EHA
Home Cyber Attack Hackers Weaponize MSI packages & PNG Files to Deliver Multi-stage Malware

Hackers Weaponize MSI packages & PNG Files to Deliver Multi-stage Malware

0

A newly uncovered cyberattack campaign has been targeting organizations in Chinese-speaking regions, including China, Hong Kong, and Taiwan, experts from Intezer Labs revealed.

The operation, attributed to the notorious Silver Fox advanced persistent threat (APT) group, involves the deployment of sophisticated malware such as ValleyRAT, delivered via a novel, multi-stage loader named PNGPlug.

Intezer Labs researchers detailed how this attack begins with phishing websites designed to trick users into downloading malicious Microsoft Installer (MSI) packages disguised as legitimate software.

Once executed, these installers deploy benign applications to deceive victims while surreptitiously extracting an encrypted archive that contains the malware payload.

A critical part of the attack chain is the PNGPlug loader, which leverages padding and file inflation techniques to evade detection by security systems.

The loader sets up the environment for malware execution, utilizing files masquerading as PNG images to conceal malicious payloads.

These encoded PNG files are used to inject components into memory, further enhancing the stealth and sophistication of the operation.

ValleyRAT: The Core Malware

The attack culminates in the deployment of ValleyRAT, a highly advanced malware with multi-stage functionality.

ValleyRAT implements various techniques to avoid detection, including shellcode execution, obfuscation, privilege escalation, and persistent mechanisms, such as registry modifications and scheduled tasks.

The malware fetches additional components from its command-and-control (C2) servers, enabling attackers to maintain prolonged access to compromised systems.

Role of the PNGPlug Loader

The PNGPlug loader, a critical element of the attack, demonstrates significant adaptability. Its functions include:

  1. Memory Injection: Modifications to memory, such as patching ntdll.dll, allow seamless injection of the malware payload.
  2. Custom Commands: Depending on the presence of specific arguments, the loader performs distinct actions, including decrypting registry paths or executing payloads.
  3. Anti-Virus Evasion: The loader evades detection by checking the absence of common antivirus software like 360 Total Security.
  4. PNG-Based Payload Delivery: Malware payloads are encoded within PNG file formats, a stealth tactic to bypass security mechanisms. These files mask executable code, loaded into memory during execution.
Binwalk output for one of the PNG files used by the loader, demonstrating that it has a Windows executable (PE) at offset 0x2AB9E.
A function in the loader that handles the mapping of the PNG file into the memory. Specifically, it looks for the data that begins at offset 0x2AB9E in the PNG file.

Attribution and Significance of the Campaign

Evidence strongly points to Silver Fox, a threat group notorious for espionage and cybercrime campaigns targeting Chinese-speaking entities.

Their tactics include phishing schemes with trojanized files and SEO-optimized phishing sites. The group has previously been linked to advanced espionage tools like ValleyRAT and Gh0st RAT.

What makes this campaign particularly significant is its unique focus on Chinese-speaking victims across regions with distinct political and social landscapes, including Hong Kong and Taiwan.

Despite geopolitical differences, the attackers appear to treat these areas as a unified target, suggesting an advanced and region-specific threat strategy.

  1. Chinese-Speaking Focus: This attack underscores a growing trend of region-specific targeting that bypasses conventional geopolitical boundaries.
  2. Sophisticated Techniques: The use of legitimate software to mask malicious activities and the innovative PNGPlug loader highlight the attackers’ technical prowess.
  3. Operational Gaps in Security: The reliance on free software by some organizations has inadvertently increased vulnerability to such sophisticated attacks.

The researchers identified key technical artifacts associated with this campaign, including a wide range of malicious file hashes and IP addresses linked to the attackers’ infrastructure.

  • IP Address: 156.247.33[.]53
  • Key Hashes:
  • 08dad42da5aba6ef48fca27c783f78f06ab9ea7a933420e4b6b21e12e550dd7d
  • 33bc111238a0c6f10f6fe3288b5d4efe246c20efd8d85b4fe88f7d602d70738e
  • (More hashes listed in the report)

This campaign serves as a stark reminder of the sophisticated nature of modern cyber threats, particularly those targeting specific demographics or regions.

Organizations operating in Chinese-speaking areas are urged to adopt robust cybersecurity protocols, invest in employee training, and implement advanced threat detection systems to mitigate the growing risks posed by groups like Silver Fox.

As threat actors continue to refine their tactics, the cybersecurity community must remain vigilant and proactive in responding to evolving attack vectors.

Also Read:

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version