SapphireStealer Sneaks In: Deceptive Legal Documents Prey on Russians
2024-3-7 00:1:18 Author: cyble.com(查看原文) 阅读量:21 收藏

Key Takeaways

  • Cyble Research and Intelligence Labs (CRIL) encountered an executable file obtained from a deceptive URL masquerading as a fake Russian government site, possibly distributed via spam emails.  
  • The downloaded executable file is identified as SapphireStealer, disguised with a PDF icon, designed to deceive users into believing it is a PDF document. 
  • Upon execution, the executable file drops and displays the embedded lure PDF document within it, leading the user to believe that they have opened a genuine PDF file. 
  • The lure PDF contains scanned images of documents, one resembling a guideline for enforcing a court order against a debtor, while the other mimics a subpoena summoning an individual as a witness in a Russian administrative violation case. 
  • However, in the background, SapphireStealer collects sensitive information, including login credentials from various browsers, web data, local state, network cookies, and more from the victim’s device. 
  • Finally, the malware sends the pilfered data to a Command-and-Control (C&C) server in the form of a compressed ZIP file. 
  • The Threat Actor (TA) behind this campaign remains unknown due to the lack of available information. 

Overview

In late February, CRIL observed a campaign that targets Russian individuals with the information stealer malware known as “SapphireStealer.”  The SapphireStealer is an open-source information-stealing tool previously documented by Talos researchers. Since its initial public release in December 2022, it has been increasingly seen across various public malware sources. 

Threat Actors (TAs) responsible for this campaign remain unidentified. We suspect the campaign begins with a spam email containing a link that leads to downloading an executable file (disguised with a PDF icon to deceive the recipient into thinking it is a PDF document) from a fake Russian government website URL.  

The downloaded executable is identified as SapphireStealer that propagates from a counterfeit Russian government website (govermentu[.]ru) and is downloaded from the following URL: 

  • hxxp://govermentu[.]ru/media/FederalnoeUpravlenie_postanovlenie_o_vozbuzdenie_ispolnitelnogo_proizvodstava[.]exe 
Figure 1 Legitimate Fake Russian government website

Figure 1 – Legitimate & Fake Russian government website 

The translated name of the downloaded file indicates that it relates to a resolution issued by a federal administration regarding the initiation of executive proceedings. 

Upon running the executable file, it drops and opens a PDF document named “Постановлениe.pdf” (translated as: Resolution.pdf) while concurrently doing a covert data stealing operation in the background.  

The lure pdf contains a scanned image of the document, which serves as a guideline for the recipient to carry out their duties in enforcing the court order against the debtor, as shown in the figure below. 

Figure 2 Lure PDF document

Figure 2 – Lure PDF document 

The following image displays another bait PDF utilized in this campaign named “Повестка.pdf” (translated as: Agenda.pdf), which is dropped and opened upon the execution of the “FederalnoeUpravlenie.exe” file.  

This lure PDF also contains a scanned image of the document, which is a subpoena issued by a court in Russia, summoning an individual as a witness in a case involving an administrative violation. 

Figure 3 Lure PDF document

Figure 3 – Lure PDF document 

TAs are using deceptive legal documents in this campaign, which are used to implant fear and urgency in recipients, compelling them to take immediate action. These documents often contain threats of legal consequences with the fabricated legal matters. Recipients may be psychologically manipulated into opening attachments or clicking on links, exposing themselves to malware or phishing attempts. 

Technical Analysis

The file “FederalnoeUpravlenie.exe” is a .NET executable, protected and obfuscated using .NET Reactor. It bears a PDF icon and has an approximate size of 1MB, as shown in the figure below.

Figure 4 Icon of the Stealer file

Figure 4 – Icon of the Stealer file 

Upon execution of the exe file, it begins by running the Main() function. This function initially retrieves an embedded PDF content from the .NET resource, saves it with the filename “Повестка.pdf”, and subsequently opens it using Process.Start(). This action displays the deceptive PDF document to the user, creating the illusion that they have opened a genuine PDF file, as shown in the below process tree. 

Figure 5 Process tree

Figure 5 – Process tree 

The figure below shows the code snippet of the de-obfuscated Main() function, which drops and executes the lure PDF document for the victims. 

Figure 6 Main function of the Stealer

Figure 6 – Main() function of the Stealer 

The following figure depicts an embedded lure PDF content within the .NET resource named “Повестка_от_390”. 

Figure 7 Embedded lure PDF inside malware file resource section

Figure 7 – Embedded lure PDF inside malware file resource section 

After dropping and displaying the deceptive PDF, the malware commences its covert stealing operations by using the method, Class1.Log() in the background, unbeknownst to the victim, as shown below. 

Figure 8 Code snippet responsible for Stealer functionalities

Figure 8 – Code snippet responsible for Stealer functionalities 

The malware incorporates several encrypted strings. Throughout its code, the stealer employs the StringCipher.Decryptasdfasdfasdfs() function to decrypt and access necessary strings such as the name of folders created by the malware, file extensions to target, paths of browsers for stealing sensitive data, etc. This function decrypts ciphertext utilizing AES encryption, employing a specific key derived from a random number and salt, ultimately returning the decrypted plaintext.  

The figure below shows the code snippet of the Decryptasdfasdfasdfs() function. 

Figure 9 Code used to decrypt the encrypted strings used by the stealer

Figure 9 – Code used to decrypt the encrypted strings used by the stealer 

When the function Class1.Log() is executed, it primarily invokes another significant method named Log2() within the class named “InstanceOfClass,” as shown in the figure below. This method carries out the core activities of the stealer, including the extraction of sensitive data, which is subsequently sent to the threat actor. 

Figure 10 SapphireStealer Operation code snippet

Figure 10 – SapphireStealer Operation code snippet 

The steps detail the operations performed by the InstanseOfClass().Log2() method are outlined below. 

  • Initially, it acquires the path for the Temp folder and establishes a directory named as “sapphire” (designated as malware directory). 
  • Following that, within the malware directory, it creates subfolders titled “GrabbingFiles” and “FileZilla.” 
  • Then, it calls the method Class4.smethod_0() which verifies the existence of a specific directory (Telegram Desktop/tdata). If the directory exists, it copies key data files from it. Subsequently, it creates a new folder named “Telegram” within a malware directory and saves the copied files. 
  • Afterward, it calls upon the method Class6.smethod_0(), responsible for copying files such as Login Data, Web data, Local State, and Network Cookies from installed browsers on the system and creating folders named <browsername1> and <browsername2> within the “sapphire” directory to save the copied files. The figure below shows the targeted browser by the SapphireStealer malware. 
Figure 11 Targeted browsers their paths of the Stealer

Figure 11 – Targeted browsers & their paths of the Stealer 

  • Next, it invokes the function Class3.smethod_0(), which retrieves files with the extension shown in the below figure from the Desktop folder and copy them to the “GrabbingFiles” folder within the malware directory. 
Figure 12 Targeted extension for Grabbing files operation

Figure 12 – Targeted extension for Grabbing files operation 

  • In addition to grabbing desktop files, the stealer gathers all files within the FileZilla folder located at “Environment.SpecialFolder.ApplicationData” and the .ssh folder from the path “Environment.SpecialFolder.UserProfile”. It then copies these files to their corresponding folders within the malware directory. 
Figure 13 SapphireStealer malware directory

Figure 13 – SapphireStealer malware directory

  • Subsequently, it iterates through all the copied files within the malware directory, generating an XML summary file as shown below, and compresses it into a ZIP archive. It creates a GUID and saves the ZIP file with that ID name. 
Figure 14 Summary of the stolen details

Figure 14 – Summary of the stolen details 

  • After that, it collects user system information like IP address, MAC address, and Hostname. Finally, it sends the ZIP archive file with the above victim’s system information to the TAs Command-and-Control (C&C) server and deletes the ZIP archive file, as shown in the code snippet below. 
Figure 15 Code snippet for Exfiltration

Figure 15 – Code snippet for Exfiltration 

The network traffic depicted in the following figure illustrates the communication between the victim’s system and the remote server, facilitating the exfiltration of the stolen data. 

Figure 16 – Network details of Exfiltration to CC

Figure 16 – Network details of Exfiltration to C&C 

Conclusion

Threat Actors choose sensitive or official documents as lures due to their ability to manipulate emotions, create an illusion of authenticity, and attract a wide range of targets. This calculated use of social engineering techniques enhances the success of malware campaigns by helping attackers evade detection, as they masquerade as trustworthy and benign entities.  

In this malware campaign, TAs are focusing on Russian individuals, utilizing a masqueraded Russian government website to distribute the malware, along with deceptive PDF documents written in Russian to mislead victims. Upon successful execution, the user becomes infected with the SapphireStealer, which then proceeds to extract sensitive information and send it to a remote server. 

CRIL meticulously monitors the latest phishing or malware variants circulating, delivering timely analyses with actionable insights. This data aids users in fortifying their defenses against potential threats and attacks. 

Our Recommendations

  • The initial entry point may originate via spam emails. Therefore, it’s advisable to deploy strong email filtering systems to identify and prevent the dissemination of harmful attachments. 
  • When handling email attachments or links, particularly those from unknown senders, exercising caution is crucial. Verify the sender’s identity, particularly if an email seems suspicious. 
  • Deploy strong antivirus and anti-malware solutions to detect and remove malicious executable files. 
  • Enhance the system security by creating strong, distinct passwords for each of the accounts and, whenever feasible, activate two-factor authentication. 
  • Set up network-level monitoring to detect unusual activities or data exfiltration by malware. Block suspicious activities to prevent potential breaches. 
  • Regularly back up data to guarantee the ability to recover it in case of an infection and keep users informed about the most current phishing and social engineering methods employed by cybercriminals. 

MITRE ATT&CK® Techniques

Tactic  Technique  Procedure 
Execution  (TA0002) Exploitation for Client  
Execution (T1203
TAs uses lure PDF document execute the  
malicious code. 
Defense Evasion (TA0005) Masquerading (T1036
 
TAs uses fake Russian government site  
to spread malware. 
Icon mismatch, binary includes an Icon  
from a different legit application in  
order to fool users. 
Defense Evasion (TA0005) Obfuscated Files or  
Information (T1027
Binary may include packed or crypted  
data. 
Defense Evasion (TA0005) Software Packing (T027.002Binary may include packed or crypted  
data. 
Defense Evasion (TA0005) Deobfuscate/Decode Files or Information (T1140Decode data using Base64 in .NET 
Credential  
Access (TA0006
OS Credential Dumping 
(T1003
Tries to harvest and steal browser  
information (cookies, passwords, etc) 
Discovery  
(TA0007
System Information  
Discovery (T1082
Queries the system information  
(host name, IP address, etc). 
Discovery  
(TA0007
File and Directory Discovery 
(T1083
Stealer enumerate files for grabbing. 
Collection 
(TA0009
Data from Local System 
(T1005
Tries to harvest and steal browser information (cookies, passwords, etc) 
Collection 
(TA0009
Archive Collected Data 
(T1560
Stealer compress the stolen data with  
ZIP extension. 
C&C 
(TA0011) 
Application Layer Protocol 
(T1071
Malware exe communicate to C&C server. 

Indicators of Compromise (IOC)

Indicators  Indicator 
Type 
Description 
5c025a9e86a125bf2f2ca5c1b29b42a6 
6b44ab6c246c077ee0e6f51300654b3eec2fddc7 
850a99d2039dadb0c15442b40c90aa4dac16319114455ab5904aa51e062fe6e1 
MD5 
SHA1 
SHA256 
Sapphire 
Stealer exe 
55bb772aea4303ca373fd8940663b6bd 
b396a8d5e30fb179f3139d28b843b57bb8ae3f47 
c816d0be8d180573d14d230b438a22d7dda6368b1ef1733754eda9804f295a2f  
MD5 
SHA1 
SHA256 
Sapphire 
Stealer exe 
govermentu[.]ru Domain Phishing site 
hxxp://govermentu[.]ru/media/FederalnoeUpravlenie_postanovlenie_o_vozbuzdenie_ispolnitelnogo_proizvodstava[.]exe URL Malware 
download URL 
193.39.185[.]4 IP C&C 

References

https://blog.talosintelligence.com/sapphirestealer-goes-open-source

Related


文章来源: https://cyble.com/blog/sapphirestealer-sneaks-in-deceptive-legal-documents-prey-on-russians/
如有侵权请联系:admin#unsafe.sh