Posts: 15,937
Threads: 10,175
Thanks Received: 9,307 in 7,453 posts
Thanks Given: 10,238
Joined: 12 September 18
24 September 19, 06:04
Quote:
Our investigation into the Dtrack RAT actually began with a different activity. In the late summer of 2018, we discovered ATMDtrack, a piece of banking malware targeting Indian banks. Further analysis showed that the malware was designed to be planted on the victim’s ATMs, where it could read and store the data of cards that were inserted into the machines. Naturally, we wanted to know more about that ATM malware, so we used YARA and Kaspersky Attribution Engine to uncover more interesting material: over 180 new malware samples of a spy tool that we now call Dtrack.
All the Dtrack samples we initially found were dropped samples, as the real payload was encrypted with various droppers—we were able to find them because of the unique sequences shared by ATMDtrack and the Dtrack memory dumps. After that, it got very interesting, because once we decrypted the final payload and used Kaspersky Attribution Engine again, we saw similarities with the DarkSeoul campaign, dating back to 2013 and attributed to the Lazarus group. It seems that they reused part of their old code to attack the financial sector and research centers in India. According to our telemetry, the last activity of DTrack was detected in the beginning of September 2019.
Technical details
The dropper has its encrypted payload embedded as an overlay of a PE file as extra data that will never be used in normal execution steps. Its decryption routine, part of an executable physical patch, begins somewhere between the start() and WinMain() functions. A fun fact is that the malware authors embedded their malicious code into a binary that was a harmless executable. In some cases, it was the default Visual Studio MFC project, but it could be any other program.
The decrypted overlay data contains the following artifacts:
* an extra executable;
* process hollowing shellcode;
* a list of predefined executable names, which the malware uses as a future process name.
After decryption of the data, the process hollowing code is started, taking the name of the process to be hollowed as an argument. The name comes from the predefined list found within the decrypted overlay. All the names come from the %SYSTEM32% folder, as you can see in the decrypted file list below.
* fontview.exe
* dwwin.exe
* wextract.exe
* runonce.exe
* grpconv.exe
* msiexec.exe
* rasautou.exe
* rasphone.exe
* extrac32.exe
* mobsync.exe
* verclsid.exe
* ctfmon.exe
* charmap.exe
* write.exe
* sethc.exe
* control.exe
* presentationhost.exe
* napstat.exe
* systray.exe
* mstsc.exe
* cleanmgr.exe
What is inside the dropper?
After execution, the target of the process hollowing is suspended until its memory is overwritten with the decrypted executable payload from the dropper overlay. After this, the target process resumes.
...
Continue Reading