• Home
  • Forums
  • Chat
  • Categories
    • News
    • Tech
    • Gaming
    • Anime

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Stock Futures Slip Ahead of Fed Minutes

August 17, 2022

Ask HN: Has any Rust developer moved to embedded device programming?

August 17, 2022

Mike Perry vs MVP on Any Device (Live Stream)

August 17, 2022
Facebook Twitter Instagram
Visit the Oasis
OasisNews
Facebook Twitter Instagram YouTube
  • Home
  • Forums
  • Chat
  • Categories
    • News
    • Tech
    • Gaming
    • Anime
OasisNews
Home»tech»Why Remediation Alone Is Not Enough When Infected by Malware
tech

Why Remediation Alone Is Not Enough When Infected by Malware

adminBy adminMay 20, 2022No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
Share
Facebook Twitter Pinterest Reddit WhatsApp Email


In January 2022, a prominent Korean company in the manufacturing industry had many of its internal systems infected by the Darkside ransomware.

As the ransomware was found to be distributed using the AD group policy, AhnLab attempted to conduct a DC server forensic analysis. However, as the virtual environment operating system of the DC server operating in the virtual environment was damaged, the server could not be secured. Among the systems that were restored by the previous backup after the infection, the two WebLogic servers were found to be infected by WebShell during a similar period. AhnLab conducted the forensic analysis on the servers to check if WebShell was responsible for the Darkside infection. 

The analysis result of WAS1 and WAS2 servers restored with previous snapshots showed that WebShell and Darkside were not related. However, there were Miner infections starting from April 2019, and there was a history of various malware infections and breach traces until February 2022 (the time of the analysis).

The company that uses the AhnLab product was aware of the infections, yet it seems the company did not identify how the infection happened in the first place. Apparently, the only action they took was remediating the system, without identifying how the infection started.

While the malware infecting the system may not inflict serious damage, leaked control and information of the internal systems may be traded between attackers and utilized in attacks that may cause serious issues in the future. As such, when the malware is detected, simply remedying the system and deleting the malware is not enough. To prevent further breaches and attacks of similar types, a detailed analysis of the infected system to identify the cause of the malware infections and breaches is needed, as well as resolving the identified issues.

Breach Details

The traces of the breach discovered on the targeted company’s WAS1 and WAS2 servers are as follows:

WAS1 was infected with CoinMiner in 2019. It was later infected with various malware types such as Cobalt Strike, WebShell, and info-leaking malware. It appears that the breach had been progressing for the recent 2-3 years by the various attackers. WAS2 had a malware strain likely created by a North Korean hacker, meaning it was probably being targeted by an APT attack. There were also various breach traces discovered on April 22, 2021, but the targeted company stated that it received a penetration testing service on that day.

Initial Approach

WAS1 was infected with CoinMiner on April 30, 2019. The malware was downloaded from 146.196.83.217. According to the Tencent Security blog, the IP address is related to a miner named RunMiner. It was found to be distributed by using the WebLog Deserialization vulnerability CVE-2017-10271.

The initial breach trace of WAS2 happened on April 29, 2020. There was a trace of the attacker attempting to infiltrate WebShell. The WebLogic version of WAS1 and WAS2 was 12.1.3, which is a version existing in the CVE-2017-10271 vulnerability mentioned above. It is likely that the initial breach happened due to the WebLogic vulnerability of the two servers. 

Obtaining Account

On October 22, 2020, a hacking tool included with the dictionary attack feature and Isass.dmp file (a dump file for the lsass.exe process) were found as a compressed file (1.rar) in the shared folder of the WAS1 system. It seems the attacker stole the password by the dictionary attack method and process dump for lsass.exe.

Through the Isass.dmp file secured by the attacker, one can obtain various information such as drmftp, plain password of the Administrator account, and NTLM hash as shown below. 

Figure 2. Account information (ID, plain password, and NTLM Hash) extracted from Isass.dmp stolen by the attacker 

The targeted company’s administrator account was in a vulnerable state:

  • The password for the Administrator account did not change once since it was created.
  • The account used a password that could be easily guessed.
  • As the Administrator account’s password for both WAS1 and WAS2 was the same, it is likely that most of the other servers used the same password for their administrator accounts.

Reverse RDP Access

After obtaining the account with the administrator privilege, the attacker sometimes had direct control of the system within the organization by accessing it with the Reverse RDP method using Lcx.exe.

Lcx.exe is an open-source tunneling tool that can be used to connect the external attacker with the internal system. The RDP communication process of Lcx.exe is as follows:

Figure 3. RDP communication process using Lcx.exe

The history of Lcx.exe being created and executed in WAS1 was confirmed, as well as the access IP of 127.0.0.1 recorded in the event log (Event ID: 4624). The accounts used for verifying tunneling were local Administrator and test, both of them being administrator accounts. The test account was created right before the event, most likely done by the attacker. Unfortunately, AhnLab could not check the IP that the external attacker used for remote access. 

Figure 4. Tunneling RDP access event log – Event ID: 4624

Tools Used for Attack

The infected system had a scanning tool, proxy and port forwarding tool, WebShell, backdoor malware, etc.

The attacker used various tools for different purposes: collecting information for infiltration, port forwarding for establishing an external connection, installing backdoor for persistence, etc. The tools discovered in the system are shown below.

Table 1. Tools Used for Attack

To bypass anti-malware products, the attacker used open-source programs that are relatively difficult to detect as attack tools. AhnLab detects and blocks malware and attack tools discovered in the infected system using the aliases below.

[File Detection]

  • Unwanted/Win32.NSSM 
  • Unwanted/Win32.BitCoinMiner 
  • Unwanted/Win32.BitCoinMiner 
  • Dropper/Win.Agent 
  • Dropper/Win32.Agent 
  • Dropper/Win.Agent 
  • HackTool/Win.Fscan 
  • HackTool/Win.Fscan 
  • HackTool/Win.Fscan 
  • HackTool/Win.NbtScan
  • Malware/Gen.Reputation 
  • HackTool/Win.AliveScan
  • Exploit/Win.Scanner
  • HackTool/Win.LCX 
  • HackTool/Win.Stowaway 
  • HackTool/Win.NPS 
  • HackTool/Win.Frp 
  • HackTool/Win.Frp 
  • Malware/Win64.Generic 
  • Patched/Win.Loader
  • HackTool/Win.ExploitScanner

[File MD5]

  • 1136efb1a46d1f2d508162387f30dc4d
  • ae00198dfa0ef3a7e5fea8dd06a8d8b8
  • f2f94708cef791d9664d2e4fa20ff520
  • 0dabd600cea6dcf3c049a667b67b4482
  • 99b0638f134a0d607edb8dbab01d3f95
  • 763f2cae2072647d61d11047c8aaaf09
  • e636a07bb8d8fbfb1cab5557fdc217aa
  • 0f7baf15408a49895439aa273ee7f867
  • 7650484a85247bc922de760a6a335a76
  • 62eada472d6d2d7606ba322c8b7f9153
  • f01a9a2d1e31332ed36c1a4d2839f412
  • f4a992b87d70c622eef107a09d712e9e
  • d221d51f4599ae051709b5cf5c45af10
  • fb6bf74c6c1f2482e914816d6e97ce09
  • 4b8fbfc68b9969549f050c0e8366a10d
  • 716979a28125fa65903e77dc5b399383
  • 88a5ebccf60464764d0fe015d71bf330
  • d862186f24e644b02aa97d98695c73d8
  • 114f26e7b46d0f4c4a202353c41ce366
  • 0b877ea03db28b275dd535f16dd78239
  • fe12b5008334ad718008307e1a0750f7

[IP/URL]

  • 198.13.53.81
  • 180.235.137.14
  • 185.239.226.133
  • 159.233.41.219

Subscribe to AhnLab’s next-generation threat intelligence platform ‘AhnLab TIP’ to check related IOC and detailed analysis information.



Source link

infected malware Remediation
Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticleNorth Korea shuns outside help as COVID catastrophe looms | Coronavirus pandemic News
Next Article Oklahoma legislature approves bill banning abortions at fertilization
admin
admin
  • Website

Related Posts

Ask HN: Has any Rust developer moved to embedded device programming?

August 17, 2022

Mike Perry vs MVP on Any Device (Live Stream)

August 17, 2022

Robot dog strapped with RPG rocket launcher shown off at Russian expo

August 17, 2022

This is what’s keeping electric planes from taking off

August 17, 2022

BBC Chairman Buys Share In Crypto Firm Despite Crypto Winter

August 17, 2022

Here’s What’s Next for Binance Coin, Chainlink and Four Additional Altcoins, According to Top Analyst

August 17, 2022
0 0 votes
Article Rating
Subscribe
Login
Notify of
guest
guest
0 Comments
Inline Feedbacks
View all comments
Demo
Our Picks

Soneva’s Luxury Resorts Now Accept Crypto Payments – Featured Bitcoin News

August 17, 2022

‘Big Short’ Investor Michael Burry Dumps All Stocks but One After Predicting Market Crash – Featured Bitcoin News

August 17, 2022

Peter Schiff to Liquidate Euro Pacific Bank in Settlement With Puerto Rican Regulator – Featured Bitcoin News

August 14, 2022

Billionaire Mark Cuban Sued for Allegedly Promoting a Massive Crypto ‘Ponzi Scheme’ – Featured Bitcoin News

August 14, 2022
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Don't Miss
News

Stock Futures Slip Ahead of Fed Minutes

By adminAugust 17, 2022

U.S. stock futures slipped as investors reviewed another batch of earnings from retailers and awaited…

Ask HN: Has any Rust developer moved to embedded device programming?

August 17, 2022

Mike Perry vs MVP on Any Device (Live Stream)

August 17, 2022

Democrats Say They Will Keep Pressing on Paid Family Leave, Child-Care Subsidies

August 17, 2022

Subscribe to Updates

Get the latest creative news from SmartMag about art & design.

Top Posts
Advertisement
Demo
Latest Posts
Our Picks

Samsung Galaxy S22 series picks up the August 2022 security update in the US

August 14, 2022

Best Buy's anniversary sale is here: Our top deal picks

August 12, 2022

FTX.US President Brett Harrison Says Crypto Winter Fading Away As Institutional Demand Picks Up

August 10, 2022

Amazon picks up Roomba vacuum maker iRobot for $1.7 billion

August 7, 2022
Blog Posts

TenSura Anime Film Unveils 3 New Cast Members! | Anime News

August 17, 2022

Shangri-La Frontier Gets Anime and Game! | Anime News

August 17, 2022

Welcome to Demon School! Iruma-kun S3 Reveals Premiere Date! | Anime News

August 16, 2022

SK8 The Infinity confirmed the production of a second season and a new OVA

August 15, 2022

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

About Us
About Us

Weboasis is the number one home page for your browser on all of the internet. Providing you with links, places to communicate, and news, all in one little OASIS.

Facebook Twitter Instagram Pinterest
  • Home
  • Forums
  • Chat
  • Categories
    • News
    • Tech
    • Gaming
    • Anime
© 2022 ThemeSphere. Designed by ThemeSphere.

Type above and press Enter to search. Press Esc to cancel.

wpDiscuz