Malware descriptions

Big Box LatAm Hack (3rd Part – Infection by Office Files)

Malicious macro-enabled Microsoft Office document
The last interesting item found on the same malicious cybercriminal server is a .docm file (a macro-enabled document according to Microsoft Office standards).
big_box_latam_2_1

It is a malicious file that when opened shows its victims the following content:
208216049

If macros are enabled and a victim clicks on the message to supposedly download an MMS message, two pieces of malware are installed into the machines of victims.

Malicious part of the document
The malicious part of the document is located at 0x00000f14 offset, has 18,944 bytes in size and has the name “vbaProject.bin“.

208216050

When it is extracted from the main .docm file, it has two different urls downloading two different pieces of malware. Each image in the macro-enabled file downloads different malware when the victim clicks on it.
The first malware is downloaded from the same malicious server located in Panama and the second one from the Dropbox cloud.
208216051

208216052

Kaspersky Anti-Virus detects both malicious files under the Trojan.MSIL.Agent family.

What is interesting here?

If you look at the image of the document above you will see that the content of the document is in Spanish; however, the language used to edit the document is Turksih. Metadata of the file also confirms it was compiled on a machine where a so-called ilyasOzdogan was the author.

208216053

It is interesting to notice that one of the downloaded malicious MSIL.Agents also has the same user name under the source path inside of the compiled binary:

c:userslyaszdoandocumentsdocumentsvisualstudio2012projectswindowsformsapplication13windowsformsapplication13objdebugwindowsformsapplication13.pdb

What does this mean? It means that Latin American cybercriminals are probably not only in touch with cybercriminals from Eastern Europe but from Turkey too.
Today, some advanced cybercriminals use exploits to infect the machines of victims, but as you can see from this example, this may be a waste of money since the old school tricks still work for them. If you do not believe me, just see how on January 10, when the file was submitted for the first time to VirusTotal, it registered 0 of 48 detections and at the time of writing this post only 2 of 50 anti-virus solutions detected this malicious sample:

208216054

You may follow me on twitter:@dimitribest

Big Box LatAm Hack (3rd Part – Infection by Office Files)

Your email address will not be published. Required fields are marked *

 

Reports

APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Subscribe to our weekly e-mails

The hottest research right in your inbox