'Black Ball' attack is still in progress: from anti-virus detection to installation of mining

0 23
Event Overview Open-source intelligence released an update attack event of the永...

Event Overview

Open-source intelligence released an update attack event of the永恒之蓝 mining malware downloader—'Black Ball' operation at the beginning of last month, where it was mentioned that it uses a doc document with the Office vulnerability CVE-2017-8570 as an attachment in spam emails for attacks, and then executes malicious scheduled tasks related to mining by downloading and installing them through PowerShell commands. The specific information of the related spam emails is as follows:

'Black Ball' attack is still in progress: from anti-virus detection to installation of mining

Recently, many users have been found to receive related phishing spam emails, and the detection rate of malicious email attachment samples is very low. If users are not careful to click on the email attachments, the system will be installed with a mining program, causing abnormal phenomena such as system lag. The following is an example of spam email for phishing attacks (email subject: Farewell Letter 618), it is recommended that computer users be vigilant about the security of emails when checking them.

Event Analysis

As we all know, the phishing email attachment of the 'Black Ball' operation exploits the Office vulnerability CVE-2017-8570 in the doc document. As early as 2018, the OceanLotus organization also used samples with this vulnerability for attacks. The attachment readme.doc is an RTF document that uses the vulnerability to trigger the execution of a JS script. The script then executes malicious PS scripts in memory by downloading them from a remote server using PowerShell commands, achieving the 'fileless' effect.

CVE-2017-8570

An object named QBNLaW1s7vq5bki.sct is embedded in RTF. As shown in the following figure:

There is also an OLE2Link object that contains the CVE-2017-8570 vulnerability, the specific information is as follows:

After the vulnerability is triggered, the QBNLaW1s7vq5bki.sct file will be executed, the role of which is to execute malicious PowerShell commands through CMD commands, and plant the mining program on the target device.

We can also analyze this document with tools, and at the same time, we can also see the specific object information contained in this document.

Malicious PS script analysis

From the JS script triggered by the vulnerability, we know that it downloaded 2 PS scripts, namely 7p.php and mail.jsp. The specific calling logic is to execute the malicious content of the mail.jsp script through the bpu function in 7p.php.

7p.php analysis

The content of 7p.php is a deobfuscated PS script, the specific information is as follows:

After several rounds of deobfuscation, we can find the specific content of the bpu function:

The specific function of the bpu function is to execute its parameter payload content.

mail.jsp analysis

This file is also a deobfuscated PS script, the specific content is as follows:

After 4 rounds of deobfuscation, we can see the specific and obvious malicious content.

 

Payload content analysis

We see that this script has a judgment on the scheduled task 'blackball', to see if the target device has been infected with this mining virus. The source of the 'Black Ball' operation is also the same.

Firstly, it will judge whether there are anti-virus products installed in the system. If there are, they will be automatically uninstalled. The anti-virus products include ESET, Kaspersky, and AVAST, etc.

Then check if there is a 'Black Ball' scheduled task. If there is, do not perform malicious actions, indicating that the system has been infected with this mining virus before. Otherwise, perform subsequent malicious operations related to the registry, services, and files of the mining program (for details, refer to the relevant mining program analysis released by Tencent).

The C2 address has not changed, as follows:

Delete scheduled tasks and related settings such as system firewall.

Reference information

The BlueKeep trojan downloader launches the 'Black Ball' operation, adding SMBGhost vulnerability detection capabilities

https://mp.weixin.qq.com/s/QEE95HTKzuT4-NykfvHfGQ

IOC information

URL

hXXp://t.amynx.com:80/mail.jsp?doc_0.7?XXX

hXXp://t.amynx.com:80/7p.php?0.7*mail_docXXXXXXX

t.zz3r0.com

t.zer9g.com

t.amynx.com

SHA-1

237BB7DC21CC27D2FEC70027078E6EC2FA33F61D

你可能想看:

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

2025 latest & emulator WeChat mini-program packet capture & mini-program reverse engineering

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

How to use Acheron to modify Go programs and try to bypass antivirus product detection.

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

最后修改时间:
admin
上一篇 2025年03月24日 21:13
下一篇 2025年03月24日 22:10

评论已关闭