“Fileless Malware” with a New Form of Cover-Up

Home/IOC's, Malware, Security Update, Software Issues, Tips/“Fileless Malware” with a New Form of Cover-Up

“Fileless Malware” with a New Form of Cover-Up

Researchers have discovered a new malicious campaign using a never-before-seen technique for injecting Fileless malware on target systems.

Fileless malware are far from traditional malware that exploits executive files to infect systems, while the Fileless malware infiltrates servers’ Random Access Memory (RAM) of the targeted systems.

Flow of Fileless malware

The initial step was to lure the target to download the zipped archive of the purported security testing tools – Cobalt Strike and Silent Break.

The threat actors then use these security tools to inject more modules into windows trusted software to run malicious codes in the system.

What piqued our attention was the very targeted nature of the campaign and the vast set of tools in use, including commercial ones.” Said Researcher, Denis Legezo

There were several anti-detection techniques involved but the most innovative technique is to hide the next stage malware as “8KB blocks of divided parts” in the binary part of Windows Event logs.

Next, a launcher is dropped into the Windows Tasks directory. “At the entry point, a separate thread combines all the aforementioned 8KB pieces into a complete shellcode and runs it,” the researcher wrote.

The other anti-detection decryptors were different compilers, Digital certificates-without legitimate software signature.

The final step is a Trojan with two communication mechanism,

  • HTTP-based
  • Named pipes-based 

The attacks made by fileless malware leave no trace on the systems they infect, as all malicious activity is performed directly in RAM and no files are written to the hard drive.

With no trace left behind, the threat actor is able to evade the detection of signature-based antivirus software and many other security solutions.

“Along with the aforementioned custom modules and techniques, several commercial pentesting tools like Cobalt Strike and SilentBreak’s toolset are used.” Said Researcher Legezo.

Mitigations

  • Use a reliable endpoint security solution.
  • Install anti-APT and EDR solutions.
  • Provide your security team with the latest threat intelligence and training.
  • Integrate endpoint protection and employ dedicated services that can help protect against high-profile attacks.

Indicators Of Compromise

Dropper

MD5SHA1SHA256
345A8745E1E3AE576FBCC69D3C8A310BAF96578D7514826D4AD14EEF14FABB967FB1A87D5A17247C0ED62C4EFAA68F8AA14F407A2925DAB48D6441DB0FBCDCF9FEF18AF9
822680649CDEABC781903870B34FB7A75904CEF25E3A6D55D782038B3A63E2F4192B487F9C952008BA0E763B519B298A966D6B27E43283D87D793A18613F32982B7FAC16
EF825FECD4E67D5EC5B9666A21FBBA2A3B43B4B72301CEFCBC535D0603FAA138C2F30888CD6DEDE5C6972E7A8E2D8D3166D41FCC9BF6670943F902041171D617FA7984B4
FA5943C673398D834FB328CE9B62AAAD43E4C15E949AFE44EAA61CA2A6A64B0EFF63E7196AB8FE97E67DEEDF572E6A04F1FA1B6B6390BE96D27D971C07B738BD0A576513

Logs code launcher

MD5SHA1SHA256
2080A099BDC7AA86DB55BADFFBC715667BAAD47EE9D0D705C96E3AE771FFD3FA2CD18EA91B9283B51F7F23F101F40BC8AF2C1A10837416A56DBDDDECE47EB340CD4EEF97
0D415973F958AC30CB25BD845319D96039955CBC7AAF4F10755D3131D0E1DDAEA9BF7B690404FD47A4B4E640E76847976A39FA71D571C0C48DE7B19CF9A5006DDDB26BDB
209A4D190DC1F6EC096857890592064196270DD4485D5FD3C6004954B3559E85F0717084356483C3708313A9ED4E789758377BEDA75A510EC3559B1067451885C8AA924F
E81187E1F2E6A2D4D3AD291120A42CE7496611B79FA078D8FB7AE4C0209BA3A85E928BF36BF4DFF209B64C6A4547D20687C450731362A2C728B8A7B7EFCD54B581689A13

HTTP Trojan

MD5SHA1SHA256
ACE22457C868DF82028DB95E5A3B7984D4B1643EB01E0F868F5CCF877FCFDB28B81C027D84F76A6710E539425938EE9D3ED772B958232FAEFF67B0A53123A882EF13CF2C
1CEDF339A13B1F7987D485CD80D141B60BCDD50563CBE57EF63F7189FC48C84A1F1C76264A8D933F20ADDB023D8C2B02598B163D5287E0B3F4793F4AAE7BEFB88C337DBC
24866291D5DEEE783624AB51516A078F5B3BD7EC0409B118589676339D5747FD4C2B63FFB9B6FD29FCC37F5107BD39CBF49B0C5F791795B88E3910E53EB1CDDE743B725A
13B5E1654869985F2207D846E4C0DBFD75FEE85FEE9167848F5C8BC8CD92CC51CAFE2F13E13F5C4A5B8FE51DC2C83C9F7DA9AE10921384A5A37DE1B041FAFD5B8C41AF53

Named pipes trojan and similar

MD5SHA1SHA256
59A46DB173EA074EC345D4D8734CB89A95570499AF45DD54AF5A1CBA81B40571B242BB57729FE28BD5B4E9EBC2E078A52D91D5609A7AFA62E66F70E99D1BB27F74D8EEB5
0B40033FB7C799536C921B1A1A02129FED2872F8B6FBEBE84DCC5CD05836E7A75A934980BACE18CD34504F70B1A79ACF2A3A5DD44768EE6B8318FDA53CE09833D4B85930
603413FC026E4713E7D3EEDAB0DF5D8DED93E26626B1BBE83FFE5DD39EEABC5FE9B80AB9B9C3626678C3B260E20F04B9B95A06F713F573EFCA4C4B49BF5B0A6FA1458BB2

Anti-detection Wrappers / Decryptors / Launchers, not malicious by themselves

MD5SHA1SHA256
42A4913773BBDA4BC9D01D48B4A7642FB44D98554FAADF32A2915905D0E53F9360B8096672B8468D64D16AF58BD0FEB5534B8097C76ED7DE4E325F6FE6700FC777BEDE9A
9619E13B034F64835F0476D68220A86B6EE4A514BE5E7034FEEB8AFC500BF65F74242F182CB8AE508859CA2A8E683CFB096B5E975252BD7950F06CAC06DAE8BFD34C592C
0C0ACC057644B21F6E76DD676D4F2389C33C6D7412F3231B3C735FB2A16284F1133C0D0589C7EB2EAC726EC7FF216F00EF0E3C3EAB215B5D98E54A5435073E83F388BC26
16EB7B5060E543237ECA689BDC7721486E1281A07123C262F5118C895FBEE7CAA188ED2D3B6EC690E2741E1EAE725B88B73B55F087007A675D4BA30CE36F6265CA277F7E
54271C17684CA60C6CE37EE47B5493FB527D1CD145409101C99F8B508002CE6EEBEBA70F79DD4E8F27B834C818417BD1977255A21CA456EB2B7C6973C8EEB94D5BB0071F
77E06B01787B24343F62CF5D5A8F99959D6A3DF1AA17428B39F9FC7A7DE56A494CDAB5A3CDEB35F8C3FA1369621646F264E3316B9663F5FA8DCE3DA008D685A511CB3EEF
86737F0AE8CF01B395997CD5512B8FC842A64E2D0402DE59B29641F62A7504410699B49667C19046519507ED8035236A806C0B5E59E23DC5E8BF57EB7C9C5C4319D850CD
964CB389EBF39F240E8C474E200CAAC35F04597434BA235D2645161BDF0DCEE97EF30A2E29823DFD7766CFD4563E4C1781B5F29CB768DF69164D05D9C28A3FACFB68FB9D
59A46DB173EA074EC345D4D8734CB89A95570499AF45DD54AF5A1CBA81B40571B242BB57729FE28BD5B4E9EBC2E078A52D91D5609A7AFA62E66F70E99D1BB27F74D8EEB5
A5C236982B0F1D26FB741DF9E99250180D55BC45FECE47262939CB0B207879C25A4FC76E2158739477B3C3653361B275F0318E535F383C80655DB704E67A36665F036886
D408FF4FDE7870E30804A1D1147EFE7C2E6C0A3A9FCFB9ADEADABFCA41B173040C42425FB938021806B9F289DF51EA4BE62E1A2652CC4BC5598C0B0FE5F4FBEA0E87E26A
DFF3C0D4F6E2C26936B9BD82DB5A17359782C68BE96257142698BD2530705D835B0FF76C5780D65CC3A66623C844C3EB4FFA499AABD5B772F3C86794B5856419AD2906E4
E13D963784C544B94D3DB5616E50B8AE597B544556DA2D2E861702DE9158BD6A8450218327483B0240D72CA2DD658DFA7824564C722F18FC0D184AD8046CFC4CAEEFD81F
E9766C71159FC2051BBFC48A4639243F928F7DFE9E12A575DA3AA5290809FC2319E6A1B3A3B5C65975C76B72F9D1064EA41AAB3A92A0A80CDBB469EC5665A78BFA439033
F3DA1E157E3E344788886B3CA29E02BDAAF24210EA84A33740D7E1BAB7EC27FE3406F0058B1B16EB661E74C8768D8D516CD4AAA6574CF7022AB5B06086E9651E62BA150B

Conclusion

For the reason aforementioned, the researchers have yet to determine the identity of the attackers. Also the researcher assured to update a name for this Fileless malware, if any new modules appeared.

The researcher concluded “the actor behind this campaign is quite capable.” “the code is quite unique, with no similarities to known malware.”

By | 2022-05-10T17:10:42+05:30 May 10th, 2022|IOC's, Malware, Security Update, Software Issues, Tips|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!