Table of Contents
Background
Sample analysis
Using terrorist attacks to induce decompression
njRAT
Tracing and correlation
Mitigation Measures
Home Operation and Maintenance Safety Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

May 30, 2023 am 08:55 AM
winrar

Background

On March 17, 2019, 360 Threat Intelligence Center intercepted a case of a suspected "Golden Rat" APT organization (APT-C-27) using the WinRAR vulnerability (CVE-2018-20250[6] ) Targeted attack samples targeting the Middle East. The malicious ACE compressed package contains an Office Word document that uses a terrorist attack as a bait to induce the victim to decompress the file. When the victim decompresses the file through WinRAR on the local computer, the vulnerability will be triggered. After the vulnerability is successfully exploited, the vulnerability will be built-in The backdoor program (Telegram Desktop.exe) is released into the user's computer startup directory. When the user restarts or logs in to the system, the remote control Trojan will be executed to control the victim's computer.

360 Threat Intelligence Center discovered through correlation analysis that this attack activity is suspected to be related to the "Golden Rat" APT organization (APT-C-27), and after further tracing and correlation, we also found multiple Malicious samples of the Android platform related to this organization are mainly disguised as some commonly used software to attack specific target groups. Combined with the text content related to the attacker in the malicious code, it can be guessed that the attacker is also familiar with Arabic.


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Detection of backdoor program (TelegramDesktop.exe) on VirusTotal

Sample analysis

360 threats The Intelligence Center analyzed the sample that exploited the WinRAR vulnerability. The relevant analysis is as follows.

Using terrorist attacks to induce decompression

314e8105f28530eb0bf54891b9b3ff69#File name This Office Word document is part of a malicious compressed file whose contents are related to a terrorist attack. Due to its political, geographical and other particularities, the Middle East has suffered numerous terrorist attacks and its people have suffered greatly. Therefore, people in the region are sensitive to terrorist attacks and other incidents, which increases the possibility of victims decompressing files:
##MD5


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East
Decoy document translation content

If the user decompresses the malicious compressed package, the WinRAR vulnerability will be triggered, thereby releasing the built-in backdoor program to the user's startup directory Medium:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East
The released backdoor program Telegram Desktop.exe will be executed when the user restarts the computer or logs in to the system.

Backdoor(Telegram Desktop.exe)

##File name##MD5##36027a4abfb702107a103478f6af49be76fd23de8f977f51d832a87d7b0f7692a0ff8af333d74fa5ade2e99fec010689.NET

The backdoor program TelegramDesktop.exe will read data from the PE resource and write it to: %TEMP%\Telegram Desktop.vbs, then execute the VBS script and sleep for 17 seconds until the VBS script is completed:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

The main function of this VBS script is to decode the built-in string through Base64 and write the decoded string to the file: %TEMP%\Process. exe, and finally execute Process.exe:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

After execution of Process.exe, file 1717.txt will be created in the %TEMP% directory and written Data related to the final executed backdoor program for subsequent use by Telegram Desktop.exe:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Then TelegramDesktop.exe will read 1717. txt file and replace the special characters in it:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Then decode the data through Base64 and load the decoded data in the memory. Data:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

The data finally loaded and executed in the memory is the njRAT backdoor program. The relevant configuration information is as follows:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

njRAT

The njRAT backdoor program executed by memory loading will first create a mutex to ensure that only one instance is running:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

And determine whether the current running path is the path set in the configuration file. If not, copy itself to the path to start execution:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Then close the attachment checker and firewall:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

and open the keylogging thread, and write the results of the keylogging to the registry :


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Open the communication thread, establish communication with the C&C address and accept command execution:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

##The njRAT remote control also has multiple functions such as remote SHELL, plug-in download and execution, remote desktop, file management, etc.:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

AndroidPlatformSampleAnalysis

360 Threat Intelligence Center also related to multiple Android platform malicious samples recently used by the "Golden Rat" (APT-C-27) APT organization through VirusTotal, which also used 82.137. 255.56 as the C&C address (82.137.255.56:1740):


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East
##The recently associated Android platform backdoor samples are mainly disguised as Android system updates, Office Upgrade programs and other commonly used software. The following is our analysis of an Android sample disguised as an Office upgrader

Telegram Desktop.exe
SHA256
Compilation information
##File MD5##File name
1cc32f2a351927777fc3b2ae5639f4d5
OfficeUpdate2019.apk

After the Android sample is started, it will induce the user to activate the device manager, then hide the icon and run it in the background:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Induces the user to complete the installation Afterwards, the sample will display the following interface:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Then the sample will obtain the online IP address and port through Android's default SharedPreferences storage interface. If obtained If not, decode the default hard-coded IP address and port online:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

# #Decoding algorithm of related IP address:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

#The final decoded IP address is: 82.137.255.56, and the port also needs to be hard-coded. Add 100 to get the final port 1740:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Once successfully connected to the C&C address, online information will be sent immediately, control instructions will be received and executed. This sample can record, take photos, perform GPS positioning, upload contacts/call records/text messages/files, and execute commands from the cloud and other functions


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

The list of related commands and functions of the Android backdoor sample is as follows:

##CommandFunction##1617##18192021Copy files according to cloud instructionsMove files according to cloud instructionsRename the file according to the cloud instructionsRun FileCreate the directory according to the cloud instructionsExecute cloud commandExecute a ping commandGet and upload contact information##32Get and upload text messages33Get and upload call recordsStart recording
Heartbeat management
connect
Get the specified file Basic information
Download file
Upload files
Delete files ##22
23
24
25
28
29
30
31
##34
##35 Stop and upload the recording file
36 Take photos
37 Start GPS positioning
38 Stop GPS positioning and upload location information
39 Use the cloud to send ip/port
40 Reports the currently used ip/port
to the cloud 41 Get installed application information

It is worth noting that the command information returned by this sample contains information related to Arabic, so we speculate that the attacker is more likely to be familiar with using Arabic:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Tracing and correlation

By querying the C&C address of the backdoor program captured this time (82.137.255.56:1921), it can be seen that this IP address has been used by APT many times since 2017. - Used by the C-27 (Golden Rat) organization, this IP address is suspected to be the organization’s inherent IP asset. On the big data correlation platform of 360 Network Research Institute, you can view multiple sample information associated with the IP address


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Through 360 Threat Intelligence The central threat analysis platform (ti.360.net) queried the C&C address and it was also labeled with APT-C-27 related tags:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

And the functional modules, code logic, built-in information language, target group, network assets and other information of the relevant Trojan samples (Windows and Android platforms) captured this time are all the same as those used by APT-C-27[2] exposed earlier. Trojan sample information is highly similar. Therefore, according to the 360 ​​Threat Intelligence Center, the relevant samples intercepted this time are also related to the "Golden Rat" APT organization (APT-C-27).

As we predicted, attacks using the WinRAR vulnerability (CVE-2018-20250) to spread malicious programs are in the outbreak stage. The 360 ​​Threat Intelligence Center has previously observed multiple APT attacks using this vulnerability. , and the targeted attack activities intercepted this time by the suspected "Golden Rat" APT organization (APT-C-27) that exploited the WinRAR vulnerability is just one example of many cases of using this vulnerability to carry out targeted attacks. Therefore, the 360 ​​Threat Intelligence Center once again reminds users to take timely measures to prevent this vulnerability. (See the "Mitigation Measures" section)

Mitigation Measures

1. The software manufacturer has released the latest WinRAR version. The 360 ​​Threat Intelligence Center recommends that users promptly update and upgrade WinRAR (5.70 beta 1) To the latest version, the download address is as follows:

32-bit: http://win-rar.com/fileadmin/winrar-versions/wrar57b1.exe

64-bit: http://win -rar.com/fileadmin/winrar-versions/winrar-x64-57b1.exe

2. If the patch cannot be installed temporarily, you can directly delete the vulnerable DLL (UNACEV2.DLL), which will not affect general use. , but an error will be reported when encountering ACE files.

Currently, all products based on the threat intelligence data of 360 Threat Intelligence Center, including 360 Threat Intelligence Platform (TIP), Tianqing, Tianyan Advanced Threat Detection System, 360 NGSOC, etc., already support such attacks. accurate detection.

The above is the detailed content of Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

WinRAR32-bit-How to set winrar to Chinese? WinRAR32-bit-How to set winrar to Chinese? Mar 18, 2024 am 11:01 AM

As an excellent compressed package manager, WinRAR is the graphical interface of the archive tool RAR in the Windows environment. WinRAR is suitable for backing up data, reducing the size of email attachments, decompressing RAR, ZIP and other types of files downloaded from the Internet, and can create new compressed files in RAR and ZIP formats. The WinRAR 32-bit version is popular among users Today, let me give you a detailed introduction to WinRAR 32-bit and how to set winrar to Chinese! 1. The Origin of WinRAR32-bit WinRAR32-bit is a Windows version of RAR compressed file manager. This is a program that allows you to create, manage and control

How to encrypt the compressed package in winrar-winrar encrypted compressed package method How to encrypt the compressed package in winrar-winrar encrypted compressed package method Mar 23, 2024 pm 12:10 PM

The editor will introduce to you three methods of encryption and compression: Method 1: Encryption The simplest encryption method is to enter the password you want to set when encrypting the file, and the encryption and compression are completed. Method 2: Automatic encryption Ordinary encryption method requires us to enter a password when encrypting each file. If you want to encrypt a large number of compressed packages and the passwords are the same, then we can set automatic encryption in WinRAR, and then just When compressing files normally, WinRAR will add a password to each compressed package. The method is as follows: Open WinRAR, click Options-Settings in the setting interface, switch to [Compression], click Create Default Configuration-Set Password Enter the password we want to set here, click OK to complete the setting, we only need to correct

winrar 64-bit-How to decompress winrar? winrar 64-bit-How to decompress winrar? Mar 18, 2024 pm 12:55 PM

WinRAR is a powerful compressed file management tool that provides rich features and an easy-to-use interface. WinRAR 64-bit version is specially optimized for 64-bit operating systems and can better utilize system resources and performance. Next, let the editor introduce you to winrar 64-bit and explain how to decompress winrar! 1. What is winrar 64-bit software? WinRAR is a powerful compressed package manager. This software can be used to back up your data, reduce the size of email attachments, decompress RAR, ZIP and other files downloaded from the Internet, and create new files in RAR and ZIP formats. The latest WINRAR version is Wi

What is the meaning of 32-bit version of winrar? What is the meaning of 32-bit version of winrar? Jan 18, 2024 am 09:00 AM

Many people have heard of winrar32-bit and winrar64-bit, but most of them don’t know the difference between the two, or even what winrar32-bit is? In fact, it is a compression tool format that can only be used on 32-bit systems. What does winrar32-bit mean? Answer: winrar32-bit is designed for ordinary users. winrar32-bit is designed for average users who don't need a lot of memory and floating point performance. Introduction to winrar32-bit expansion 1. Winrar32-bit is designed for ordinary users, while most winrar64-bit users require a large amount of memory. The operation speed of winrar64-bit is twice that of winrar32-bit. 2. winrar64 bit

Does winrar come with the computer? Does winrar come with the computer? Jul 28, 2022 pm 02:26 PM

Winrar does not come with the computer. It is an independent software that needs to be downloaded and installed. WinRAR is a powerful archive manager, which is the graphical interface of the archive tool RAR in the Windows environment. The WinRAR built-in program can decrypt various types of archive files, image files and TAR combination files such as CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZ2, JAR, ISO, Z and 7Z; for RAR format archive files Provides unique recovery record and recovery volume functions.

Introduction to how to use winrar password protection Introduction to how to use winrar password protection Jan 18, 2024 am 09:06 AM

Many people know how to compress files with winrar, but they don't know how to add passwords for some files that need to be kept confidential. For this case, we only need to complete the operation in the compressed file. How to encrypt winrar password 1. Select the file that needs to be encrypted, right-click the mouse and select "Add to compressed file". 2. Select the "Set Password" option in the "General" column. 3. After entering the password twice, click "OK". If the encrypted folder is checked here, the password will be required before the compressed file can be opened later. 4. Finally, return to the "General" column, click "OK", and the file will start to be compressed. Wait for the compression to end, and the file encryption is completed. Come and practice it.

Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East May 30, 2023 am 08:55 AM

Background On March 17, 2019, the 360 ​​Threat Intelligence Center intercepted a sample of a targeted attack targeted at the Middle East by the suspected "Golden Rat" APT organization (APT-C-27) using the WinRAR vulnerability (CVE-2018-20250[6]). The malicious ACE compressed package contains an Office Word document that uses a terrorist attack as a bait to induce the victim to decompress the file. When the victim decompresses the file through WinRAR on the local computer, the vulnerability will be triggered. After the vulnerability is successfully exploited, the built-in The backdoor program (TelegramDesktop.exe) is released into the user's computer startup directory. When the user restarts or logs in to the system, the remote control Trojan will be executed to control the victim.

Can I delete the winrar folder? Can I delete the winrar folder? Jan 24, 2024 pm 10:57 PM

Many friends want to delete the WinRAR folder after using WinRAR, but they are worried that it will affect the downloaded software programs. So let’s take a look at whether the WinRAR folder can be deleted. Can the winrar folder be deleted? Answer: The WinRAR folder can be deleted. It will not affect the software program, but deletion is not recommended. Can the WinRAR folder be deleted? Extension instructions 1. If the WinRAR shortcut is deleted, it will have no impact on the download. 2. If the WinRAR source program is deleted, many things downloaded on the Internet will be in the form of compressed packages. After deletion, the compressed software cannot be opened.

See all articles