Details
Due to the large infection chain this malware utilizes, we begin today's analysis with a roadmap. During the course of this analysis, it may be useful to reference this image:We begin by opening the PDF and are greeted with a familiar phishing message stating our document is secured and we must click the link to view the complete document:
Executing the extracted EXE unleashes the large infection chain mentioned at the head of the article dumping out 4 executables, 3-4 scripts, 2 FTP credential files, 1 template, and 1 blank picture .
This chain begins by launching one of two batch files "abb1.bat" or "havv02.bat" that will then launch "Adob9.vbs"
"hvv03.bat" also establishes persistence via the CurrentVersion/Run key.
Further down the script the author retrieves the user's IPCONFIG information and writes it to the file "adip2.klc". It also instructs the dropped file "adbr01.exe" to write the credentials to "011.011":
Next the script will disable firewall rules and set the naming scheme for user dumped credentials with the current date:
Opening one of these files reveals the format in which user credentials are stored:
These credentials are also stored on the local machine in the same directory as all the dropped files: C:\user\current\appdata\local\4Adobe\4low . This directory may change per infection.
The programs responsible for the credential stealing and exfiltration are "Breader.exe", "adbr01.exe", and "adbr02.exe" and all are UPX packed. These seem to be individually targeted for specific browsers (Internet Explorer, Chrome, Firefox) although this is just an assumption as analysis was not performed on these files. Due to the high rate of detection for the EXE's, this article focused on dissecting the large infection chain and uncovering the victim data repository rather than reversing the EXEs.
DROPPED FILES
CCGT-NUEVA RENCA-POWER PLANT-PJT-CHILE-REQUEST FOR QUOTATION.zipCCGT-NUEVA RENCA-POWER PLANT-PJT-CHILE-REQUEST FOR QUOTATION.exe
245.jpg
abb1.bat
sun.afr
870.afr
launch.vbs
hvv02.bat
hvv03.bat
Adob9.vbs
Adobeta.exe
Breader.exe
adbr01.exe
adbr02.exe
112.112
PROTECTION
There are many VirusTotal results for all stages of this file. Your home antivirus solution should detect the majority of this credential stealer and its variants. Network traffic consists of standard FTP communications.If your email client or server offers attachment blocking by extension, you may want to block emails sent with .EXE, *.BAT, *.CMD, *.SCR and *.JS. files attached.
Make sure your operating system displays file extensions. This helps to identify the true type of a file in case of dual extension spoofing (e.g. “INVOICE.PDF.EXE” is not displayed as “INVOICE.PDF”).
If you frequently and legitimately receive this type of files, check who the sender is and if there is anything suspicious, scan the message and its attachments with reliable security solution.