Gh0st RAT – Active IOCs
January 23, 2025Critical Zero-Day Vulnerability Discovered in SonicWall SMA 1000 Series
January 23, 2025Gh0st RAT – Active IOCs
January 23, 2025Critical Zero-Day Vulnerability Discovered in SonicWall SMA 1000 Series
January 23, 2025Severity
High
Analysis Summary
Cybersecurity researchers have unveiled a new BackConnect (BC) malware developed by threat actors associated with the infamous QakBot loader. BackConnect is a modular tool used by cybercriminals for maintaining persistence and performing various malicious tasks, including remote access and proxying.
According to the researcher, two BC modules in use, DarkVNC and IcedID BackConnect (KeyHole), were linked to the same infrastructure responsible for distributing ZLoader malware. ZLoader has also been updated to use DNS tunneling for command-and-control (C2) communications, emphasizing the evolving sophistication of these threats.
The QakBot loader, initially designed as a banking trojan, has evolved into a versatile tool for deploying ransomware and other malware. Despite a major operational disruption in 2023 during the "Duck Hunt" law enforcement operation, sporadic QakBot campaigns persist. A standout feature of QakBot, alongside IcedID, is its BC module, which facilitates host proxying and provides remote access via an embedded VNC component. The researcher's analysis highlights that the BC malware not only includes references to older QakBot samples but also boasts enhanced functionalities, such as autonomous system information collection, further enabling threat actors to exploit compromised systems.
Sophos independently analyzed the BC malware and attributed it to threat cluster STAC5777, which overlaps with Storm-1811, a group known for deploying Black Basta ransomware using Quick Assist and tech support scams. Another related group, STAC5143, potentially tied to FIN7, has been observed employing email bombing and vishing through Microsoft Teams to trick targets into granting remote access. These attacks exploit the default configuration of Microsoft Teams, which allows external users to initiate chats and meetings. Both groups have used Python backdoors and ransomware like Black Basta, showcasing their reliance on advanced social engineering tactics.
The interconnected nature of these operations indicates a robust cybercrime ecosystem. Researchers suggest that QakBot developers are supporting Black Basta operators with new tools, including the BC module. This collaboration aligns with Black Basta’s history of using QakBot for ransomware deployment and their recent distribution of ZLoader. The BC module’s emergence underscores the increasing sophistication and adaptability of cybercriminal groups, with modular malware like BackConnect playing a central role in advancing their malicious campaigns.
Impact
- Information Theft
- Privilege Escalation
- Unauthorized Access
- Financial Loss
Indicators of Compromise
IP
146.19.128.138
MD5
a4e3345491eaca250f1cc139db05a015
b15afa16da42bc65167060caed1835a4
e147175ce4b1bb10d1f7fbc5c40d438c
ba5704d005e8c378dc48bdbcb00c1314
5e115cc39c58d80153ace90ff2792ef5
SHA-256
22c5858ff8c7815c34b4386c3b4c83f2b8bb23502d153f5d8fb9f55bd784e764
98d38282563c1fd09444724eacf5283626aeef36bcb3efa9d7a667db7314d81f
c8bddb338404a289ac3a9d6781d139314fab575eb0e6dd3f8e8c37410987e4de
a197804c6ae915f59add068e862945b79916c92a508c0287a97db718e72280a3
4cad17ef867f03081eb690b1c16d7f4d5c937c3f20726af0442d7274413e3620
SHA1
f09804b59a3aac7c1dd47c7e027182fb54f9a277
7eb964f0f14c915d0112a2211c4c1ac8eeccba99
f4311944e910008c9b6f5adc8aee20dadd48634c
b78f573f5ae8684cc5a5b12f2827c0cee2a309d7
24aa8782c7ffee3b2acc50ed8d3fcf0f4677cf2e
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution. Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software in a timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Restrict the use of remote desktop services like Quick Assist and VNC to authorized users only. Disable unused services and enforce multi-factor authentication (MFA) for all remote access tools to prevent unauthorized entry.
- Develop and regularly test a comprehensive incident response plan to minimize downtime and damage in the event of a malware attack. Include specific steps for isolating infected systems, analyzing malware, and restoring operations securely.