0A0EC8FE9EB3E5DAB2
018E94CEB4E29FD8DD33

N/A

Win32/Rescoms.B

Rescoms executable from phishing marketing campaign carried out in Poland throughout Might 2024.

9B5AF677E565FFD4B15D
EE283D46C2E60E1E31D8

DOCUMENT_BT24PDF.IMG

Win32/TrojanDownloader.
ModiLoader.ADB

Malicious attachment from phishing marketing campaign carried out in Romania throughout Might 2024.

738CFBE52CFF57098818
857930A7C1CF01DB0519

DOCUMENT_BT24PDF.exe

Win32/TrojanDownloader.
ModiLoader.ADB

ModiLoader executable from phishing marketing campaign carried out in Romania throughout Might 2024.

843CE8848BCEEEF16D07
041A97417882DBACB93F

N/A

Win32/Formbook.AA

Formbook executable from phishing marketing campaign carried out in Romania throughout Might 2024.

MITRE ATT&CK methods

This desk was constructed utilizing model 15 of the MITRE ATT&CK framework.

Tactic

ID

Identify

Description

Reconnaissance

T1589.002

Collect Sufferer Id Info: E mail Addresses

E mail addresses and get in touch with data (both purchased or gathered from publicly out there sources) have been utilized in phishing campaigns to focus on corporations throughout a number of international locations.

Useful resource Growth

T1586.002

Compromise Accounts: E mail Accounts

Attackers used compromised e-mail accounts to ship malicious emails in phishing campaigns to extend their phishing e-mail’s credibility.

T1588.001

Receive Capabilities: Malware

Attackers purchased licenses and used a number of malware households for phishing campaigns.

T1583.006

Purchase Infrastructure: Net Providers

Attackers used Microsoft OneDrive to host malware.

T1584.004

Compromise Infrastructure: Server

Attackers used beforehand compromised servers to host malware and retailer stolen data.

Preliminary Entry

T1566

Phishing

Attackers used phishing messages with malicious attachments to compromise computer systems and steal data from corporations in a number of European international locations.

T1566.001

Phishing: Spearphishing Attachment

Attackers used spearphishing messages to compromise computer systems and steal data from corporations in a number of European international locations.

Execution

T1204.002

Consumer Execution: Malicious File

Attackers relied on customers opening archives containing malware and launching a ModiLoader executable.

Credential Entry

T1555.003

Credentials from Password Shops: Credentials from Net Browsers

Attackers tried to steal credential data from browsers and e-mail shoppers.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles