openthreatner / conll /text_34.conll
priamai's picture
Experimental files
8543b6e verified
Void O
Rabisu O
s O
Use O
of O
RomCom O
Backdoor O
Shows O
a O
O
Growing O
Shift O
in O
Threat O
Actors O
O
Goals O
O
trendmicro.com/en_us/research/23/e/void-rabisu-s-use-of-romcom-backdoor-shows-a-growing-shift-in-th.html O
O
May O
30 O
, O
2023 O
O
Cyber O
Threats O
O
Void O
Rabisu O
, O
a O
malicious O
actor O
believed O
to O
be O
associated O
with O
the O
RomCom O
backdoor O
, O
was O
O
thought O
to O
be O
driven O
by O
financial O
gain O
because O
of O
its O
ransomware O
attacks O
. O
But O
in O
this O
blog O
O
entry O
, O
we O
discuss O
how O
the O
use O
of O
the O
RomCom O
backdoor O
in O
recent O
attacks O
shows O
how O
Void O
O
Rabisu O
's O
motives O
seem O
to O
have O
changed O
since O
at O
least O
October O
2022 O
. O
O
By O
: O
Feike O
Hacquebord O
, O
Stephen O
Hilt O
, O
Fernando O
Merces O
, O
Lord O
Alfred O
Remorin O
May O
30 O
, O
2023 O
O
Read O
time O
: O
( O
words O
) O
O
With O
contributions O
from O
Veronica O
Chierzi O
and O
Jayvee O
Mark O
Villaroman O
O
Since O
the O
start O
of O
the O
war O
in O
Ukraine O
in O
February O
2022 O
, O
the O
number O
of O
cyber O
campaigns O
O
against O
Ukraine O
and O
North O
Atlantic O
Treaty O
Organization O
( O
NATO O
) O
countries O
has O
increased O
O
significantly O
. O
These O
campaigns O
come O
from O
many O
different O
angles O
: O
known O
advanced O
persistent O
O
threat O
( O
APT O
) O
actors O
, O
APT O
actors O
that O
were O
not O
publicly O
reported O
on O
before O
, O
and O
cyber O
O
mercenaries O
, O
hacktivists O
, O
and O
criminal O
actors O
who O
appear O
to O
have O
shifted O
from O
purely O
financial O
O
motives O
to O
geopolitical O
goals O
. O
In O
the O
past O
, O
these O
actors O
had O
different O
motivations O
, O
mode O
of O
O
operations O
, O
and O
targets O
, O
but O
the O
line O
between O
their O
campaigns O
has O
started O
to O
blur O
: O
Not O
only O
is O
O
an O
overlap O
in O
their O
targeting O
becoming O
apparent O
, O
but O
the O
distinction O
between O
their O
modes O
of O
O
operation O
is O
less O
clear O
. O
For O
instance O
, O
in O
2022 O
, O
one O
of O
Conti O
s O
affiliates O
was O
found O
to O
be O
using O
O
its O
initial O
access O
techniques O
against O
Ukraine O
instead O
of O
using O
them O
to O
spread O
ransomware O
. O
O
Another O
example O
of O
this O
is O
Void O
Rabisu O
, O
also O
known O
as O
Tropical O
Scorpius O
, O
an O
actor O
believed O
O
to O
be O
associated O
with O
Cuba O
ransomware O
and O
the O
RomCom O
backdoor O
. O
Because O
of O
its O
many O
O
ransomware O
attacks O
, O
Void O
Rabisu O
was O
believed O
to O
be O
financially O
motivated O
, O
even O
though O
its O
O
associated O
Cuba O
ransomware O
allegedly O
attacked O
the O
parliament O
of O
Montenegro O
in O
August O
O
2022 O
, O
which O
could O
be O
considered O
part O
of O
a O
geopolitical O
agenda O
. O
The O
motives O
of O
Void O
Rabisu O
O
seem O
to O
have O
changed O
since O
at O
least O
October O
2022 O
, O
when O
Void O
Rabisu O
s O
associated O
O
RomCom O
backdoor O
was O
reported O
to O
have O
been O
used O
in O
attacks O
against O
the O
Ukrainian O
O
government O
and O
military O
: O
In O
a O
campaign O
in O
December O
2022 O
, O
a O
fake O
version O
of O
the O
Ukrainian O
O
army O
s O
DELTA O
situational O
awareness O
website O
was O
used O
to O
lure O
targets O
into O
installing O
the O
O
RomCom O
backdoor O
. O
Normally O
, O
this O
kind O
of O
brazen O
attack O
would O
be O
thought O
to O
be O
the O
work O
of O
a O
O
1/27 O
O
nation O
state O
- O
sponsored O
actor O
, O
but O
in O
this O
case O
, O
the O
indicators O
clearly O
pointed O
towards O
Void O
O
Rabisu O
, O
and O
some O
of O
the O
tactics O
, O
techniques O
, O
and O
procedures O
( O
TTPs O
) O
used O
were O
typically O
O
associated O
with O
cybercrime O
. O
O
Trend O
Micro O
s O
telemetry O
and O
research O
corroborates O
that O
the O
RomCom O
backdoor O
has O
been O
O
used O
in O
geopolitically O
motivated O
attacks O
since O
at O
least O
October O
2022 O
, O
with O
targets O
that O
O
included O
organizations O
in O
Ukraine O
s O
energy O
and O
water O
utility O
sectors O
. O
Targets O
outside O
of O
O
Ukraine O
were O
observed O
as O
well O
, O
such O
as O
a O
provincial O
local O
government O
that O
provides O
help O
to O
O
Ukrainian O
refugees O
, O
a O
parliament O
member O
of O
a O
European O
country O
, O
a O
European O
defense O
O
company O
, O
and O
various O
IT O
service O
providers O
in O
Europe O
and O
the O
US O
. O
Independent O
research O
from O
O
Google O
showed O
that O
RomCom O
was O
being O
used O
in O
campaigns O
against O
attendees O
of O
the O
O
Masters O
of O
Digital O
conference O
, O
a O
conference O
organized O
by O
DIGITALEUROPE O
, O
and O
the O
Munich O
O
Security O
Conference O
. O
O
In O
this O
blog O
entry O
, O
we O
will O
discuss O
how O
the O
use O
of O
the O
RomCom O
backdoor O
fits O
into O
the O
current O
O
landscape O
, O
where O
politically O
motivated O
attacks O
are O
not O
committed O
by O
nation O
- O
state O
actors O
O
alone O
. O
Even O
though O
we O
can O
not O
confirm O
coordination O
between O
the O
different O
attacks O
, O
Ukraine O
O
and O
countries O
who O
support O
Ukraine O
are O
being O
targeted O
by O
various O
actors O
, O
like O
APT O
actors O
, O
O
hacktivists O
, O
cyber O
mercenaries O
, O
and O
cybercriminals O
like O
Void O
Rabisu O
. O
We O
will O
also O
delve O
into O
O
how O
RomCom O
has O
evolved O
over O
time O
and O
how O
the O
backdoor O
is O
spread O
both O
by O
methods O
that O
O
look O
like O
APT O
, O
as O
well O
as O
methods O
used O
by O
prominent O
cybercriminal O
campaigns O
taking O
place O
O
currently O
, O
to O
show O
that O
RomCom O
is O
using O
more O
detection O
evasion O
techniques O
that O
are O
popular O
O
among O
the O
most O
impactful O
cybercriminals O
. O
O
We O
assess O
that O
RomCom O
makes O
use O
of O
the O
same O
third O
- O
party O
services O
that O
are O
being O
utilized O
O
by O
other O
criminal O
actors O
as O
well O
, O
like O
malware O
signing O
and O
binary O
encryption O
. O
RomCom O
has O
O
been O
spread O
through O
numerous O
lure O
sites O
that O
are O
sometimes O
set O
up O
in O
rapid O
bursts O
. O
These O
O
lure O
sites O
are O
most O
likely O
only O
meant O
for O
a O
small O
number O
of O
targets O
, O
thus O
making O
discovery O
O
and O
analysis O
more O
difficult O
. O
Void O
Rabisu O
is O
one O
of O
the O
most O
evident O
examples O
of O
financially O
O
motivated O
threat O
actors O
whose O
goals O
and O
motivations O
are O
becoming O
more O
aligned O
under O
O
extraordinary O
geopolitical O
circumstances O
, O
and O
we O
anticipate O
that O
this O
will O
happen O
more O
in O
the O
O
future O
. O
O
RomCom O
campaigns O
O
We O
have O
been O
tracking O
RomCom O
campaigns O
since O
the O
summer O
of O
2022 O
, O
and O
since O
then O
, O
O
have O
seen O
an O
escalation O
in O
its O
detection O
evasion O
methods O
: O
Not O
only O
do O
the O
malware O
samples O
O
routinely O
use O
VMProtect O
to O
make O
both O
manual O
and O
automated O
sandbox O
analysis O
more O
O
difficult O
, O
they O
also O
utilize O
binary O
padding O
techniques O
on O
the O
payload O
files O
. O
This O
adds O
a O
O
significant O
amount O
of O
overlay O
bytes O
to O
the O
files O
, O
increasing O
the O
size O
of O
the O
malicious O
payload O
O
( O
we O
've O
seen O
a O
file O
with O
1.7 O
gigabytes O
) O
. O
Additionally O
, O
a O
new O
routine O
has O
been O
recently O
added O
O
that O
involves O
the O
encryption O
of O
the O
payload O
files O
, O
which O
can O
only O
be O
decrypted O
if O
a O
certain O
key O
O
is O
downloaded O
to O
activate O
the O
payload O
. O
O
2/27 O
O
In O
addition O
to O
these O
technical O
evasion O
techniques O
, O
RomCom O
is O
being O
distributed O
using O
lure O
O
sites O
that O
often O
appear O
legitimate O
and O
are O
being O
utilized O
in O
narrow O
targeting O
. O
This O
makes O
O
automated O
blocking O
of O
these O
lure O
websites O
through O
web O
reputation O
systems O
harder O
. O
Void O
O
Rabisu O
has O
been O
using O
Google O
Ads O
to O
entice O
their O
targets O
to O
visit O
the O
lure O
sites O
, O
similar O
to O
a O
O
campaign O
that O
distributed O
IcedID O
botnet O
in O
December O
2022 O
. O
A O
key O
difference O
is O
that O
while O
O
IcedID O
s O
targeting O
was O
wider O
, O
Void O
Rabisu O
probably O
opted O
for O
narrower O
targeting O
that O
Google O
O
Ads O
offers O
to O
its O
advertisers O
. O
RomCom O
campaigns O
also O
make O
use O
of O
highly O
targeted O
spear O
O
phishing O
emails O
. O
O
On O
the O
RomCom O
lure O
sites O
, O
targets O
are O
offered O
trojanized O
versions O
of O
legitimate O
applications O
, O
O
like O
chat O
apps O
such O
as O
AstraChat O
and O
Signal O
, O
PDF O
readers O
, O
remote O
desktop O
apps O
, O
password O
O
managers O
, O
and O
other O
tools O
, O
that O
are O
typically O
used O
by O
system O
administrators O
. O
O
dirwinstat.com O
O
( O
as O
of O
April O
4 O
, O
2023 O
) O
O
3/27 O
O
devolrdm.com O
O
( O
as O
of O
March O
23 O
, O
2023 O
) O
O
vectordmanagesoft.com O
O
( O
as O
of O
March O
22 O
, O
2023 O
) O
O
4/27 O
O
cozy-sofware.com O
O
( O
as O
of O
March O
13 O
, O
2023 O
) O
O
devolutionrdp.com O
O
( O
as O
of O
March O
6 O
, O
2023 O
) O
O
5/27 O
O
astrachats.com O
O
( O
as O
of O
February O
27 O
, O
O
2023 O
) O
O
chatgpt4beta.com O
O
( O
as O
of O
February O
23 O
, O
O
2023 O
) O
O
6/27 O
O
singularlabs.org O
O
( O
as O
of O
January O
30 O
, O
O
2023 O
) O
O
gotomeet.us O
O
( O
as O
of O
December O
14 O
, O
O
2022 O
) O
O
7/27 O
O
gllmp.com O
O
( O
as O
of O
December O
8 O
, O
O
2022 O
) O
O
lnfo-messengers.com O
O
( O
as O
of O
November O
3 O
, O
O
2022 O
) O
O
8/27 O
O
pass-shield.com O
O
( O
as O
of O
October O
15 O
, O
O
2022 O
) O
O
pdffreader.com O
O
( O
as O
of O
October O
12 O
, O
O
2022 O
) O
O
9/27 O
O
10/27 O
O
veeame.com O
O
( O
as O
of O
September O
, O
9 O
O
2022 O
) O
O
npm-solar.com O
O
( O
as O
of O
July O
31 O
, O
2022 O
) O
O
11/27 O
O
advanced-ipscanners.com O
O
( O
as O
of O
July O
20 O
, O
2022 O
) O
O
Table O
1 O
. O
RomCom O
lure O
sites O
O
Image O
credit O
: O
DomainTools O
O
As O
reported O
by O
the O
Ukrainian O
Computer O
Emergency O
Response O
Team O
( O
CERT O
- O
UA O
) O
in O
the O
fall O
of O
O
2022 O
, O
RomCom O
was O
used O
in O
specific O
campaigns O
against O
Ukrainian O
targets O
, O
including O
the O
O
Ukrainian O
government O
and O
the O
Ukrainian O
military O
. O
Trend O
Micro O
s O
telemetry O
confirms O
this O
O
targeting O
, O
and O
, O
as O
shown O
in O
a O
selection O
of O
the O
numerous O
RomCom O
campaigns O
over O
time O
O
( O
Table O
1 O
) O
, O
it O
is O
immediately O
clear O
that O
RomCom O
already O
had O
Ukrainian O
- O
language O
social O
O
engineering O
lures O
back O
in O
October O
and O
November O
2022 O
. O
O
We O
count O
a O
few O
dozen O
lure O
websites O
that O
have O
been O
set O
up O
since O
July O
2022 O
. O
RomCom O
shows O
O
a O
mix O
in O
their O
targeting O
methodologies O
, O
mixing O
typical O
cybercriminal O
TTPs O
with O
TTPs O
that O
are O
O
more O
common O
for O
APT O
actors O
. O
For O
example O
, O
RomCom O
used O
spear O
phishing O
against O
a O
O
member O
of O
a O
European O
parliament O
in O
March O
2022 O
, O
but O
targeted O
a O
European O
defense O
O
company O
in O
October O
2022 O
with O
a O
Google O
Ads O
advertisement O
that O
led O
to O
an O
intermediary O
O
landing O
site O
that O
would O
redirect O
to O
a O
RomCom O
lure O
site O
. O
That O
intermediary O
landing O
site O
used O
O
the O
domain O
name O
O
kagomadb[.]com O
, O
O
which O
was O
later O
used O
for O
Qakbot O
and O
Gozi O
payloads O
in O
O
December O
2022 O
. O
O
12/27 O
O
Among O
the O
targets O
we O
have O
seen O
based O
on O
Trend O
Micro O
s O
telemetry O
were O
a O
water O
utility O
O
company O
, O
entities O
in O
the O
financial O
and O
energy O
sectors O
, O
and O
an O
IT O
company O
in O
Ukraine O
. O
Outside O
O
Ukraine O
, O
other O
targets O
included O
a O
local O
government O
agency O
that O
supports O
Ukrainian O
refugees O
, O
O
a O
defense O
company O
in O
Europe O
, O
a O
high O
- O
profile O
European O
politician O
, O
several O
IT O
service O
O
providers O
in O
Europe O
and O
the O
US O
, O
a O
bank O
in O
South O
America O
, O
and O
a O
couple O
of O
targets O
located O
in O
O
Asia O
. O
Combined O
with O
the O
targets O
that O
were O
published O
by O
CERT O
- O
UA O
and O
Google O
, O
a O
clear O
O
picture O
emerges O
of O
the O
RomCom O
backdoor O
s O
targets O
: O
select O
Ukrainian O
targets O
and O
allies O
of O
O
Ukraine O
. O
O
RomCom O
3.0 O
: O
The O
AstraChat O
Campaign O
O
In O
this O
section O
, O
we O
will O
analyze O
one O
of O
the O
RomCom O
backdoor O
samples O
that O
was O
used O
in O
O
February O
2023 O
against O
targets O
in O
Eastern O
Europe O
. O
Previous O
RomCom O
versions O
analyzed O
by O
O
Palo O
Alto O
's O
Unit O
42 O
use O
a O
modular O
architecture O
and O
support O
up O
to O
20 O
different O
commands O
. O
O
Since O
then O
, O
the O
malware O
evolved O
significantly O
in O
terms O
of O
the O
number O
of O
supported O
O
commands O
, O
but O
its O
modular O
architecture O
remains O
almost O
unchanged O
. O
The O
threat O
actor O
behind O
O
RomCom O
3.0 O
also O
makes O
use O
of O
different O
techniques O
to O
drop O
and O
execute O
the O
malware O
. O
This O
O
analysis O
is O
based O
on O
a O
campaign O
that O
embedded O
RomCom O
3.0 O
in O
an O
AstraChat O
instant O
O
messaging O
software O
installation O
package O
. O
O
Dropper O
O
The O
file O
astrachat.msi O
is O
a O
Microsoft O
Installer O
( O
MSI O
) O
archive O
. O
Despite O
installing O
files O
related O
to O
O
legitimate O
AstraChat O
software O
, O
it O
unpacks O
a O
malicious O
InstallA.dll O
file O
and O
calls O
its O
Main O
( O
) O
O
function O
( O
Figure O
1 O
) O
. O
O
Figure O
1 O
. O
CustomAction O
table O
from O
a O
RomCom O
MSI O
dropper O
O
The O
InstallA.dll O
file O
extracts O
three O
Dynamic O
Link O
Libraries O
( O
DLLs O
) O
files O
under O
the O
O
% O
PUBLIC%\Libraries O
folder O
: O
O
prxyms O
< O
number>.dll O
O
13/27 O
O
winipfile O
< O
number>.dll0 O
O
netid O
< O
number>.dll0 O
O
The O
number O
in O
these O
DLL O
files O
is O
an O
integer O
number O
based O
on O
the O
Machine O
GUID O
read O
from O
O
Windows O
Registry O
at O
HKLM\SOFTWARE\Microsoft\Cryptography\MachineGuid O
. O
O
Persistence O
O
For O
persistence O
, O
RomCom O
uses O
COM O
hijacking O
, O
hence O
its O
name O
. O
InstallA.dll O
writes O
the O
O
following O
registry O
value O
in O
Windows O
Registry O
: O
O
[ O
HKEY_CURRENT_USER\SOFTWARE\Classes\CLSID\{C90250F3 O
- O
4D7D-4991 O
- O
9B69A5C5BC1C2AE6}\InProcServer32 O
] O
O
@="%PUBLIC%\\Libraries\\prxyms O
< O
number>.dll O
" O
O
This O
overwrites O
the O
same O
key O
under O
the O
HKEY_LOCAL_MACHINE O
hive O
, O
causing O
processes O
O
that O
request O
this O
Class O
ID O
( O
CLSID O
) O
to O
load O
the O
RomCom O
loader O
DLL O
at O
O
% O
PUBLIC%\Libraries\prxyms O
< O
number>.dll O
. O
One O
such O
process O
is O
explorer.exe O
, O
which O
is O
O
restarted O
by O
RomCom O
dropper O
, O
so O
the O
loader O
DLL O
is O
called O
. O
O
The O
RomCom O
loader O
also O
redirects O
calls O
to O
its O
exported O
functions O
to O
the O
legit O
actxprxy.dll O
by O
O
making O
use O
of O
forwarded O
exports O
( O
Figure O
2 O
) O
. O
O
Figure O
2 O
. O
Forwarded O
exports O
from O
the O
RomCom O
3.0 O
loader O
( O
prxyms O
< O
number>.dll O
) O
O
However O
, O
before O
a O
call O
is O
forwarded O
, O
the O
malicious O
code O
at O
the O
DLL O
entry O
point O
of O
RomCom O
O
loader O
runs O
. O
This O
code O
uses O
rundll32.exe O
to O
execute O
the O
exported O
Main O
( O
) O
function O
from O
both O
O
winipfile O
< O
number>.dll0 O
and O
netid O
< O
number>.dll0 O
. O
O
Architecture O
O
RomCom O
3.0 O
is O
divided O
into O
three O
components O
: O
a O
loader O
, O
a O
network O
component O
that O
interacts O
O
with O
the O
command O
- O
and O
- O
control O
( O
C&C O
) O
server O
, O
and O
a O
worker O
component O
that O
performs O
the O
O
actions O
on O
the O
victim O
s O
machine O
. O
The O
network O
component O
is O
handled O
by O
netid O
< O
number>.dll0 O
, O
O
which O
is O
responsible O
for O
receiving O
commands O
from O
the O
C&C O
server O
and O
sending O
back O
their O
O
results O
. O
When O
this O
component O
receives O
a O
command O
, O
the O
command O
is O
sent O
through O
a O
O
14/27 O
O
localhost O
socket O
to O
winipfile O
< O
number>.dll0 O
, O
which O
handles O
the O
worker O
component O
, O
as O
shown O
O
in O
Figure O
3 O
. O
If O
initial O
loopback O
addresses O
or O
ports O
are O
in O
use O
, O
both O
components O
try O
to O
find O
other O
O
available O
combinations O
. O
O
Figure O
3 O
. O
Overall O
RomCom O
3.0 O
architecture O
O
Bot O
Commands O
O
RomCom O
3.0 O
commands O
are O
received O
as O
responses O
to O
HTTP O
POST O
requests O
made O
by O
the O
O
malware O
network O
component O
. O
O
Figure O
4 O
. O
RomCom O
3.0 O
command O
structure O
O
15/27 O
O
Figure O
4 O
shows O
an O
example O
of O
command O
5 O
O
a O
command O
to O
download O
a O
file O
to O
the O
victim O
's O
O
machine O
O
being O
received O
. O
The O
ID O
used O
for O
communication O
is O
0x950 O
, O
and O
command O
0x05 O
is O
O
received O
with O
additional O
data O
. O
In O
this O
case O
, O
the O
additional O
data O
tells O
the O
malware O
running O
on O
O
the O
infected O
machine O
that O
the O
downloaded O
file O
should O
occupy O
939 O
( O
0x3ac O
O
1 O
) O
4 O
KB O
blocks O
. O
O
The O
file O
itself O
is O
downloaded O
in O
a O
separate O
response O
, O
so O
in O
this O
instance O
, O
the O
final O
file O
size O
on O
O
the O
victim O
s O
side O
will O
be O
3,846,144 O
bytes O
. O
As O
an O
evasion O
technique O
, O
null O
bytes O
are O
appended O
O
to O
the O
file O
to O
achieve O
this O
result O
. O
The O
contents O
of O
the O
additional O
data O
field O
may O
vary O
according O
O
to O
the O
command O
. O
O
In O
RomCom O
3.0 O
, O
we O
could O
enumerate O
42 O
valid O
commands O
, O
as O
shown O
in O
Table O
2 O
. O
This O
is O
a O
O
high O
number O
of O
commands O
for O
a O
regular O
backdoor O
, O
but O
a O
few O
commands O
are O
simply O
variations O
O
of O
others O
. O
O
Command O
O
Purpose O
( O
from O
the O
victim O
s O
perspective O
) O
O
1 O
O
Send O
information O
about O
connected O
drives O
O
2 O
O
Send O
a O
list O
of O
file O
names O
under O
a O
specified O
directory O
O
3 O
O
Start O
cmd.exe O
to O
run O
an O
existing O
program O
O
4 O
O
Upload O
a O
specified O
file O
to O
the O
C&C O
server O
O
5 O
O
Download O
a O
file O
to O
the O
victim O
's O
machine O
O
6 O
O
Delete O
a O
specified O
file O
in O
the O
victim O
's O
machine O
O
7 O
O
Delete O
a O
specified O
directory O
in O
the O
victim O
's O
machine O
O
8 O
O
Spawn O
a O
given O
process O
with O
PID O
spoofing O
( O
the O
PID O
is O
also O
given O
as O
part O
of O
O
the O
command O
data O
) O
O
12 O
O
Call O
startWorker O
( O
) O
from O
% O
PUBLIC%\Libraries\PhotoDirector.dll O
, O
then O
send O
O
% O
PUBLIC%\Libraries\PhotoDirector.zip O
to O
the O
C&C O
server O
and O
delete O
it O
O
13 O
O
Call O
startWorker O
( O
) O
from O
% O
PUBLIC%\Libraries\PhotoDirector.dll O
and O
write O
O
screen O
information O
to O
% O
PUBLIC%\Libraries\update.conf O
O
14 O
O
Upload O
% O
PUBLIC%\Libraries\PhotoDirector.zip O
to O
the O
C&C O
server O
and O
delete O
O
it O
O
15 O
O
Send O
a O
list O
of O
running O
process O
with O
its O
PIDs O
O
16 O
O
Send O
a O
list O
of O
installed O
software O
O
17 O
O
Delete O
the O
worker O
component O
( O
winipfile O
< O
number>.dll0 O
) O
O
18 O
O
Download O
a O
file O
and O
save O
it O
to O
% O
PUBLIC%\Libraries\PhotoDirector.dll O
O
16/27 O
O
19 O
O
Download O
a O
file O
, O
save O
it O
to O
% O
PUBLIC%\Libraries\BrowserData\procsys.dll O
, O
O
and O
call O
its O
stub O
( O
) O
exported O
function O
O
20 O
O
Download O
a O
ZIP O
archive O
likely O
containing O
3proxy O
and O
plink O
( O
see O
command O
21 O
) O
O
21 O
O
Use O
3proxy O
and O
plink O
to O
set O
up O
a O
proxy O
via O
SSH O
. O
The O
IP O
address O
, O
password O
, O
O
local O
, O
and O
remote O
ports O
are O
received O
as O
command O
parameters O
. O
SSH O
server O
O
username O
is O
fixed O
as O
O
john O
. O
O
O
22 O
O
Kill O
the O
3proxy.exe O
and O
plink.exe O
processes O
O
23 O
O
Download O
a O
file O
and O
save O
it O
to O
% O
PUBLIC%\Libraries\upd O
- O
fil O
< O
number>.dll0 O
to O
O
update O
the O
worker O
O
24 O
O
Send O
the O
contents O
of O
% O
PUBLIC%\Libraries\BrowserData\Result O
O
25 O
O
Duplicate O
the O
worker O
O
26 O
O
Send O
the O
Windows O
version O
O
29 O
O
Download O
freeSSHd O
from O
the O
C&C O
server O
O
30 O
O
Run O
freeSSHd O
and O
use O
plink O
to O
create O
a O
reverse O
connection O
with O
O
51.195.49.215 O
using O
O
john O
O
as O
the O
username O
and O
O
O
eK6czNHWCT569L1xK9ZH O
O
as O
the O
password O
O
31 O
O
Kill O
the O
freeSSHd O
process O
O
32 O
O
Send O
.txt O
, O
.rtf O
, O
.xls O
, O
.xlsx O
, O
.ods O
, O
.cmd O
, O
.pdf O
, O
.vbs O
, O
.ps1 O
, O
.one O
, O
.kdb O
, O
.kdb O
, O
.doc O
, O
O
.doc O
, O
.odt O
, O
.eml O
, O
.msg O
, O
and O
.email O
files O
in O
Downloads O
, O
Documents O
, O
and O
O
Desktop O
folders O
under O
% O
USERPROFILE% O
O
34 O
O
Run O
AnyDesk O
on O
the O
victim O
s O
machine O
on O
a O
hidden O
window O
and O
send O
the O
O
AnyDesk O
ID O
to O
the O
C&C O
server O
O
35 O
O
Kill O
the O
AnyDesk O
process O
and O
delete O
its O
executable O
O
36 O
O
Download O
the O
AnyDesk O
executable O
and O
save O
it O
to O
O
% O
PUBLIC%\Libraries\dsk.exe O
O
38 O
O
Download O
a O
file O
and O
save O
it O
to O
% O
PUBLIC%\Libraries\wallet.exe O
O
39 O
O
Download O
a O
file O
and O
save O
it O
to O
% O
PUBLIC%\Libraries\7z.dll O
O
40 O
O
Download O
a O
file O
and O
save O
it O
to O
% O
PUBLIC%\Libraries\7z.exe O
O
41 O
O
Send O
the O
contents O
of O
% O
PUBLIC%\Libraries\tempFolder O
compressed O
with O
7Zip O
O
42 O
O
Download O
a O
file O
and O
save O
it O
to O
% O
PUBLIC%\Libraries\7za.exe O
O
17/27 O
O
43 O
O
Use O
% O
PUBLIC%\Libraries\7za.exe O
to O
compress O
a O
given O
folder O
to O
a O
fold.zip O
O
archive O
and O
send O
the O
compressed O
archive O
to O
the O
C&C O
server O
O
44 O
O
Kill O
the O
PhotoDirector.dll O
process O
O
45 O
O
Download O
a O
file O
and O
save O
it O
to O
% O
PUBLIC%\Libraries\msg.dll O
O
46 O
O
Call O
stW O
( O
) O
function O
exported O
by O
% O
PUBLIC%\Libraries\msg.dll O
O
47 O
O
Download O
a O
file O
and O
save O
it O
to O
% O
PUBLIC%\Libraries\FileInfo.dll O
O
48 O
O
Call O
fSt O
( O
) O
function O
exported O
by O
% O
PUBLIC%\Libraries\FileInfo.dll O
O
49 O
O
Update O
the O
network O
component O
O
Table O
2 O
. O
RomCom O
3.0 O
commands O
O
Additional O
Malware O
O
Based O
on O
messages O
sent O
back O
to O
the O
C&C O
server O
and O
how O
the O
commands O
use O
these O
files O
, O
O
we O
can O
infer O
the O
purpose O
of O
a O
few O
additional O
components O
: O
O
PhotoDirector.dll O
O
a O
program O
that O
takes O
one O
or O
more O
screenshots O
and O
compresses O
O
them O
in O
a O
% O
PUBLIC%\Libraries\PhotoDirector.zip O
archive O
O
procsys.dll O
O
a O
stealer O
known O
as O
STEALDEAL O
to O
retrieve O
browser O
cookies O
and O
write O
O
them O
to O
% O
PUBLIC%\Libraries\BrowserData\Result O
O
wallet.exe O
O
a O
crypto O
wallet O
grabber O
that O
writes O
stolen O
information O
to O
O
% O
PUBLIC%\Libraries\tempFolder O
O
msg.dll O
O
an O
Instant O
Messaging O
grabber O
to O
steal O
chat O
messages O
O
FileInfo.dll O
O
a O
stealer O
of O
FTP O
credentials O
, O
or O
a O
component O
to O
make O
the O
victim O
s O
O
machine O
upload O
files O
to O
an O
FTP O
server O
O
Despite O
these O
additional O
pieces O
of O
malware O
, O
RomCom O
3.0 O
also O
seems O
to O
have O
commands O
to O
O
download O
and O
run O
legitimate O
software O
: O
O
dsk.exe O
O
a O
portable O
version O
of O
AnyDesk O
software O
O
7z.dll O
, O
7z.exe O
, O
and O
7za.exe O
O
files O
related O
to O
the O
7 O
- O
Zip O
program O
O
STEALDEAL O
O
The O
stealer O
that O
is O
downloaded O
through O
RomCom O
s O
C&C O
servers O
is O
a O
relatively O
simple O
one O
O
that O
steals O
stored O
credentials O
and O
browsing O
history O
from O
the O
following O
browsers O
: O
O
Google O
Chrome O
O
Microsoft O
Edge O
O
Mozilla O
Firefox O
O
18/27 O
O
Chromium O
O
Chrome O
Beta O
O
Yandex O
Browser O
O
The O
stealer O
also O
collects O
information O
on O
installed O
mail O
clients O
. O
The O
stolen O
data O
is O
stored O
locally O
O
on O
the O
victim O
s O
machine O
at O
% O
PUBLIC%\Libraries\BrowserData\Result O
, O
and O
through O
C&C O
O
command O
24 O
, O
this O
data O
is O
exfiltrated O
through O
a O
RomCom O
C&C O
server O
. O
We O
detected O
the O
O
stealer O
as O
TrojanSpy O
. O
Win64.STEALDEAL O
, O
which O
is O
also O
known O
as O
SneakyStealer O
. O
O
Evasion O
Techniques O
O
RomCom O
3.0 O
binaries O
are O
protected O
with O
VMProtect O
. O
Some O
binaries O
are O
also O
signed O
with O
O
valid O
certificates O
. O
Because O
the O
actors O
decided O
to O
use O
VMProtect O
s O
anti O
- O
VM O
feature O
, O
any O
O
attempt O
to O
run O
it O
in O
a O
virtual O
machine O
( O
VM O
) O
without O
modification O
or O
VM O
hardening O
will O
cause O
O
the O
malware O
to O
show O
an O
error O
message O
and O
exit O
( O
Figure O
5 O
) O
. O
O
Figure O
5 O
. O
Default O
VMProtect O
anti O
- O
VM O
detection O
in O
RomCom O
3.0 O
samples O
O
Another O
interesting O
technique O
RomCom O
uses O
is O
the O
ability O
to O
add O
null O
bytes O
appended O
to O
the O
O
files O
received O
from O
a O
C&C O
server O
. O
Making O
the O
file O
bigger O
can O
be O
an O
attempt O
to O
avoid O
sandbox O
O
products O
or O
security O
software O
scanners O
that O
impose O
a O
file O
size O
limit O
. O
O
In O
later O
versions O
of O
RomCom O
, O
the O
binary O
that O
is O
hosted O
on O
a O
lure O
site O
contains O
an O
encrypted O
O
payload O
. O
To O
correctly O
decrypt O
the O
payload O
, O
it O
will O
need O
to O
reach O
out O
to O
a O
web O
server O
at O
the O
IP O
O
address O
94.142.138.244 O
and O
download O
the O
decryption O
key O
. O
We O
suspect O
this O
website O
is O
a O
O
third O
- O
party O
service O
that O
is O
also O
being O
used O
by O
other O
malware O
, O
including O
the O
Vidar O
stealer O
that O
is O
O
also O
known O
as O
StealC. O
Also O
, O
recent O
RomCom O
droppers O
have O
stopped O
dropping O
the O
worker O
O
component O
. O
Instead O
, O
the O
network O
component O
downloads O
it O
from O
the O
C&C O
server O
. O
O
Packet O
Structure O
and O
Communications O
Flow O
O
19/27 O
O
Based O
on O
our O
observations O
of O
the O
communication O
between O
victim O
machines O
and O
RomCom O
O
C&C O
servers O
, O
we O
were O
able O
to O
determine O
what O
the O
packet O
structure O
of O
this O
communication O
O
looks O
like O
( O
Figure O
6 O
) O
. O
Initially O
, O
the O
client O
will O
reach O
out O
to O
the O
server O
with O
information O
on O
the O
O
victim O
s O
computer O
, O
such O
as O
its O
Universally O
Unique O
Identifier O
( O
UUID O
) O
, O
username O
, O
and O
the O
O
computer O
name O
. O
The O
server O
will O
then O
respond O
with O
a O
session O
ID O
that O
is O
four O
bytes O
long O
, O
as O
O
mentioned O
previously O
. O
This O
session O
ID O
is O
then O
incremented O
by O
one O
on O
the O
first O
byte O
by O
the O
O
C&C O
server O
with O
each O
command O
that O
is O
sent O
to O
the O
victim O
machine O
. O
O
Figure O
6 O
. O
Packet O
structure O
of O
the O
observed O
packets O
O
One O
of O
the O
first O
commands O
we O
observed O
was O
command O
3 O
, O
which O
uses O
cmd.exe O
to O
run O
a O
O
Nltest O
command O
with O
the O
argument O
/domain_trusts O
. O
This O
is O
done O
to O
gather O
information O
on O
any O
O
domains O
that O
the O
victim O
machine O
may O
know O
about O
. O
Once O
the O
command O
is O
finished O
, O
it O
returns O
O
the O
results O
of O
the O
command O
with O
the O
Session O
ID O
five O
bytes O
in O
; O
the O
first O
four O
bytes O
are O
unknown O
O
at O
this O
time O
, O
but O
we O
observed O
the O
first O
byte O
will O
be O
0x01 O
if O
it O
is O
returning O
data O
to O
the O
server O
, O
or O
O
0x00 O
if O
it O
is O
receiving O
data O
from O
the O
server O
. O
The O
C&C O
server O
then O
appears O
to O
ask O
for O
specific O
O
information O
in O
an O
automated O
manner O
, O
as O
the O
same O
requests O
are O
sent O
in O
quick O
succession O
O
( O
Figure O
7 O
) O
. O
From O
our O
analysis O
, O
we O
have O
determined O
that O
the O
server O
is O
asking O
for O
the O
victim O
O
machine O
to O
: O
O
20/27 O
O
1 O
. O
Return O
ntlest O
/domain_trusts O
with O
command O
3 O
O
2 O
. O
Download O
StealDeal O
to O
collect O
certain O
information O
O
3 O
. O
Use O
StealDeal O
to O
collect O
cookies O
and O
other O
information O
from O
the O
victim O
s O
machine O
O
4 O
. O
Collect O
files O
from O
the O
Desktop O
, O
Documents O
, O
and O
Downloads O
folders O
using O
command O
32 O
O
Figure O
7 O
. O
Flow O
of O
the O
communication O
between O
the O
C&C O
server O
and O
victim O
machine O
O
Use O
of O
fake O
companies O
and O
websites O
O
The O
malware O
uses O
certificates O
to O
lend O
credibility O
to O
the O
software O
that O
the O
targeted O
victims O
O
download O
. O
On O
the O
surface O
, O
the O
companies O
that O
are O
signing O
these O
binaries O
look O
like O
legitimate O
O
companies O
that O
have O
undergone O
the O
process O
of O
becoming O
a O
signer O
of O
these O
certificates O
. O
O
However O
, O
a O
closer O
look O
at O
these O
companies O
O
websites O
reveals O
several O
oddities O
, O
including O
nonexistent O
phone O
numbers O
, O
stock O
photos O
of O
executives O
, O
office O
addresses O
that O
do O
not O
seem O
to O
O
match O
. O
This O
leads O
us O
to O
believe O
these O
are O
either O
fake O
companies O
or O
legitimate O
companies O
that O
O
are O
being O
abused O
in O
order O
to O
pass O
the O
checks O
needed O
to O
become O
an O
authorized O
signer O
of O
O
binaries O
. O
O
The O
RomCom O
3.0 O
sample O
that O
was O
used O
in O
the O
AstraChat O
campaign O
was O
signed O
by O
a O
O
Canadian O
company O
called O
Noray O
Consulting O
Ltd. O
, O
which O
has O
a O
LinkedIn O
page O
( O
Figure O
8) O
, O
a O
O
website O
, O
and O
even O
a O
listing O
in O
a O
business O
registry O
in O
Canada O
( O
Figure O
9 O
) O
. O
O
21/27 O
O
Figure O
8 O
. O
Screenshot O
of O
Noray O
Consulting O
's O
LinkedIn O
page O
O
Figure O
9 O
. O
Ontario O
business O
registry O
search O
results O
for O
Noray O
Consulting O
O
The O
company O
s O
LinkedIn O
page O
goes O
on O
to O
mention O
that O
Noray O
Consulting O
works O
on O
SOX O
O
compliance O
, O
an O
annual O
audit O
mandated O
by O
the O
Sarbanes O
- O
Oxley O
Act O
( O
SOX O
) O
, O
as O
well O
as O
other O
O
areas O
of O
risk O
control O
. O
However O
, O
the O
LinkedIn O
page O
also O
points O
to O
a O
website O
, O
noray[.]ca O
, O
that O
O
does O
not O
exist O
. O
O
22/27 O
O
As O
the O
company O
claims O
to O
be O
based O
in O
Ontario O
according O
to O
its O
LinkedIn O
page O
, O
we O
looked O
for O
O
any O
information O
about O
it O
in O
public O
records O
for O
businesses O
in O
Canada O
. O
It O
appears O
that O
in O
2020 O
, O
O
the O
owners O
of O
Noray O
Consulting O
. O
Changed O
the O
name O
of O
the O
company O
to O
just O
O
Noray O
. O
O
This O
new O
O
company O
name O
is O
not O
related O
to O
any O
of O
the O
things O
mentioned O
in O
this O
blog O
post O
or O
, O
from O
what O
O
we O
can O
tell O
, O
is O
doing O
anything O
malicious O
. O
It O
appears O
that O
the O
actors O
are O
watching O
out O
for O
O
companies O
that O
become O
inactive O
, O
or O
in O
a O
similar O
status O
, O
then O
will O
appropriate O
these O
O
companies O
O
names O
. O
O
Internet O
searches O
for O
Noray O
Consulting O
show O
that O
its O
main O
website O
has O
a O
non O
- O
matching O
O
domain O
name O
, O
firstbyteconsulting[.]com O
. O
The O
website O
used O
to O
be O
for O
a O
company O
that O
O
specialized O
in O
project O
management O
. O
This O
domain O
appears O
to O
have O
expired O
in O
2020 O
, O
but O
was O
O
bought O
and O
repurposed O
to O
resemble O
the O
website O
from O
before O
2020 O
. O
What O
ties O
this O
domain O
to O
O
Noray O
Consulting O
now O
is O
that O
the O
address O
details O
on O
the O
website O
match O
that O
which O
is O
found O
on O
O
Noray O
Consulting O
s O
LinkedIn O
page O
: O
a O
Canadian O
company O
in O
Milton O
, O
Ontario O
. O
The O
contact O
page O
O
has O
a O
map O
that O
shows O
the O
company O
s O
location O
, O
but O
the O
map O
is O
in O
Russian O
( O
Figure O
10 O
) O
. O
This O
O
could O
mean O
that O
the O
person O
who O
made O
this O
Google O
map O
had O
their O
primary O
language O
set O
to O
O
Russian O
, O
which O
would O
be O
unusual O
for O
a O
seemingly O
Canadian O
- O
based O
company O
. O
O
Figure O
10 O
. O
Screenshot O
of O
the O
website O
s O
contact O
page O
map O
O
We O
also O
found O
that O
the O
people O
mentioned O
on O
their O
website O
are O
likely O
stock O
images O
or O
AIgenerated O
photos O
of O
people O
who O
are O
not O
related O
in O
any O
way O
to O
the O
business O
, O
as O
shown O
in O
O
Figure O
11 O
. O
O
23/27 O
O
Figure O
11 O
. O
Screenshot O
of O
the O
website O
s O
team O
members O
page O
O
Further O
investigation O
reveals O
that O
Figure O
11 O
has O
a O
number O
of O
red O
flags O
: O
O
None O
of O
these O
people O
appear O
to O
have O
real O
personas O
on O
the O
internet O
O
Reverse O
image O
search O
reveals O
these O
are O
stock O
photo O
images O
used O
on O
several O
sites O
O
Two O
members O
of O
the O
team O
have O
the O
same O
job O
title O
of O
" O
Manager O
, O
HR O
Process O
and O
O
Compensation O
" O
O
We O
have O
also O
observed O
that O
the O
text O
in O
other O
parts O
of O
Noray O
Consulting O
s O
website O
has O
been O
at O
O
least O
partially O
copied O
from O
other O
websites O
. O
This O
illustrates O
that O
these O
actors O
are O
trying O
to O
make O
O
the O
sites O
believable O
, O
offering O
what O
seems O
like O
realistic O
services O
that O
were O
lifted O
from O
real O
O
companies O
found O
online O
. O
O
Void O
Rabisu O
has O
had O
many O
lure O
websites O
that O
attempt O
to O
convince O
targets O
to O
download O
O
trojanized O
legitimate O
applications O
. O
These O
lure O
sites O
look O
legitimate O
at O
first O
, O
but O
usually O
have O
O
similar O
oddities O
on O
the O
websites O
. O
For O
example O
, O
a O
site O
that O
had O
a O
business O
address O
of O
a O
O
shopping O
mall O
, O
and O
the O
contact O
phone O
number O
of O
a O
grocery O
store O
. O
O
24/27 O
O
Figure O
12 O
. O
Screenshot O
of O
the O
contact O
information O
of O
a O
Void O
Rabisu O
lure O
site O
O
We O
can O
link O
the O
two O
Canadian O
companies O
that O
were O
used O
to O
sign O
RomCom O
binaries O
in O
the O
O
AstraChat O
campaign O
and O
a O
campaign O
against O
the O
Ukrainian O
armed O
forces O
with O
more O
than O
80 O
O
other O
mostly O
Canadian O
companies O
in O
total O
, O
based O
on O
an O
analysis O
of O
internet O
infrastructure O
. O
O
Among O
these O
80 O
other O
mostly O
Canadian O
companies O
, O
about O
two O
dozen O
companies O
were O
used O
O
to O
sign O
other O
malware O
binaries O
like O
Emotet O
, O
Matanbuchus O
Loader O
, O
BatLoader O
, O
another O
O
backdoor O
known O
as O
SolarMarker O
, O
and O
coinminers O
. O
This O
makes O
us O
believe O
that O
Void O
Rabisu O
is O
O
likely O
to O
be O
using O
a O
third O
- O
party O
service O
that O
aids O
in O
signing O
binaries O
with O
certificates O
of O
O
seemingly O
legitimate O
Canadian O
companies O
. O
O
Conclusions O
and O
Recommendations O
O
The O
war O
against O
Ukraine O
has O
made O
cyber O
campaigns O
against O
Ukraine O
, O
Eastern O
Europe O
, O
and O
O
NATO O
countries O
more O
visible O
for O
two O
reasons O
: O
the O
number O
of O
attacks O
has O
increased O
O
dramatically O
, O
and O
both O
the O
private O
and O
public O
sectors O
are O
looking O
closely O
at O
what O
happens O
in O
O
Ukraine O
. O
More O
information O
from O
intelligence O
agencies O
is O
being O
declassified O
by O
Western O
O
governments O
, O
so O
privately O
- O
owned O
companies O
can O
investigate O
further O
for O
themselves O
. O
Another O
O
important O
factor O
is O
that O
many O
actors O
who O
previously O
had O
different O
motivations O
are O
becoming O
O
more O
aligned O
towards O
the O
same O
goal O
, O
even O
when O
their O
campaigns O
do O
not O
appear O
to O
be O
part O
of O
O
a O
coordinated O
effort O
. O
O
The O
line O
is O
blurring O
between O
cybercrime O
driven O
by O
financial O
gain O
and O
APT O
attacks O
motivated O
O
by O
geopolitics O
, O
espionage O
, O
disruption O
, O
and O
warfare O
. O
Since O
the O
rise O
of O
Ransomware O
- O
as O
- O
aService O
( O
RaaS O
) O
, O
cybercriminals O
are O
now O
using O
advanced O
tactics O
and O
targeted O
attacks O
that O
O
were O
previously O
thought O
to O
be O
the O
domain O
of O
APT O
actors O
. O
Inversely O
, O
tactics O
and O
techniques O
O
that O
were O
previously O
used O
by O
financially O
motivated O
actors O
are O
increasingly O
being O
used O
in O
O
attacks O
with O
geopolitical O
goals O
. O
O
25/27 O
O
Currently O
, O
APT O
actors O
like O
Pawn O
Storm O
and O
APT29 O
, O
cyber O
mercenaries O
like O
Void O
Balaur O
, O
O
hacktivism O
groups O
like O
Killnet O
, O
along O
with O
cybercriminals O
like O
former O
Conti O
affiliates O
and O
Void O
O
Rabisu O
, O
are O
targeting O
Ukraine O
and O
its O
allies O
, O
but O
their O
campaigns O
do O
not O
yet O
look O
coordinated O
. O
O
We O
expect O
that O
significant O
geopolitical O
events O
like O
the O
current O
war O
against O
Ukraine O
will O
O
accelerate O
the O
alignment O
of O
the O
campaigns O
of O
threat O
actors O
who O
reside O
in O
the O
same O
O
geographic O
region O
. O
This O
will O
lead O
to O
new O
challenges O
for O
defenders O
, O
as O
attacks O
can O
then O
come O
O
from O
many O
different O
angles O
, O
and O
it O
will O
be O
less O
clear O
who O
is O
the O
actor O
responsible O
for O
them O
. O
O
Based O
on O
our O
analysis O
, O
we O
believe O
the O
following O
activity O
should O
be O
monitored O
in O
endpoints O
: O
O
Downloading O
and O
executing O
MSI O
packages O
that O
contain O
entries O
in O
CustomAction O
tables O
O
referring O
to O
DLL O
exported O
functions O
O
Writing O
access O
to O
SOFTWARE\Classes\CLSID\<CSLID O
> O
under O
both O
O
HKEY_CURRENT_USER O
( O
HKCU O
) O
and O
HKEY_LOCAL_MACHINE O
( O
HKLM O
) O
, O
which O
can O
O
be O
a O
sign O
of O
COM O
hijacking O
O
Initiation O
of O
localhost O
sockets O
by O
rundll32.exe O
, O
as O
RomCom O
DLLs O
are O
loaded O
by O
this O
O
process O
O
we O
observed O
that O
RomCom O
listens O
on O
the O
port O
range O
5554 O
- O
5600 O
when O
O
setting O
up O
localhost O
sockets O
O
Binary O
padding O
with O
null O
bytes O
, O
a O
known O
technique O
to O
evade O
scanners O
. O
Although O
O
RomCom O
did O
nt O
use O
this O
feature O
in O
our O
tests O
, O
it O
is O
present O
in O
command O
5 O
. O
We O
included O
a O
O
YARA O
ruleset O
to O
look O
for O
such O
files O
in O
our O
GitHub O
research O
repository O
. O
O
Binary O
padding O
with O
non O
- O
zero O
data O
, O
which O
we O
observed O
in O
one O
sample O
when O
it O
was O
O
dropping O
another O
. O
This O
alone O
is O
not O
malicious O
, O
but O
it O
is O
worth O
flagging O
once O
detected O
for O
O
further O
investigation O
. O
O
Endpoint O
solutions O
like O
Trend O
Micro O
's O
Smart O
Protection O
Suites O
and O
Worry O
- O
Free O
Business O
O
Security O
solutions O
also O
offer O
protection O
for O
both O
users O
and O
businesses O
against O
threats O
like O
O
RomCom O
. O
These O
solutions O
come O
equipped O
with O
behavior O
- O
monitoring O
capabilities O
that O
enable O
O
them O
to O
detect O
malicious O
files O
, O
scripts O
, O
and O
messages O
. O
They O
can O
also O
block O
all O
related O
O
malicious O
URLs O
. O
Additionally O
, O
the O
Trend O
Micro O
O
Deep O
Discovery O
O
solution O
includes O
an O
email O
O
inspection O
layer O
that O
can O
identify O
and O
protect O
enterprises O
from O
malicious O
attachments O
and O
O
URLs O
. O
By O
leveraging O
these O
powerful O
tools O
, O
users O
and O
businesses O
can O
effectively O
defend O
O
themselves O
against O
the O
damaging O
effects O
of O
RomCom O
and O
other O
similar O
threats O
. O
O
Indicators O
of O
Compromise O
O
Download O
the O
full O
list O
of O
indicators O
here O
. O
O
MITRE O
ATT&CK O
O
ID O
O
Name O
O
Description O
O
26/27 O
O
T1583.008 O
O
Acquire O
Infrastructure O
: O
O
Malvertising O
O
RomCom O
uses O
malvertising O
to O
redirect O
targets O
O
to O
lure O
websites O
from O
which O
to O
download O
fake O
O
installer O
applications O
O
T1566.002 O
O
Phishing O
: O
Spear O
Phishing O
O
Link O
O
RomCom O
sent O
highly O
targeted O
spear O
phishing O
O
emails O
O
T1027.002 O
O
Obfuscated O
Files O
or O
O
Information O
: O
Software O
O
Packing O
O
RomCom O
uses O
VMProtect O
O
T1027.001 O
O
Obfuscated O
Files O
or O
O
Information O
: O
Binary O
O
Padding O
O
RomCom O
uses O
binary O
padding O
on O
dropped O
files O
O
to O
avoid O
security O
solutions O
O
T1546.015 O
O
Event O
Triggered O
Execution O
: O
O
Component O
Object O
Model O
O
Hijacking O
O
RomCom O
uses O
COM O
hijacking O
for O
persistence O
O
T1571 O
O
Non O
- O
Standard O
Port O
O
RomCom O
listens O
on O
port O
ranges O
5554 O
to O
5600 O
O
for O
communication O
between O
dropped O
O
components O
O
T1071.001 O
O
Application O
Layer O
Protocol O
: O
O
Web O
Protocols O
O
RomCom O
uses O
HTTPS O
for O
C&C O
O
communications O
O
T1555.003 O
O
Credentials O
from O
Password O
O
Stores O
: O
Credentials O
from O
O
Web O
Browsers O
O
RomCom O
uses O
a O
stealer O
to O
gather O
credentials O
O
of O
several O
browsers O
O
T1113 O
O
Screen O
Capture O
O
RomCom O
can O
capture O
screenshots O
of O
the O
O
victim O
's O
machine O
O
T1219 O
O
Remote O
Access O
Software O
O
RomCom O
's O
backdoor O
has O
a O
functionality O
to O
run O
O
AnyDesk O
application O
O
27/27 O