Fighting Ursa Luring Targets With Car for Sale
Aug. 5, 2024, 8:34 a.m.
Description
This analysis examines a campaign attributed to the Russian threat actor Fighting Ursa, also known as APT28, Fancy Bear, and Sofacy. The group utilized a phishing lure disguised as an advertisement for a car sale to distribute the HeadLace backdoor malware, likely targeting diplomats. The lure exploited legitimate services like Webhook.site and ImgBB to host various components of the attack chain. The malware employed multi-stage loading tactics, executing a malicious DLL through a batch script to retrieve additional payloads. The campaign aligns with Fighting Ursa's known tactics, techniques, and procedures, demonstrating the group's continued reliance on repurposing successful tactics and abusing free services.
Tags
Date
- Created: Aug. 5, 2024, 8:30 a.m.
- Published: Aug. 5, 2024, 8:30 a.m.
- Modified: Aug. 5, 2024, 8:34 a.m.
Indicators
- dad1a8869c950c2d1d322c8aed3757d3988ef4f06ba230b329c8d510d8d9a027
- cda936ecae566ab871e5c0303d8ff98796b1e3661885afd9d4690fc1e945640e
- c6a91cba00bf87cdb064c49adaac82255cbec6fdd48fd21f9b3b96abf019916b
- a06d74322a8761ec8e6f28d134f2a89c7ba611d920d080a3ccbfac7c3b61e2e7
- 7c85ff89b535a39d47756dfce4597c239ee16df88badefe8f76051b836a7cbfb
- 6b96b991e33240e5c2091d092079a440fa1bef9b5aecbf3039bf7c47223bdf96