Ongoing Malvertising Campaign leads to Ransomware

May 15, 2024, 3:32 p.m.

Description

Rapid7 detected an ongoing malware distribution campaign involving trojanized installers of WinSCP and PuTTY, delivered via malicious search engine ads. The infection chain employs DLL side-loading, credential access, and deploys Sliver beacons followed by Cobalt Strike. In one case, the threat actor attempted data exfiltration and ransomware deployment after gaining elevated access. The analysis provides indicators, MITRE ATT&CK mappings, and detection guidance.

Date

Published Created Modified
May 15, 2024, 3:14 p.m. May 15, 2024, 3:14 p.m. May 15, 2024, 3:32 p.m.

Indicators

f89720497b810afc9666f212e8f03787d72598573b41bc943cd59ce1c620a861

f36e9dec2e7c574c07f3c01bbbb2e8a6294e85863f4d6552cccb71d9b73688ad

f36089675a652d7447f45c604e062c2a58771ec54778f6e06b2332d1f60b1999

f18367d88f19c555f19e3a40b17de66d4a6f761684a5ef4cdd3d9931a6655490

ed501e49b9418fcfaf56a2eff7adcf85a648bdee2c42bb09db8c11f024667bfa

d95f6dec32b4ebed2c45ecc05215e76bf2f520f86ad6b5c5da1326083ba72e89

df0213e4b784a7e7e3b4c799862db6ea60e34d8e22eb5e72a980a8c2e9b36177

d94ed93042d240e4eaac8b1b397abe60c6c50a5ff11e62180a85be8aa0b0cc4a

d27f9c0d761e5e1de1a741569e743d6747734d3cdaf964a9e8ca01ce662fac90

cf82366e319b6736a7ee94cca827790e9fdedface98601f0499abee61f613d5d

cd7d59105b0d0b947923dd9ed371b9cfc2c2aa98f29b2afbdcd3392ad26bde94

c9042a7ed34847fee538c213300374c70c76436ee506273b35282c86a11d9e6a

ca05485a1ec408e2f429e2e377cc5af2bee37587a2eb91dc86e8e48211ffc49e

c8a982e2be4324800f69141b5be814701bcc4167b39b3e47ed8908623a13eb10

c33975aa4ab4cdf015422608962bd04c893f27bd270cf3f30958981541cdfead

bfc2ef3b404294fe2fa05a8b71c7f786b58519175b7202a69fe30f45e607ff1c

bd4abc70de30e036a188fc9df7b499a19a0b49d5baefc99844dfdec6e70faf75

bbdf350c6ae2438bf14fc6dc82bb54030abf9da0c948c485e297330e08850575

a5dfc9c326b1303cc1323c286ecd9751684fb1cd509527e2f959fb79e5a792c2

a1cb8761dd8e624d6872960e1443c85664e9fbf24d3e208c3584df49bbdb2d9c

9be715df88024582eeabdb0a621477e04e2cf5f57895fa6420334609138463b9

9bd3c7eff51c5746c21cef536971cc65d25e3646533631344728e8061a0624cb

989a8e6a01aa20e298b1ffae83b50cef3e08f6b64a8f022288dc8d5729301674

972ca168f7a8cddd77157e7163b196d1267fe2b338b93dabacc4a681e3d46b57

96ea33a5f305015fdd84bea48a9e266c0516379ae33321a1db16bc6fabad5679

8bc39017b1ea59386f74d7c7822063b3b00315dd317f55ddc6634bde897c45c1

8b1946e3e88cff3bee6b8a2ef761513fb82a1c81f97a27f959c08d08e4c75324

8834ec9b0778a08750156632b8e74b9b31134675a95332d1d38f982510c79acb

8b0d04f65a6a5a3c8fb111e72a1a176b7415903664bc37f0a9015b85d3fc0aa7

8827b6fa639afe037bb2c3f092ccb12d49b642ce5cec496706651ebcb23d5b9e

7d53122d6b7cff81e1c5fcdb3523ccef1dbd46c93020a0de65bc475760faff7d

868cd4974e1f3ac7ef843da8040536cb04f96a2c5779265a69df58e87dc03029

725aa783a0cd17df603fbe6b11b5a41c9fbfd6fc9e4f2e468c328999e5716faa

69583c4a9bf96e0edafcf1ac4362c51d6ff71bba0f568625ae65a1e378f15c65

61214a7b14d6ffb4d27e53e507374aabcbea21b4dc574936b39bec951220e7ea

51d898de0c300cae7a57c806d652809d19beb3e52422a7d8e4cb1539a1e2485d

51af3d778b5a408b725fcf11d762b0f141a9c1404a8097675668f64e10d44d64

500574522dbcde5e6c89803c3dca7f857f73e0868fd7f8d2f437f3cc31ce9e8d

4b618892c9a397b2b831917264aaf0511ac1b7e4d5e56f177217902daab74a36

47ec3a1ece8b30e66afd6bb510835bb072bbccc8ea19a557c59ccdf46fe83032

35161a508dfaf8e04bb6de6bc793a3840a05f2c04bbbbf8c2237abebe8e670aa

33f6acd3dfeda1aadf0227271937c1e5479c2dba24b4dca5f3deccc83e6a2f04

2ee435033d0e2027598fc6b35d8d6cbca32380eb4c059ba0806b9cfb1b4275cc

28e5ee69447cea77eee2942c04009735a199771ba64f6bce4965d674515d7322

242b2c948181f8c2543163c961775393220d128ecb38a82fa62b80893f209cab

17e0005fd046e524c1681304493f0c51695ba3f24362a61b58bd2968aa1bd01a

169ef0e828c3cd35128b0e8d8ca91fbf54120d9a2facf9eb8b57ea88542bc427

1576f71ac41c4fc93c8717338fbc2ba48374894345c33bdf831b16d0d06df23d

13b2e749eb1e45ce999427a12bb78cbebc87c415685315c77cdfb7f64cb9aab0

12afbec79948007e87fdf9e311736160797f245857a45c040966e8e029ca97b3

0aa248300a9f6c498f5305ae3cb871e9ec78ae62e6d51c05c4d6dd069622f442

03d18441c04f12270aab3e55f68284dcd84721d1e56b32f8d8b732a52a654d2d

02d8e4e5f74d38c8e1c9ad893e0cec1cc19aa08a43ecc87ac043fa825382a583

02330e168d4478a4cd2006dd3a856979f125fd30f5ed24ee70a41e03e4c0d2f8

94.156.67.83

94.156.67.188

94.156.67.185

91.92.255.77

91.92.255.71

91.92.253.80

91.92.252.238

91.92.249.155

91.92.249.106

91.92.244.41

91.92.242.183

185.82.219.92

94.156.65.115

94.156.65.98

Attack Patterns

T1583

T1567

T1222

T1189

T1486

T1574

T1106

T1570

T1543

T1055

T1204

T1140

T1027

T1053

T1059