www.welivesecurity.com Open in urlscan Pro
2a02:26f0:4700::210:24a  Public Scan

URL: https://www.welivesecurity.com/2022/10/11/polonium-targets-israel-creepy-malware/
Submission: On October 12 via api from DE — Scanned from DE

Form analysis 5 forms found in the DOM

GET https://www.welivesecurity.com/

<form action="https://www.welivesecurity.com/" class="basic-searchform imc dark col-md-12 col-sm-10 col-xs-12" method="get" role="search">
  <div class="search-input clearfix">
    <input type="text" name="s" value="" placeholder="Search..." class="imc">
    <button class="imc">
      <span class="icomoon icon-icon_search imc"></span>
    </button>
  </div>
</form>

GET https://www.welivesecurity.com/

<form action="https://www.welivesecurity.com/" class="basic-searchform imc dark col-md-12 col-sm-10 col-xs-12" method="get" role="search">
  <div class="search-input clearfix">
    <input type="text" name="s" value="" placeholder="Search..." class="imc">
    <button class="imc">
      <span class="icomoon icon-icon_search imc"></span>
    </button>
  </div>
</form>

GET https://www.welivesecurity.com/

<form action="https://www.welivesecurity.com/" class="basic-searchform imc  col-md-12 col-sm-10 col-xs-12" method="get" role="search">
  <div class="search-input clearfix">
    <input type="text" name="s" value="" placeholder="Search..." class="imc">
    <button class="imc">
      <span class="icomoon icon-icon_search imc"></span>
    </button>
  </div>
</form>

POST https://enjoy.eset.com/pub/rf

<form action="https://enjoy.eset.com/pub/rf" class="basic-searchform col-md-12 col-sm-12 col-xs-12 no-padding newsletter" method="post" role="search">
  <div class="search-input clearfix">
    <input type="text" name="EMAIL_ADDRESS_" value="" placeholder="Email...">
    <input type="hidden" name="TOPIC" value="We Live Security Ukraine Newsletter">
    <input type="hidden" name="_ri_" value="X0Gzc2X%3DAQpglLjHJlTQGgXv4jDGEK4KW2uhw0qgUzfwuivmOJOPCgzgo9vsI3VwjpnpgHlpgneHmgJoXX0Gzc2X%3DAQpglLjHJlTQGzbD6yU2pAgzaJM16bkTA7tOwuivmOJOPCgzgo9vsI3">
    <input type="hidden" name="_ei_" value="Ep2VKa8UKNIAPP_2GAEW0bY">
    <input type="hidden" name="_di_" value="m0a5n0j02duo9clmm4btuu5av8rdtvqfqd03v1hallrvcob47ad0">
    <input type="hidden" name="EMAIL_PERMISSION_STATUS_" value="O">
    <input type="hidden" name="CONTACT_SOURCE_MOST_RECENT" value="WLS_Subscribe_Form">
    <button class="button-flag"> Submit </button>
  </div>
</form>

POST https://enjoy.eset.com/pub/rf

<form action="https://enjoy.eset.com/pub/rf" class="basic-searchform col-md-12 col-sm-12 col-xs-12 no-padding newsletter" method="post" role="search">
  <div class="search-input clearfix">
    <input type="text" name="EMAIL_ADDRESS_" value="" placeholder="Email...">
    <input type="hidden" name="NEWSLETTER" value="We Live Security">
    <input type="hidden" name="_ri_" value="X0Gzc2X%3DAQpglLjHJlTQGgXv4jDGEK4KW2uhw0qgUzfwuivmOJOPCgzgo9vsI3VwjpnpgHlpgneHmgJoXX0Gzc2X%3DAQpglLjHJlTQGzbD6yU2pAgzaJM16bkTA7tOwuivmOJOPCgzgo9vsI3">
    <input type="hidden" name="_ei_" value="Ep2VKa8UKNIAPP_2GAEW0bY">
    <input type="hidden" name="_di_" value="m0a5n0j02duo9clmm4btuu5av8rdtvqfqd03v1hallrvcob47ad0">
    <input type="hidden" name="EMAIL_PERMISSION_STATUS_" value="O">
    <input type="hidden" name="CONTACT_SOURCE_MOST_RECENT" value="WLS_Subscribe_Form">
    <button class=""> Submit </button>
  </div>
</form>

Text Content

In English
 * Em Português
 * En français
 * En Español
 * In Deutsch

Menu toggle menu

 * All Posts
 * Ukraine Crisis – Digital Security Resource Center
 * We Live Progress
 * Research
 * How To
 * Videos
 * Conference Materials
 * White Papers
 * Threat Reports
 * Our Experts

 * Em Português
 * En français
 * En Español
 * In Deutsch





Award-winning news, views, and insight from the ESET security community


POLONIUM TARGETS ISRAEL WITH CREEPY MALWARE

ESET researchers analyzed previously undocumented custom backdoors and
cyberespionage tools deployed in Israel by the POLONIUM APT group
Matías Porolli
11 Oct 2022 - 11:30AM
Share

ESET researchers analyzed previously undocumented custom backdoors and
cyberespionage tools deployed in Israel by the POLONIUM APT group

ESET researchers reveal their findings about POLONIUM, an advanced persistent
threat (APT) group about which little information is publicly available and its
initial compromise vector is unknown. POLONIUM is a cyberespionage group first
documented by Microsoft Threat Intelligence Center (MSTIC) in June 2022. MSTIC’s
assessment is that POLONIUM is an operational group based in Lebanon,
coordinating its activities with other actors affiliated with Iran’s Ministry of
Intelligence and Security (MOIS).

According to ESET telemetry, POLONIUM has targeted more than a dozen
organizations in Israel since at least September 2021, with the group’s most
recent actions being observed in September 2022. Verticals targeted by this
group include engineering, information technology, law, communications, branding
and marketing, media, insurance, and social services. Our findings describing
the tactics of this group, including details about a number of previously
undocumented backdoors, were presented in late September at the Virus Bulletin
2022 conference.




Key points of this blogpost:



 * Focused only on Israeli targets, POLONIUM attacked more than a dozen
   organizations in various verticals such as engineering, information
   technology, law, communications, branding and marketing, media, insurance,
   and social services.
 * ESET Research’s POLONIUM findings were revealed at the Virus Bulletin 2022
   conference in late September.
 * According to ESET telemetry, the group has used at least seven different
   custom backdoors since September 2021, and it is currently active at the time
   of writing.
 * The group has developed custom tools for taking screenshots, logging
   keystrokes, spying via the webcam, opening reverse shells, exfiltrating
   files, and more.
 * For C&C communication, POLONIUM abuses common cloud services such as Dropbox,
   OneDrive, and Mega.

The numerous versions and changes POLONIUM introduced into its custom tools show
a continuous and long-term effort to spy on the group’s targets. While we
haven’t observed what commands were executed by operators on compromised
machines, we can infer from their toolset that they are interested in collecting
confidential data from their targets. The group doesn’t seem to engage in any
sabotage or ransomware actions.

As shown in Figure 1, POLONIUM’s toolset consists of seven custom backdoors:
CreepyDrive, which abuses OneDrive and Dropbox cloud services for C&C;
CreepySnail, which executes commands received from the attackers’ own
infrastructure; DeepCreep and MegaCreep, which make use of Dropbox and Mega file
storage services respectively; and FlipCreep, TechnoCreep, and PapaCreep, which
receive commands from attacker’s servers. The group has also used several custom
modules to spy on its targets.

Figure 1. Timeline of observed backdoors deployed by POLONIUM


INITIAL ACCESS

While we don’t know how the group gained initial access to the targeted systems,
some of the victims’ Fortinet VPN account credentials were leaked in September
2021 and were made available online. As such, it is possible that the attackers
gained access to the victims’ internal networks by abusing those leaked VPN
credentials.


TOOLSET

POLONIUM is an active group that constantly introduces modifications to its
custom tools. We have seen more than 10 different malicious modules since we
started tracking the group, most of them with various versions or with minor
changes for a given version. Some of the most interesting characteristics of the
group’s toolset are:

 * Abundance of tools: We have seen seven different custom backdoors used by the
   group since September 2021, and also saw many other malicious modules for
   logging keystrokes, taking screenshots, executing commands, taking photos
   with the webcam, or exfiltrating files.
 * Custom tools: In various attacks carried out by this group over a short
   period of time, we detected the same component containing minor changes. In
   some other cases, we have seen a module, coded from scratch, that followed
   the same logic as some previous components. Only in a few cases have we seen
   the group use publicly available tools or code. All of this indicates to us
   that POLONIUM builds and maintains its own tools.
 * Cloud services: The group abuses common cloud services such as Dropbox,
   OneDrive, and Mega for C&C communications (receive commands and exfiltrate
   data).
 * Small components: Most of the group’s malicious modules are small, with
   limited functionality. In one case the attackers used one module for taking
   screenshots and another for uploading them to the C&C server. On a similar
   note, they like to divide the code in their backdoors, distributing malicious
   functionality into various small DLLs, perhaps expecting that defenders or
   researchers will not observe the complete attack chain.


CREEPYDRIVE

CreepyDrive is a PowerShell backdoor that reads and executes commands from a
text file stored on OneDrive or Dropbox. It can upload or download files from
attacker-controlled accounts in these cloud services, and execute supplied
PowerShell code. Figure 2 shows part of the code that downloads files and
executes commands. Note that this backdoor was documented in Microsoft’s report
in June 2022.

Figure 2. Code used by CreepyDrive to download files or execute commands

CreepyDrive uses the OneDrive HTTP API (and the Dropbox HTTP API) to access the
cloud storage. In both cases it uses a refresh token, client ID, and client
secret (all hardcoded) to generate an access token that authenticates the user
and grants access to the accounts.

While we didn’t observe commands being executed by the attackers on compromised
systems, we spotted a log file documenting the execution of a command on a
victimized computer. The contents of the log file (decoded) are shown in Figure
3.

Figure 3. Execution log of a command and its output


CREEPYSNAIL

CreepySnail is another PowerShell backdoor that sends HTTP requests to a C&C
server and receives and executes PowerShell commands. We saw various versions of
this backdoor in the wild, though the differences between them were minimal.
Figure 4 shows one version that can run any executable specified by the C&C
server (as long as it’s in the malware folder). We won’t go into more details
about this backdoor as it has already been described by Microsoft in their
report.

Figure 4. Code used by CreepySnail to execute commands


DEEPCREEP

DeepCreep is a previously undocumented backdoor written in C# that reads
commands from a text file stored in Dropbox accounts and can upload or download
files to and from those accounts. Some versions of DeepCreep have obfuscated
strings, some separate the code into DLLs, and some have more or less commands.
We will focus on the most prevalent version for this analysis, although
interesting features of other versions will be mentioned.

A command to be executed by the backdoor is read from the file cd.txt on the
server-side root folder of the victim; once read, the file is deleted from the
cloud. DeepCreep runs this process in an infinite loop, which means that a new
cd.txt file has to be placed in the cloud storage for every command to execute.
If the file is not found, the backdoor sleeps then tries again. A list of the
commands that DeepCreep can process is shown in Table 1.

Table 1. List of commands supported by DeepCreep

CommandDescription GetNoThingDeletes cd.txt. upload "<local_file_path>"
"<file_name_on_dropbox>"Uploads a file on the victim’s computer to a subfolder 2
in Dropbox. Multiple upload lines can be included in cd.txt to execute more than
one upload at once. download
"<file_name_on_dropbox>"
"<local_file_path>"
<bool_abs_p>Downloads a file from the root folder in Dropbox to the victim’s
computer. If <bool_abs_p> is 0, the file is downloaded into
%TEMP%\<local_file_path> (relative path). If it’s 1, the file is downloaded into
<local_file_path> (absolute path). delay <value>Sets the delay for all sleep
operations, where 1000 is 1 minute. zip
"<local_file_folder_path>" "⁠<output_path>" "<size_mb>"Creates a ZIP file with
the specified file or folder and saves it in the specified path on the victim’s
computer. The archive is split in chunks of the specified size, in megabytes.
Execute with cmd.exeWhen none of the previous commands are found in the first
line of cd.txt, then all of the lines are taken as commands to be executed with
cmd.exe. The output produced by the commands is uploaded to a text file in
Dropbox. The output encoding for the console is set to Windows-1255, which
handles Hebrew characters.

DeepCreep persists by creating a LNK file in %APPDATA%\Microsoft\Windows\Start
Menu\Programs\Startup and by creating a scheduled task. A PowerShell command is
used to create the LNK file, as shown in Figure 5.

Figure 5. Part of the code that DeepCreep uses to establish persistence

Authentication with the cloud is done by using OAuth 2.0 tokens, which are
hardcoded in the binaries. DeepCreep needs a legitimate DLL with Dropbox SDK to
be able to communicate with the cloud.

We saw some cases where a separate loader – WindowsTool.exe – was used to
implement persistence and execute DeepCreep with InstallUtil, a legitimate tool
from the .NET Framework. This version of the backdoor has its malicious code
provided in an uninstallation routine and is executed with the /u (uninstall)
option of InstallUtil.exe, perhaps to mislead defenders. Figure 6 shows part of
the code of the loader.

Figure 6. Part of the code of the loader that executes DeepCreep

In terms of string obfuscation, we have seen two variations: ROT13 and
AsStrongAsFuck obfuscator. The latest version of DeepCreep that we have seen
uses AES encryption and has the same key commands as the MegaCreep backdoor,
which we will describe in the next section.


MEGACREEP

MegaCreep is a previously undocumented backdoor based on DeepCreep, with added
functionalities. It reads and executes commands from a text file stored in Mega
cloud storage. While MegaCreep is arguably just a newer version of DeepCreep,
and in fact reuses code from DeepCreep, it seems the attackers consider both
backdoors as separate projects.

MegaCreep processes the same commands that we described for DeepCreep, but they
are stored in AES-encrypted form in the file cd.txt. It has additional commands,
both related to the key used for decryption, which are described in Table 2.

Table 2. List of new commands added to MegaCreep

CommandDescription NewASKey <key>Receives the decryption key <key> that is
stored locally in Cert.dll (only if the file doesn’t already exist). UPKY
<old_key> <new_key>Updates the decryption key from <old_key> to <new_key>. The
process is successful only if <old_key> is the same as the key that the backdoor
is currently using. In this case, <new_key> is stored locally in Cert.dll.

MegaCreep checks for these commands first, which are stored unencrypted in
cd.txt. If none of these commands are found, then the contents of cd.txt are
decrypted using the key that is in Cert.dll. After decryption, all the same
commands that we described for DeepCreep can be executed by MegaCreep.

MegaCreep uses the MegaApiClient C# library to communicate with Mega cloud
storage. Authentication is done with a username and password, which are stored
encrypted in a local file, Sess.dll. Figure 7 shows the code that loads the
username and password from Sess.dll.

Figure 7. Code used in MegaCreep to load username and password

This backdoor is a good example of the preference that POLONIUM has for using
separate DLLs with specific functionality, as shown in Figure 8. In the example,
two methods from PRLib.dll are called: CHP, which kills running processes with
the same name as the backdoor’s executable (i.e., previous executions of the
backdoor that are still running), and XVDFv, which implements persistence (in
the same way we described for DeepCreep).

Figure 8. Example of MegaCreep calling methods from separate DLLs

Another feature that was added to MegaCreep is that the output from commands
executed by cmd.exe is encrypted before it is uploaded to the cloud. The key
used for encryption is the same as the one used to decrypt commands.

We saw one case where MegaCreep was deployed using a loader,
WLAN-AutoConfig.exe. The main code for the backdoor was placed in a DLL file,
MainZero.dll, and other routines that communicate with Mega were placed in
another DLL, MagLibrary.dll. Figure 9 shows the code in the loader that calls
MainZero.

Figure 9. Code for MegaCreep’s loader


FLIPCREEP

FlipCreep is another previously undocumented backdoor written in C# that has a
very similar flow of execution as the other backdoors that we have described: it
reads commands from orders.txt – a text file stored on an FTP server operated by
POLONIUM – and can upload or download files from the server. The commands that
FlipCreep can process are the same as the other backdoors, with the following
considerations:

 * The commands upload and download do the opposite of what’s expected. We don’t
   know if this was a mistake, but upload actually downloads files from the FTP
   server to the victim, and download uploads files. Both take two arguments, as
   was the case in MegaCreep. Figure 10 shows part of the code that uploads
   files; we can see that it looks for the string download.
 * There is a command ftpversion that uploads the version of the backdoor
   (hardcoded) to a file ver.txt on the FTP server, in the root folder for the
   target.

Figure 10. Part of the FlipCreep code to upload files

FlipCreep creates a folder with the username of the target on the FTP server,
along with these subfolders:

 * Files: stores files uploaded from the victims
 * orders: stores output from commands executed with cmd.exe

Persistence is achieved in the same way as was described for DeepCreep. As for
string obfuscation, we’ve seen one sample with ROT13 obfuscation.


TECHNOCREEP

TechnoCreep is a previously undocumented C# backdoor that communicates with a
C&C server via TCP sockets. In this case, commands are not read from a file, but
received in an exchange of messages. The first message is sent by the backdoor
and contains initial information about the victim, in the format
<PC_NAME>#<USERNAME>#<LIST_IP>#<LIST_OTHER>#<OS>

<LIST_IP> is a list of IP addresses that are resolved for the hostname of the
victim, separated by /. The list is obtained by calling Dns.GetHostByName and
applying a regular expression for IP addresses. All the other elements that
don’t match the regular expression are sent as <LIST_OTHER> to the C&C server;
note that in the most common scenario this list will be empty.

TechnoCreep receives commands in an infinite loop. The list of commands is shown
in Table 3.

Table 3. List of commands supported by TechnoCreep

CommandDescription uploadUploads a file on the victim’s computer to the C&C
server. The path of the file to upload is received in a separate message. If the
file exists, the backdoor sends Exist, to which the server replies start or
stop. If start is received, the size of the file is sent. Finally, the file is
sent to the server as raw bytes. If the message is stop, nothing is done. If the
specified file doesn’t exist, NotE is sent to the server. downloaddownload
Downloads a file from the C&C server. The path where the file will be saved on
the victim’s computer is received in a separate message. If NotE is received
instead, the process stops. If the path is an absolute path, and the parent
folder doesn’t exist, then the backdoor sends NOT. Otherwise, it sends Exists,
to which the server replies by sending the size of the file. Then the backdoor
sends ok, sleeps for 1 second, and then receives the file as raw bytes.
Execute with  cmd.exeWhen neither of the previous commands are received, the
message is taken as a command to be executed with cmd.exe. The output is sent to
the server.

TechnoCreep persists by copying its executable to the Startup folder, as shown
in Figure 11. Identical code can also be found in some versions of DeepCreep.
Note that no LNK files are used in this method.

Figure 11. TechnoCreep code establishing persistence


PAPACREEP

PapaCreep is a previously undocumented custom backdoor written in C++ that can
receive and execute commands from a remote server via TCP sockets. First seen in
September 2022, this is the first backdoor used by POLONIUM that was not written
in C# or PowerShell.

PapaCreep is a modular backdoor; its code has been divided in various
components, some of them with minimal functionalities. We can summarize the main
components as:

 * Executive: looks for a file with commands and executes them with cmd.exe. The
   output is saved to a file.
 * Mailman: communicates with a C&C server to receive commands and writes them
   to a file. It also sends the file with output from commands to the C&C
   server.
 * CreepyUp: uploads any file to the C&C server.
 * CreepyDown: downloads any file from the C&C server.

The Executive and Mailman components run independently from each other and are
even persisted with separate scheduled tasks in a compromised system.
Communication with the remote server uses raw TCP sockets, but the information
that is sent and received by the backdoor is contained in HTML code (with a fake
HTTP header). Figure 12 shows that the header is hardcoded in the backdoor, and
Content-length is always 1024. Note that Content-Type is text/-html, which is
not a normal value.

Figure 12. Hardcoded HTTP header used by the PapaCreep backdoor

The Mailman component initiates communication with the C&C server by sending
<PC_NAME>-<USERNAME> (base64 encoded). It then starts two threads: one of them
receives commands from the server and the other one sends any available output
from the execution of commands. Delimiters are used for both sending and
receiving: code#s and code#f are used to mark the start and end of the data. An
example of a message sent to the server with the output of a dir command is
shown in Figure 13.

Figure 13. Example of a message sent to the C&C server, and the decoded content

If the content is bigger than 1024 bytes, more than one message will be
transmitted. In that case, the first message will have the start delimiter and
the final message will have the end delimiter. The IP address and port of the
C&C server is read from a text file, yetty.dll, with the format
<IP_address>::<port> (base64 encoded).

The CreepyUp and CreepyDown modules are not part of the main flow of execution
of the backdoor and can be executed on demand. They are standalone command line
tools that take two arguments, a local and a remote file. Curiously,
CreepyDown’s filename in compromised computers is UCLN.exe and CreepyUp is
DCLN.exe. This is similar as the commands upload and download in the FlipCreep
backdoor that do the opposite of what is expected. Both CreepyUp and CreepyDown
read the server information from the yetty.dll text file.


OTHER MODULES

To spy on their victims, POLONIUM uses several other modules on top of their
backdoors, including reverse shell modules and a module for creating a tunnel.
ESET researchers have observed many variants of the modules that the group uses
for taking screenshots. As for keyloggers, POLONIUM has used both custom and
open-source ones. The group’s custom keylogger monitors keystrokes and clipboard
contents and supports both Hebrew and Arabic keyboards. POLONIUM has also used a
simple module that uses AForge.NET to take a snapshot from the webcam and save
it in the TEMP folder.


NETWORK INFRASTRUCTURE

POLONIUM didn’t use domain names in any of the samples that we analyzed, only IP
addresses. Most of the servers are dedicated VPS, likely purchased rather than
compromised, hosted at HostGW. There is one special case: IP address
45.80.149[.]154 hosts erichmocanu.tv, which seems to be a legitimate website. It
is likely that POLONIUM used this server before it was assigned to its current
owner.


CONCLUSION

POLONIUM is a very active threat actor with a vast arsenal of malware tools and
is constantly modifying them and developing new ones. A common characteristic of
several of the group’s tools is the abuse of cloud services such as Dropbox,
Mega and OneDrive for C&C communications.

Intelligence and public reports about POLONIUM are very scarce and limited,
likely because the group’s attacks are highly targeted, and the initial
compromise vector is not known. ESET Research will continue to track its
activities and document its attacks.



For any inquiries about our research published on WeLiveSecurity, please contact
us at threatintel@eset.com.



ESET Research also offers private APT intelligence reports and data feeds. For
any inquiries about this service, visit the ESET Threat Intelligence page.




IOCS

A comprehensive list of Indicators of Compromise and samples can be found in our
GitHub repository.

SHA-1FilenameESET detection nameDescription
3F4E3C5301752D39DAF97384CCA47564DA1C3314dnw.exePowerShell/Agent.GJCreepyDrive
CC820ED9A23084104807941B76A2679243BA357CRequest.exePowerShell/Agent.HFCreepySnail
03A35A0167684E6CCCA641296969972E49B88D60DropBox.exeMSIL/Agent.DPTDeepCreep
4E7DBFF20995E97190536B284D7E5CC65922FD55Mega.exeMSIL/Agent.DPTMegaCreep
994EAD7666A67E33C57A51EF98076D41AABB7FB7Regestries.exeMSIL/Tiny.DGFlipCreep
79DE0AF2F10F8D39A93EED911D4048D87E3C8A1CWinUpdate.dllMSIL/Agent.DYUTechnoCreep
2B9444B0E1747EB4F482D29C9DE27D07CCE55A76WindowsSartup22.exeWin64/HackTool.NetHacker.GPapaCreep
F26F43AD2E2980B96497242A3F30CA003E5CF54CWinSc.exeMSIL/Tiny.DGScreenshots module
F41E27C4C863821DE6CAD91CA7E77CD6CA6CE5D34kyro3fs.dllMSIL/Spy.Keylogger.FGCKeylogger
module 94E75BA7C4476AFDACF4B39E403379C5ECD1BED6Device.exeMSIL/Spy.Tiny.CZWebcam
module B87CC5269A5DF5CF093F8D28DF78952F662162B6OnDrive.exeMSIL/Agent.DTPReverse
shell module
809048A40274350BD0C453E49D8C1F7D32397164Rehost.exeMSIL/Spy.Tiny.DAExfiltration
module 43E3C3752A15D0BDE7135E1B52F1DE397B5314B5Microsoft Malware
Protection.exeMSIL/Agent.DYVTunnels module


NETWORK

IPFirst seenDetails 37.120.233[.]892022-09-12PapaCreep C&C
45.80.148[.]119:80802022-05-21Reverse shell server 45.80.148[.]167:21
45.80.148[.]167:5055
2021-11-27Exfiltration 45.80.148[.]186:80802022-01-08Reverse shell server
45.80.149[.]22:80802022-05-13CreepySnail C&C
45.80.149[.]108:80802022-02-11CreepySnail C&C
45.80.149[.]68:630472022-03-01CreepySnail C&C
45.80.149[.]71:802022-03-11CreepySnail C&C
185.244.129[.]79:630472022-03-01CreepySnail C&C 45.80.149[.]154:1302
45.80.149[.]154:212021-09-23TechnoCreep C&C
Exfiltration 185.244.129[.]216:50552021-11-24Exfiltration
146.70.86[.]6:14332022-05-26Exfiltration
195.166.100[.]23:50552022-01-05Exfiltration
45.137.148[.]7:21212021-10-29FlipCreep C&C
185.203.119[.]99:80802022-02-12Reverse Shell 212.73.150[.]1742022-02-24Tunneling
94.156.189[.]1032022-04-20Tunneling 51.83.246[.]732022-03-12Tunneling


MITRE ATT&CK TECHNIQUES

This table was built using version 11 of the MITRE ATT&CK framework.

TacticIDNameDescription Resource DevelopmentT1583.003Acquire Infrastructure:
Virtual Private ServerPOLONIUM has acquired various servers for C&C and also for
storing exfiltrated files. T1587.001Develop Capabilities: MalwarePOLONIUM has
developed at least six backdoors and several other malicious modules.
T1588.001Obtain Capabilities: MalwarePOLONIUM has used a publicly available
keylogger. ExecutionT1059.001Command and Scripting Interpreter:
PowerShellPOLONIUM has used the CreepySnail and CreepyDrive PowerShell backdoors
in their attacks. T1059.003Command and Scripting Interpreter: Windows Command
ShellDeepCreep, MegaCreep, FlipCreep and TechnoCreep use cmd.exei to execute
commands in a compromised computer. T1129Shared ModulesDeepCreep and MegaCreep
have their code divided into small DLLs, which are loaded both statically and
dynamically. PersistenceT1547.009Boot or Logon Autostart Execution: Shortcut
ModificationPOLONIUM’s backdoors persist by writing shortcuts to the Windows
Startup folder. T1053.005Scheduled Task/Job: Scheduled TaskDeepCreep, MegaCreep
and FlipCreep create scheduled tasks for persistence. Defense
EvasionT1140Deobfuscate/Decode Files or InformationDeepCreep and MegaDeep use
AES encryption to obfuscate commands and login credentials stored in local files
on the victim’s computer. T1070.004Indicator Removal on Host: File
DeletionPOLONIUM’s exfiltration modules delete screenshot files or keystroke
logs from a compromised host after they are exfiltrated. T1036.005Masquerading:
Match Legitimate Name or LocationPOLONIUM has used filenames such as Mega.exei
or DropBox.exei for its backdoors, to make them look like legitimate binaries.
T1218.004System Binary Proxy Execution: InstallUtilPOLONIUM has used
InstallUtil.exei to execute DeepCreep. T1083File and Directory
DiscoveryPOLONIUM’s custom exfiltrator module builds a listing of files for any
given folder. T1057Process DiscoveryDeepCreep, MegaCreep and FlipCreep look for
running processes and kill other instances of themselves. T1082System
Information DiscoveryTechnoCreep and POLONIUM’s reverse shell module send
information such as computer name, username, and operating system to a remote
server, in order to identify their victims. T1016System Network Configuration
DiscoveryTechnoCreep sends a list of IP addresses associated with a victim’s
computer. T1033System Owner/User DiscoveryPOLONIUM has executed whoami.exei to
identify the logged-on user. CollectionT1560.002Archive Collected Data: Archive
via LibraryDeepCreep, MegaCreep and FlipCreep use .NET’s ZipFile class to
archive collected data. T1115Clipboard DataPOLONIUM’s custom keylogger retrieves
clipboard data from compromised computers. T1005Data from Local SystemPOLONIUM’s
exfiltrator module collects files from a compromised system. T1056.001Input
Capture: KeyloggingPOLONIUM has used custom and publicly available keyloggers.
T1113Screen CapturePOLONIUM has used custom modules for taking screenshots.
T1125Video CapturePOLONIUM has used a custom module to capture images using the
compromised computer’s webcam. Command and ControlT1071.001Application Layer
Protocol: Web ProtocolsCreepySnail and POLONIUM’s file exfiltrator modules use
HTTP communication with the C&C server. T1071.002Application Layer Protocol:
File Transfer ProtocolsFlipCreep and POLONIUM’s file exfiltrator modules use FTP
communication with the C&C server. T1132.001Data Encoding: Standard
EncodingCreepySnail, CreepyDrive and some of POLONIUM’s reverse shell modules
use base64-encoded commands to communicate with the C&C server.
T1573.001Encrypted Channel: Symmetric CryptographyDeepCreep and MegaCreep AES
encrypt commands and their output. T1095Non-Application Layer
ProtocolTechnoCreep and POLONIUM’s reverse shell module use TCP.
T1571Non-Standard PortPOLONIUM has used non-standard ports, such as 5055 or
63047, for HTTP. T1572Protocol TunnelingPOLONIUM’s tunnels module uses the Plink
utility to create SSH tunnels. T1102.002Web Service: Bidirectional
CommunicationPOLONIUM has used cloud platforms such as OneDrive, Dropbox, and
Mega to send commands and store the output. ExfiltrationT1041Exfiltration Over
C2 ChannelDeepCreep, MegaCreep, FlipCreep and TechnoCreep exfiltrate files over
the C&C channel via uploadi commands. T1567.002Exfiltration Over Web Service:
Exfiltration to Cloud StoragePOLONIUM has used OneDrive, Dropbox, and Mega cloud
storage to store stolen information.




Matías Porolli
11 Oct 2022 - 11:30AM


SIGN UP TO RECEIVE AN EMAIL UPDATE WHENEVER A NEW ARTICLE IS PUBLISHED IN OUR
UKRAINE CRISIS – DIGITAL SECURITY RESOURCE CENTER

Submit


NEWSLETTER

Submit


SIMILAR ARTICLES

ESET Research

AMAZON-THEMED CAMPAIGNS OF LAZARUS IN THE NETHERLANDS AND BELGIUM

ESET Research

YOU NEVER WALK ALONE: THE SIDEWALK BACKDOOR GETS A LINUX VARIANT

Cybersecurity

RDP ON THE RADAR: AN UP-CLOSE VIEW OF EVOLVING REMOTE ACCESS THREATS

ESET Research

WOROK: THE BIG PICTURE


DISCUSSION


 * Home
 * About Us
 * Contact Us

 * Sitemap
 * Our Experts
 * ESET

 * Research
 * How To
 * Categories

 * RSS Configurator
 * News Widget

Privacy Policy Legal Information
Copyright © ESET, All Rights Reserved
Back to top

Cookies make a website a better place
We use cookies to give you the best optimized online experience and consistent
information. You can agree to the collection of all cookies by clicking on the
Accept & Close button or adjust your cookies settings by clicking on Manage
Cookies. For more information please see our Cookie Policy.
Accept all and close
Manage cookies
Essential cookies
These cookies allow our website to function properly , and perform actions like
holding your items in your cart or automatically showing content in your
preferred language.
Analytics cookies
These cookies helps us improve our website by understanding how our visitors
interact with websites by collecting and reporting information anonymously.
Marketing cookies
These cookies allow us, to some extent, to track your online activity. This
benefits you as we can limit the number of ads you see by showing only those
that are relevant to you.
Accept and close
Back