Rewterz
Rewterz Threat Alert – Malicious Payloads – Hiding Beneath the WAV
October 17, 2019
Rewterz
Rewterz Threat Alert – Fake Amazon AWS Suspension Emails for Unpaid Bills
October 17, 2019

Rewterz Threat Alert – TA505: Get2 Downloader Distributes New SDBbot Remote Access Trojan

Severity

High

Analysis Summary

TA505 is sending email campaigns that attempt to deliver and install Get2, a new downloader. It later downloads FlawedGrace, FlawedAmmyy, Snatch, and SDBbot (a new RAT) as secondary payloads. TA505 continues to focus on targeting financial institutions. New Microsoft Office macros are used specifically with the Get2 downloader. Tens of thousands of emails attempting to deliver Microsoft Excel attachments with English and Greek lures have been detected in October 2019. These emails targeted financial institutions in Greece, Singapore, United Arab Emirates, Georgia, Sweden, Lithuania, and a few other countries.

The new Get2 loader works in conjunction with a new Microsoft Excel macro. Get2 is embedded into the Microsoft Excel file as an object, which can be found as an image icon by scrolling through the document. The downloader collects basic system information and sends it via an HTTP POST request to a hardcoded command and control (C&C) server. It then downloads SDBbot which is a new remote access Trojan (RAT) written in C++ that has been delivered by the Get2 downloader in recent TA505 campaigns. It also makes use of application shimming for persistence.

Impact

  • Information Theft
  • Unauthorized Remote Access

Indicators of Compromise

Domain Name

  • drm-server13-login-microsoftonline[.]com
  • windows-cnd-update[.]com
  • windows-se-update[.]com

Email Subject

  • “HPE INV-02 – Invoice and documents”,
  • “Need to Apply”,
  • “Account opening form”,
  • “Reçu de paiement”,
  • “Admin shared “request[.]xls” with you”

MD5

  • db0ae873a7466ba62bb8fb4ac7aeddd1
  • 63ab811d50b71ae4c3a50962266d1601
  • 562c98c718fd20d9e5373e2a026614b8
  • d624eb04fa6e53a7bf34d9cbe82f5905
  • 22a1d7a348ddc32ae9aaaebfaf9dcce7
  • 889b1519c8fcddde0ae48ba09e87e92e
  • 09548c3cba7dd1965f35baa72fba9e91
  • 1f72054db015765232f83e9c2e14ece9
  • af8078945b09285e0993b83f625b237e
  • 64d3cc1e49273d3356af736922c89dfa
  • 0c21021ccfe79c45dd327904843f9ed8
  • 3e86fa3cf8cd2f242e9822e6d02e5fc8
  • 2583a5ed70dcec569898071601682277
  • 971571a2883f7b5d339e38f9f2ad7a5c
  • 236ade08ae0ec0604632ca6fc9fa3bc8
  • 3766034b489ed6bb13cd552a9ed4e948
  • 2a467673b6a97108efc8fbcb03622487

SH256

  • c5a670d2111c9b89ab2f7b68da455c5889e92a170b879caf87593172be956c43
  • cc136c94bdd63d3b4a2251922afa922db7c570186957f743a46ff74c1a57f597
  • 47fcafa29d3610f5ec276d7b6cdb3e4a7ae1f8a24762a56acc080be69a8667c1
  • a4a8bd82b198b2971b17ca8f63a431b461423c92277dc4f8a285bae10391cd4e
  • 9bd1fb9ce2b700c0b8da1a184a072ad966da3a89dbaea1e85f432c34c0f2f615
  • ff2f46ca0fb425eaea52a71c3126ef13280be3ab4f81dc165920b46e55948d6c
  • ffbc75f41d95d14da3b6c40f9f90109459427a3c29b3a8c1fdefb0fec1578513
  • 84f7c3fcf3a53f37ecbb21d0b9368d332901fe8c3f06b3d1a92123479c567c95
  • cfce53335bbe61de612353cdd83ce17953b1f230c576ed6de1463626aff9088e
  • 99c76d377e1e37f04f749034f2c2a6f33cb785adee76ac44edb4156b5cbbaa9a
  • c2f99a2bba225fe3ab49cb952e418b2ab29ba7f2e34db6cf9bc51b0349d0acd8
  • f4fed12625e2b983b918f239bf74623746cfc6b874717e6d8dd502a45e073d32
  • 0683d9f225d54d48081f53abd7d569b32bc153d98157a5a6b763bc3cf57a6ad6
  • e3ec2aa04afecc6f43492bfe2e0d271045ab693abfa332a2c89a5115ffe77653
  • 34f3733177bbe3d7a8d793fe3c4fd82759519ddc6545b608613c81af9019a52d
  • 4efcc22da094e876346cff9500e7894718c8b6402ff3735ea81a9e057d488849
  • f27c5375046c734dfe62d2efe936b92cd519da091d04f22db713514caafece2a

Remediation

  • Block the threat actors at their respective controls.
  • Do not download files attached in emails coming from unknown sources.
  • Do not enable macros for files downloaded from untrusted sources.