www.trendmicro.com Open in urlscan Pro
104.77.34.222  Public Scan

Submitted URL: https://visit.trendmicro.com/OTQ1LUNYRC0wNjIAAAGKpgYT-FUrsDjrpA38q-8p3tHbqyz_9B9BGTl1zTjkGewljLwXufj3_PuPnS9g5A31ffwBPuM=
Effective URL: https://www.trendmicro.com/en_us/research/23/c/iron-tiger-sysupdate-adds-linux-targeting.html?mkt_tok=OTQ1LUNYRC0wNjIAAAGKp...
Submission: On March 26 via api from IN — Scanned from DE

Form analysis 3 forms found in the DOM

<form class="main-menu-search" aria-label="Search Trend Micro">
  <div class="main-menu-search__field-wrapper" id="cludo-search-form">
    <table cellspacing="0" cellpadding="0" class="gsc-search-box" style="width:100%">
      <tbody>
        <tr>
          <td class="gsc-input">
            <input type="text" size="10" class="gsc-input" name="search" title="search" placeholder="Search Trend Micro" autocomplete="off">
          </td>
        </tr>
      </tbody>
    </table>
  </div>
</form>

<form class="main-menu-search" aria-label="Search Trend Micro">
  <div class="main-menu-search__field-wrapper" id="cludo-search-form-mobile">
    <table cellspacing="0" cellpadding="0" class="gsc-search-box" style="width:100%">
      <tbody>
        <tr>
          <td class="gsc-input">
            <input type="text" size="10" class="gsc-input" name="search" title="search" placeholder="Search Trend Micro" autocomplete="off">
          </td>
          <td class="gsc-search-close collapsed" style="width:1%;" data-target="#search-mobile-wrapper" data-toggle="collapse">
            <span class="icon-close"></span>
          </td>
        </tr>
      </tbody>
    </table>
  </div>
</form>

POST #

<form class="acsb-form" data-acsb-search="form" enctype="multipart/form-data" action="#" method="POST"> <input type="text" tabindex="0" name="acsb_search" autocomplete="off" placeholder="Unclear content? Search in dictionary..."
    aria-label="Unclear content? Search in dictionary..."> <i class="acsbi-search"></i> <i class="acsbi-chevron_down"></i> </form>

Text Content

Trend Micro Acquires SOC Technology Expert Anlyz


Learn more >
Use Website In a Screen-Reader Mode
Skip to Content
↵ENTER
Skip to Menu
↵ENTER
Skip to Footer
↵ENTER

dismiss
0 Alerts
undefined

 * No new notifications at this time.

Download
 * Scan Engines
 * All Pattern Files
 * All Downloads
 * Subscribe to Download Center RSS

Buy
 * Find a Partner
 * Home Office Online Store
 * Renew Online
 * Free Tools
 * Contact Sales
 * Locations Worldwide
 * 1-888-762-8736 (M-F 8am - 5pm CST)
 * Small Business
 * Buy Online
 * Renew Online

Region
 * The Americas
 * United States
 * Brasil
 * Canada
 * México
 * Middle East & Africa
 * South Africa
 * Middle East and North Africa

 * Europe
 * België (Belgium)
 * Česká Republika
 * Danmark
 * Deutschland, Österreich Schweiz
 * España
 * France
 * Ireland
 * Italia
 * Nederland

 * Norge (Norway)
 * Polska (Poland)
 * Suomi (Finland)
 * Sverige (Sweden)
 * Türkiye (Turkey)
 * United Kingdom

 * Asia & Pacific
 * Australia
 * Центральная Азия (Central Asia)
 * Hong Kong (English)
 * 香港 (中文) (Hong Kong)
 * भारत गणराज्य (India)
 * Indonesia
 * 日本 (Japan)
 * 대한민국 (South Korea)
 * Malaysia
 * Монголия (Mongolia) and рузия (Georgia)
 * New Zealand

 * Philippines
 * Singapore
 * 台灣 (Taiwan)
 * ประเทศไทย (Thailand)
 * Việt Nam

Log In
 * Business Support Portal
 * Log In to Support
 * Partner Portal
 * Home Solutions
 * My Account
 * Lost Device Portal
 * Trend Micro Vault
 * Password Manager
 * Customer Licensing Portal
 * Online Case Tracking
 * Worry-Free Business Security Services
 * Remote Manager
 * Cloud One
 * Referral Affiliate
 * Referral Affiliate

Free trials
 * Cloud
 * Detection and Response
 * User Protection

Folio (0)
Contact Us
 * Contact Sales
 * Locations
 * Support
 * Find a Partner
 * Learn of upcoming events
 * Social Media Networks
 * Facebook
 * Twitter
 * Linkedin
 * Youtube
 * Instagram
 * 1-888-762-8736 (M-F 8-5 CST)


Business 
 

Solutions Solutions
Platform
Trend Micro One
By Challenge
Understand, Prioritize & Mitigate Risks
Secure Cloud-Native Apps
Hybrid cloud transformation
Securing your workforce infrastructure
Eliminate network blindspots
See more and respond faster
Threats Agilely to Extending your team resources
By Role
CISO/CIO
SOC Manager
Infrastructure Manager
Cloud Builder and Developer
Cloud Security Ops
By Industry
Healthcare
Manufacturing
Oil & Gas
Electric Utility
Federal
Automotive
5G Networks
Products Products
Cloud Security
Cloud Security Overview
Workload Security
Cloud Security Posture Management
Container Security
File Storage Security
Endpoint Security
Network Security
Open Source Security
Cloud Visibility
Network Security
Network Security Overview
Network Intrusion Prevention (IPS)
Breach Detection System (BDS)
Secure Service Edge (SSE)
OT & ICS Security
Endpoint & Email Security
Endpoint & Email Security Overview
Endpoint Protection
Email Security
Mobile Security
Security Operations
Security Operations Overview
Attack Surface Management
XDR (Extended Detection & Response)
Threat Intelligence
All Products & Trials

Our Unified Platform

Service Packages

Small & Midsize Business Security

Services Services
Our Services
Service Packages
Managed XDR
Support Services
Research Research
Research
About Our Research
Research, News and Perspectives
Research and Analysis
Blog
Security Reports
Security News
Zero Day Initiatives (ZDI)
Resources
CISO Resource Center
DevOps Resource Center
Cyber Risk Index/Assessment
Threat Encyclopedia
What Is?
Glossary of Terms

EXPLORE THE CYBER RISK INDEX (CRI)

Use the CRI to assess your organization’s preparedness against attacks, and get
a snapshot of cyber risk across organizations globally.

Calculate your risk
Partners Partners
Channel Partners
Channel Partner Overview
Managed Service Provider
Cloud Service Provider
Professional Services
Resellers
Marketplace
System Integrators
Alliance Partners
Alliance Overview
Technology Alliance Partners
Our Alliance Partners
Partner Tools
Partner Login
Education and Certification
Partner Successes
Distributors
Find a Partner
About About
Why Trend Micro
The Trend Micro Difference
Customer Success Stories
The Human Connections
Industry Accolades
Strategic Alliances
Company
Trust Center
History
Diversity, Equity & Inclusion
Corporate Social Responsibility
Leadership
Security Experts
Internet Safety and Cybersecurity Education
Legal
Resources
Newsroom
Events
Investors
Careers
Webinars



×
Folio (0)
0 Alerts
undefined

 * No new notifications at this time.

Download
 * Scan Engines
 * All Pattern Files
 * All Downloads
 * Subscribe to Download Center RSS

Buy
 * Find a Partner
 * Home Office Online Store
 * Renew Online
 * Free Tools
 * Contact Sales
 * Locations Worldwide
 * 1-888-762-8736 (M-F 8am - 5pm CST)
 * Small Business
 * Buy Online
 * Renew Online

Region
 * The Americas
 * United States
 * Brasil
 * Canada
 * México
 * Middle East & Africa
 * South Africa
 * Middle East and North Africa

 * Europe
 * België (Belgium)
 * Česká Republika
 * Danmark
 * Deutschland, Österreich Schweiz
 * España
 * France
 * Ireland
 * Italia
 * Nederland

 * Norge (Norway)
 * Polska (Poland)
 * Suomi (Finland)
 * Sverige (Sweden)
 * Türkiye (Turkey)
 * United Kingdom

 * Asia & Pacific
 * Australia
 * Центральная Азия (Central Asia)
 * Hong Kong (English)
 * 香港 (中文) (Hong Kong)
 * भारत गणराज्य (India)
 * Indonesia
 * 日本 (Japan)
 * 대한민국 (South Korea)
 * Malaysia
 * Монголия (Mongolia) and рузия (Georgia)
 * New Zealand

 * Philippines
 * Singapore
 * 台灣 (Taiwan)
 * ประเทศไทย (Thailand)
 * Việt Nam

Log In
 * Business Support Portal
 * Log In to Support
 * Partner Portal
 * Home Solutions
 * My Account
 * Lost Device Portal
 * Trend Micro Vault
 * Password Manager
 * Customer Licensing Portal
 * Online Case Tracking
 * Worry-Free Business Security Services
 * Remote Manager
 * Cloud One
 * Referral Affiliate
 * Referral Affiliate

Free trials
 * Cloud
 * Detection and Response
 * User Protection

Folio (0)
Contact Us
 * Contact Sales
 * Locations
 * Support
 * Find a Partner
 * Learn of upcoming events
 * Social Media Networks
 * Facebook
 * Twitter
 * Linkedin
 * Youtube
 * Instagram
 * 1-888-762-8736 (M-F 8-5 CST)


 * No new notifications at this time.
 * No new notifications at this time.

 * Scan Engines
 * All Pattern Files
 * All Downloads
 * Subscribe to Download Center RSS

 * Find a Partner
 * Home Office Online Store
 * Renew Online
 * Free Tools
 * Contact Sales
 * Locations Worldwide
 * 1-888-762-8736 (M-F 8am - 5pm CST)
 * Small Business
 * Buy Online
 * Renew Online

 * The Americas
 * United States
 * Brasil
 * Canada
 * México
 * Middle East & Africa
 * South Africa
 * Middle East and North Africa

 * Europe
 * België (Belgium)
 * Česká Republika
 * Danmark
 * Deutschland, Österreich Schweiz
 * España
 * France
 * Ireland
 * Italia
 * Nederland

 * Norge (Norway)
 * Polska (Poland)
 * Suomi (Finland)
 * Sverige (Sweden)
 * Türkiye (Turkey)
 * United Kingdom

 * Asia & Pacific
 * Australia
 * Центральная Азия (Central Asia)
 * Hong Kong (English)
 * 香港 (中文) (Hong Kong)
 * भारत गणराज्य (India)
 * Indonesia
 * 日本 (Japan)
 * 대한민국 (South Korea)
 * Malaysia
 * Монголия (Mongolia) and рузия (Georgia)
 * New Zealand

 * Philippines
 * Singapore
 * 台灣 (Taiwan)
 * ประเทศไทย (Thailand)
 * Việt Nam

 * Business Support Portal
 * Log In to Support
 * Partner Portal
 * Home Solutions
 * My Account
 * Lost Device Portal
 * Trend Micro Vault
 * Password Manager
 * Customer Licensing Portal
 * Online Case Tracking
 * Worry-Free Business Security Services
 * Remote Manager
 * Cloud One
 * Referral Affiliate
 * Referral Affiliate

 * Cloud
 * Detection and Response
 * User Protection

 * Contact Sales
 * Locations
 * Support
 * Find a Partner
 * Learn of upcoming events
 * Social Media Networks
 * Facebook
 * Twitter
 * Linkedin
 * Youtube
 * Instagram
 * 1-888-762-8736 (M-F 8-5 CST)

undefined



APT & Targeted Attacks
Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting

Subscribe

Content added to Folio

Folio (0) close

APT & Targeted Attacks


IRON TIGER’S SYSUPDATE REAPPEARS, ADDS LINUX TARGETING

We detail the update that advanced persistent threat (APT) group Iron Tiger made
on the custom malware family SysUpdate. In this version, we also found
components that enable the malware to compromise Linux systems.

By: Daniel Lunghi March 01, 2023 Read time: 11 min (3060 words)

Save to Folio

Subscribe

--------------------------------------------------------------------------------

Iron Tiger is an advanced persistent threat (APT) group that has been focused
primarily on cyberespionage for more than a decade. In 2022, we noticed that
they updated SysUpdate, one of their custom malware families, to include new
features and add malware infection support for the Linux platform. 

We found the oldest sample of this updated version in July 2022. At the time, we
attributed the sample to Iron Tiger but had not yet identified the final
payload. It was only after finding multiple similar payloads in late October
2022 that we looked further and found similarities with the SysUpdate malware
family that had also been updated in 2021. As with the previous version, Iron
Tiger had made the loading logic complex, probably in an attempt to evade
security solutions.

This new version has similar features to the 2021 version, except that the C++
run-time type information (RTTI) classes we previously observed in 2021 had been
removed, and that the code structure was changed to use the ASIO C++
asynchronous library. Both changes make reverse engineering the samples longer.
We strongly advise organizations and users in the targeted industries to
reinforce their security measures to defend their systems and stored information
from this ongoing campaign.

Campaign development timeline

These are the key dates for understanding the chronology of Iron Tiger’s
operations:

 * Apr. 2, 2022: Registration of the domain name linked to our oldest Windows
   sample of SysUpdate
 * May 11, 2022: The command and control (C&C) infrastructure was set up.
 * June 8, 2022: While this could have been tampered with, observed compilation
   date of our oldest Windows sample.
 * July 20, 2022: Oldest Windows sample gets uploaded to Virus Total
 * Oct. 24, 2022: Oldest Linux sample gets uploaded to Virus Total

We observed that the attacker registered the oldest domain name one month before
starting the C&C configuration then waited one more month before compiling the
malicious sample linked to that domain name. We think the gap between the two
updates allows the attackers to plan their operations accordingly.

Loading process

We observed the loading process entailing the following steps:

 * The attacker runs rc.exe, a legitimate “Microsoft Resource Compiler” signed
   file , which is vulnerable to a DLL side-loading vulnerability, and loads a
   file named rc.dll.
 * The malicious rc.dll loads a file named rc.bin in memory.
 * The rc.bin file is a Shikata Ga Nai encoded shellcode that decompresses and
   loads the first stage in memory. Depending on the number of command line
   parameters, different actions are performed:
   *     Zero or two parameters: “Installs” the malware in the system, and calls
     Stage 1 again via process hollowing with four parameters
   *     One parameter: Same as previous action but without the “installation”
   *     Four parameters: Creates a memory section with the DES-encrypted
     malware configuration and a second Shikata Ga Nai shellcode decompressing
     and loading Stage 2. It then runs Stage 2 via process hollowing.

The “installation” step is considered simple wherein the malware moves the files
to a hardcoded folder. Depending on the privileges of the process, the malware
either creates a registry key or a service that launches the moved executable
rc.exe with one parameter. This ensures that the malware will be launched during
the next reboot, skipping the installation part.

Figure 1. Updated SysUpdate loading process routine

We saw different legitimate executables being used, sideloading different DLL
names, and multiple binary files names being loaded by those DLLs. We identified
the executables and sideloaded files as follows:

Table 1. SysUpdate’s seemingly legitimate executables and their respective
sideloaded files Legitimate application name Certificate signer Side-loaded DLL
name Loaded binary file name INISafeWebSSO.exe Initech inicore_v2.3.30.dll
inicore_v2.3.30.bin rc.exe Microsoft rcdll.dll rcdll.bin dlpumgr32.exe DESlock
DLPPREM32.dll sv.bin GDFInstall.exe UBISOFT ENTERTAINMENT
GameuxInstallHelper.DLL sysconfig.bin route-null.exe Wazuh libwazuhshared.dll
wazuhext.bin route-null.exe Wazuh libwazuhshared.dll agent-config.bin
wazuh-agent.exe Wazuh libwinpthread-1.dll wazuhext.bin

We want to highlight that this is the first time we observed a threat actor
abusing a sideloading vulnerability in a Wazuh signed executable. Wazuh is a
free and open source security platform, and we could confirm that one of the
victims was using the legitimate Wazuh platform. It is highly likely that Iron
Tiger specifically looked for this vulnerability to appear legitimate in the
victim’s environment. We have notified the affected victim of this intrusion but
received no feedback.

Malware features

Looking at the features, several of the functions found in the latest update are
similar to the previous SysUpdate version:

 * Service manager (lists, starts, stops, and deletes services)
 * Screenshot grab
 * Process manager (browses and terminates processes)
 * Drive information retrieval
 * File manager (finds, deletes, renames, uploads, downloads a file, and browses
   a directory)
 * Command execution

Iron Tiger also added a feature that had not been seen before in this malware
family: C&C communication through DNS TXT requests. While DNS is not supposed to
be a communication protocol, the attacker abuses this protocol to send and
receive information. 

Figure 2. C&C communication with DNS TXT records

First, the malware retrieves the configured DNS servers by calling the
GetNetworkParams API function and parsing the DnsServerList linked list. If this
method fails, the malware uses the DNS server operated by Google at IP address
8.8.8.8.

For the first request, the malware generates a random number of 32 bits and
appends 0x2191 to it. This results in six bytes — four for the random number,
two for 0x2191 — and encodes the result further with Base32 algorithm using the
alphabet “abcdefghijklmnopqrstuvwxyz012345”. Looking at Figure 2, the contacted
domain name is after "TXT"; only the first four letters change as the rest of
the encoded series is always the same. This is because the random number changes
every time, but the end is the same “0x2191” result. This explains why the first
DNS request always ends with “reeaaaaaa.<c&c domain>”. If the C&C reply matches
the format expected by the malware, it launches multiple threads that handle
further commands and sends information about the infected machine.

Interestingly, the code related to this DNS C&C communication is only present in
samples that use it, meaning that the builder is modular and that there might be
samples in the wild with unreported features. We continue monitoring this group
and malware family for updates on possible variations of C&C communication
protocols being abused.

In all versions, the malware retrieves information on the infected machine and
sends it to the C&C encrypted with DES. Collected machine information includes
the following:

 * Randomly generated GUID
 * Hostname
 * Domain name
 * Username
 * User privileges
 * Processor architecture
 * Current process ID
 * Operating system version
 * Current file path
 * Local IP address and port used to send the network packet

The configuration is encrypted with a hardcoded DES key and is a few bytes long
following the structure enumerated below:

Table 2. Configuration structure Field content Length (in bytes) Comment Example
Header 4 We only found one value 0x00000001 GUID 38 Follows the Microsoft format
{89D0E853-FA08-4f94-A5FE-A90E6869E074} Size of the C&C section 4   0x00000018
Size of the next C&C domain name and port 4   0x00000014 C&C type 1

0x01 = regular C&C

0x05 = DNS tunneling

0x00 = regular C&C

0x01 C&C domain name Variable   dev.gitlabs.me Port number 4   0x00000050 Size
of next section 4 Next section contains all the hardcoded names (folder, files,
registry values) 0x00000034 Name of the hardcoded directory where files are
copied Variable The folder is located either in % gtdcfp Name of the executable
vulnerable to side loading Variable   TextInputHost.exe Name of the malicious
side-loaded DLL Variable   rc.dll Name of the binary file containing the encoded
Stage 1 Variable   rc.bin Name of the service or registry key value used for
persistence Variable   gtdcfp

We noted that Stage 2 does not embed the configuration file, which is copied in
memory by the previous stage. We only saw one case where there was only one
stage being decrypted in memory and the configuration was hardcoded.

Interestingly, all the samples of this “new” version had a domain name as its
C&C. In the previous version of SysUpdate, the group used hardcoded IP addresses
as C&C. It is possible that this change is a consequence of the new DNS TXT
records’ communication feature as it requires a domain name.

SysUpdate samples for Linux

While investigating SysUpdate’s infrastructure, we found some ELF files linked
to some C&C servers. We analyzed them and concluded that the files were a
SysUpdate version made for the Linux platform. The ELF samples were also written
in C++, made use of the Asio library, shared common network encryption keys, and
had many similar features. For example, the file handling functions are almost
the same. It is possible that the developer made use of the Asio library because
of its portability across multiple platforms.

Some parameters can be passed to the binary (note that “Boolean” refers to
Boolean data that is sent to the C&C):

Table 3. Parameters passed to the binary as observed from Linux SysUpdate
samples Parameter Effect -launch Sets persistence, zeroes boolean, and exits
-run Zeroes boolean and continues -x Daemonize the process, zeroes boolean, and
continues -i Daemonize the process, zeroes boolean, sets persistence, and
continues -f <guid> Sets the GUID to <guid> and continues

The persistence is ensured by copying a script similarly named as the current
filename to the /usr/lib/systemd/system/ directory, and creating a symlink to
this file in the /etc/ystem/system/multi-user.target.wants/ directory. Thus,
this method only works if the current process has root privileges. The content
of the script is:

[Unit]
Description=xxx
[Service]
Type=forking
ExecStart=<path to current file> -x
ExecStop=/usr/bin/id
[Install]
WantedBy=multi-user.target

After running the code dependent on the parameters, if the operator has not
chosen a GUID with the “-f” parameter, the malware generates a random GUID and
writes it to a file similarly named as the current file, with a “d” appended to
it. Then, the malware retrieves information on the compromised computer and
sends it to the C&C.

The following information is sent to the C&C, encrypted with a hardcoded key and
DES CBC algorithm:

 * GUID
 * Host name
 * Username
 * Local IP address and port used to send the request
 * Current PID
 * Kernel version and machine architecture
 * Current file path
 * Boolean (0 if it was launched with exactly one parameter, 1 otherwise)

For the DNS C&C communication version, the malware retrieves the configured DNS
server by reading the content of the /etc/resolv.conf file, or uses the DNS
server operated by Google at IP address 8.8.8.8.

In 2022, we already noticed that this threat actor was interested in platforms
other than Windows, with the rshell malware family running on Linux and Mac OS.
For these reasons, we would not be surprised to see SysUpdate samples for the
Mac OS platform in the future. Interestingly, most of the Linux samples we found
used the new DNS tunneling feature we detailed in Figure 2, while only one of
the Windows’ samples used it.

Certificate compromise

Another interesting part of this campaign is the fact that some of the malicious
files are signed with a certificate with the following signer: “Permyakov Ivan
Yurievich IP”. Looking for that name in search engines brings results from the
official VMProtect website. The email address linked to the Authenticode
certificate also links to that domain name. VMProtect is a commercial software
intended to make analysis of code extremely difficult by implementing a custom
virtual machine with non-standard architecture. The software has been used by
multiple APT and cybercrime groups in the past to obfuscate their malware.

When searching on malware repositories for other files signed by the same
certificate, we find multiple files named “VMProtectDemo.exe”, “VMProtect.exe”,
or “VMProtect_Con.exe”, which suggests that an official demo version of
VMProtect is also signed by this certificate. It appears that the threat actor
managed to retrieve the private key allowing him to sign malicious code. As of
this writing, the certificate is now revoked.

Using stolen certificates to sign malicious code is a common practice for this
threat actor, as we already highlighted in 2015 and in all our recent
investigations. Interestingly, the threat actor not only signed some of its
malicious executables with the stolen certificate, but also used VMProtect to
obfuscate one of them.

In late January 2023, a Redline stealer sample (detected by Trend Micro as
TrojanSpy.Win32.REDLINE.YXDA1Z, SHA256:
e24b29a1df287fe947018c33590a0b443d6967944b281b70fba7ea6556d00109) signed by the
same certificate was uploaded. We do not believe that the stealer is linked to
Iron Tiger, considering that the network infrastructure is different, and
previous reports document the malware’s goals to be centered on committing
cybercrime than data theft. This could mean other users managed to extract the
same private key from the VMProtect demo version, or it was sold in the
underground to different groups, Iron Tiger among them.

Infection vector

We did not find an infection vector. However, we noticed that one of the
executables packed with VMProtect and signed with the stolen certificate was
named “youdu_client_211.9.194.exe”. Youdu is the name of a Chinese instant
messaging application aimed for use of enterprise customers. Its website
mentions multiple customers in many industries, some of them in critical sectors
such as government, energy, healthcare, or banking. But they also have other
customers in industries such as gaming, IT, media, construction, and retail,
apparently all located inside China.

The properties of the malicious file also match the usual Youdu version
numbering. However, the legitimate files are signed with a “Xinda.im”
certificate instead of the stolen VMProtect certificate.

Figure 3. Comparing the properties of the malicious file (left), and properties
of the legitimate Youdu installer (right)

As seen in the product name identified in the malicious file’s properties, we
searched for possible products named “i Talk” but did not find any that could be
related to this investigation. However, we found traces of files from the
legitimate Youdu chat application signed by Xinda.im being copied to folders
named “i Talk” on one victim’s computer. This suggests that some chat
application named “i Talk” might be repackaging components from the official
Youdu client along with malicious executables. It appears that a chat
application was used as a lure to entice the victim into opening the malicious
file. This would be consistent with the tactics, techniques, and procedures
(TTPs) of two previous Iron Tiger campaigns from 2020 and 2021: a documented
compromise of a chat application widely used by the Mongolian government, and a
supply chain attack on Mimi chat, a chat application used in parts of South East
Asia.

Post-exploitation tools

We found a custom Chrome password and cookie grabber that appeared unfamiliar,
and it was compiled and uploaded in September 2022. The file was also signed
with the VMProtect certificate but it was not obfuscated. In general, the
features were simple; the malware decrypts the saved passwords to a file named
“passwords.txt”, and the cookies to a file named “cookies.txt”.

Analyzing its details, the malware first parses the “Local State” file to
retrieve the AES key used to encrypt the cookies and passwords. It then copies
the “Login Data” file to a temporary file “chromedb_tmp”, issues an SQL query to
extract the URL, login, and password fields from the file, and then decrypts
them and appends the result to the “passwords.txt” file.

It proceeds to copy the “Cookies” file to a temporary file “chromedb_tmp”,
extracts multiple fields from it using an SQL query, and then decrypts the
content before copying the result to the “cookies.txt” file. Some specific
cookies related to Google domain names are ignored, probably because they are
mostly related to specific Google features or tracking that are considered
useless by the threat actor.

We found two other samples from this stealer: One compilation date indicated an
executable built in November 2020, and the other one in December 2021, although
those dates could be tampered with. We found those samples were uploaded on
November 2021 and August 2022, meaning this stealer existed since at least late
2021.

Targeting

We identified one gambling company in the Philippines as compromised by this
campaign. Interestingly, the threat actor registered a domain name similar to
the company name and used it as a C&C. This was not surprising as we have
noticed this threat actor targeting this industry since 2019 during our
Operation DRBControl investigation, and later in 2021 with an update of
SysUpdate. We also attempted to notify the company of this incident through all
their listed channels but have received no feedback.

As stated in the “Infection Vector” section, we noticed the Youdu chat
application was probably used as a lure. It is worth mentioning that the
customers mentioned in the Youdu official website are all located inside China,
which could be an indicator of the threat actor’s interest in targets related to
this country.

Conclusion

This investigation confirms that Iron Tiger regularly updates its tools to add
new features and probably to ease their portability to other platforms,
verifying the interest we found from this threat actor for Linux or Mac OS. It
also corroborates this threat actor’s interest in the gambling industry and the
South East Asia region, as we previously noted in 2020 and 2021.

This campaign also substantiates the regular usage of chat applications as
infection vectors from Iron Tiger. We expect to find further updates of these
tools in the future to accommodate other platforms and apps.

As an additional warning, we want to highlight that the targeting can be wider
than the samples and targeting we have already observed. In 2022, we discussed a
campaign targeting Taiwan and the Philippines that made use of HyperBro samples
(detected by Trend Micro as Backdoor.Win32.HYPERBRO.ENC) signed with a stolen
Cheetah certificate. The BfV, a German governmental entity, published a report
in January 2022 mentioning attacks against German companies with HyperBro
samples that were also signed with the same certificate. In October 2022,
Intrinsec reported an incident in a French company also using HyperBro samples
matching the structure we described in our 2021 investigation. This shows the
threat actor is likely to reuse the tools mentioned here in future campaigns
that might target different regions or industries in the short and long term.
Considering the active campaign and regular developments made on this malware
family, organizations are advised to enhance and broaden their current and
established security measures, and heighten overall vigilance for possible
infection vectors that can be abused by this threat group.

Indicators of Compromise (IOCs)

Download the full list of indicators here.

Tags
Malware | Cyber Crime | Exploits & Vulnerabilities | Cyber Threats | APT &
Targeted Attacks | Endpoints | Network | Articles, News, Reports


AUTHORS

 * Daniel Lunghi
   
   Threat Researcher

Contact Us
Subscribe


RELATED ARTICLES

 * Pack it Secretly: Earth Preta’s Updated Stealthy Strategies
 * Patch CVE-2023-23397 Immediately: What You Need To Know and Do
 * ShadowGate Returns With Greenflash Sundown Exploit Kit

See all articles

 * Contact Sales
 * Locations
 * Careers
 * Newsroom
 * Trust Center
 * Privacy
 * Accessibility
 * Support
 * Site map

 * linkedin
 * twitter
 * facebook
 * youtube
 * instagram
 * rss

Copyright © 2023 Trend Micro Incorporated. All rights reserved.

sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk



This website uses cookies for website functionality, traffic analytics,
personalization, social media functionality and advertising. Our Cookie Notice
provides more information and explains how to amend your cookie settings.Learn
more

Cookies Settings Accept


English
Accessibility Adjustments
Reset Settings Statement Hide Interface

Choose the right accessibility profile for you
OFF ON
Seizure Safe Profile Clear flashes & reduces color
This profile enables epileptic and seizure prone users to browse safely by
eliminating the risk of seizures that result from flashing or blinking
animations and risky color combinations.
OFF ON
Vision Impaired Profile Enhances website's visuals
This profile adjusts the website, so that it is accessible to the majority of
visual impairments such as Degrading Eyesight, Tunnel Vision, Cataract,
Glaucoma, and others.
OFF ON
ADHD Friendly Profile More focus & fewer distractions
This profile significantly reduces distractions, to help people with ADHD and
Neurodevelopmental disorders browse, read, and focus on the essential elements
of the website more easily.
OFF ON
Cognitive Disability Profile Assists with reading & focusing
This profile provides various assistive features to help users with cognitive
disabilities such as Autism, Dyslexia, CVA, and others, to focus on the
essential elements of the website more easily.
OFF ON
Keyboard Navigation (Motor) Use website with the keyboard
This profile enables motor-impaired persons to operate the website using the
keyboard Tab, Shift+Tab, and the Enter keys. Users can also use shortcuts such
as “M” (menus), “H” (headings), “F” (forms), “B” (buttons), and “G” (graphics)
to jump to specific elements.

Note: This profile prompts automatically for keyboard users.
OFF ON
Blind Users (Screen Reader) Optimize website for screen-readers
This profile adjusts the website to be compatible with screen-readers such as
JAWS, NVDA, VoiceOver, and TalkBack. A screen-reader is software that is
installed on the blind user’s computer and smartphone, and websites should
ensure compatibility with it.

Note: This profile prompts automatically to screen-readers.
Content Adjustments
Content Scaling
Default

Readable Font
Highlight Titles
Highlight Links
Text Magnifier
Adjust Font Sizing
Default

Align Center
Adjust Line Height
Default

Align Left
Adjust Letter Spacing
Default

Align Right
Color Adjustments
Dark Contrast
Light Contrast
High Contrast
High Saturation
Adjust Text Colors
Cancel
Monochrome
Adjust Title Colors
Cancel
Low Saturation
Adjust Background Colors
Cancel
Orientation Adjustments
Mute Sounds
Hide Images
Read Mode
Reading Guide
Useful Links
Select an option Home Header Footer Main Content
Stop Animations
Reading Mask
Highlight Hover
Highlight Focus
Big Black Cursor
Big White Cursor
HIDDEN_ADJUSTMENTS
Keyboard Navigation
Accessible Mode
Screen Reader Adjustments
Read Mode
Web Accessibility By
Learn More
Choose the Interface Language
English
Español
Deutsch
Português
Français
Italiano
עברית
繁體中文
Pусский
عربى
عربى
Nederlands
繁體中文
日本語
Polski
Türk
Accessibility StatementCompliance status

We firmly believe that the internet should be available and accessible to anyone
and are committed to providing a website that is accessible to the broadest
possible audience, regardless of ability.

To fulfill this, we aim to adhere as strictly as possible to the World Wide Web
Consortium’s (W3C) Web Content Accessibility Guidelines 2.1 (WCAG 2.1) at the AA
level. These guidelines explain how to make web content accessible to people
with a wide array of disabilities. Complying with those guidelines helps us
ensure that the website is accessible to blind people, people with motor
impairments, visual impairment, cognitive disabilities, and more.

This website utilizes various technologies that are meant to make it as
accessible as possible at all times. We utilize an accessibility interface that
allows persons with specific disabilities to adjust the website’s UI (user
interface) and design it to their personal needs.

Additionally, the website utilizes an AI-based application that runs in the
background and optimizes its accessibility level constantly. This application
remediates the website’s HTML, adapts its functionality and behavior for
screen-readers used by blind users, and for keyboard functions used by
individuals with motor impairments.

If you wish to contact the website’s owner please use the website's form

Screen-reader and keyboard navigation

Our website implements the ARIA attributes (Accessible Rich Internet
Applications) technique, alongside various behavioral changes, to ensure blind
users visiting with screen-readers can read, comprehend, and enjoy the website’s
functions. As soon as a user with a screen-reader enters your site, they
immediately receive a prompt to enter the Screen-Reader Profile so they can
browse and operate your site effectively. Here’s how our website covers some of
the most important screen-reader requirements:

 1. Screen-reader optimization: we run a process that learns the website’s
    components from top to bottom, to ensure ongoing compliance even when
    updating the website. In this process, we provide screen-readers with
    meaningful data using the ARIA set of attributes. For example, we provide
    accurate form labels; descriptions for actionable icons (social media icons,
    search icons, cart icons, etc.); validation guidance for form inputs;
    element roles such as buttons, menus, modal dialogues (popups), and others. 
    
    Additionally, the background process scans all of the website’s images. It
    provides an accurate and meaningful image-object-recognition-based
    description as an ALT (alternate text) tag for images that are not
    described. It will also extract texts embedded within the image using an OCR
    (optical character recognition) technology. To turn on screen-reader
    adjustments at any time, users need only to press the Alt+1 keyboard
    combination. Screen-reader users also get automatic announcements to turn
    the Screen-reader mode on as soon as they enter the website.
    
    These adjustments are compatible with popular screen readers such as JAWS,
    NVDA, VoiceOver, and TalkBack.
    
    
 2. Keyboard navigation optimization: The background process also adjusts the
    website’s HTML and adds various behaviors using JavaScript code to make the
    website operable by the keyboard. This includes the ability to navigate the
    website using the Tab and Shift+Tab keys, operate dropdowns with the arrow
    keys, close them with Esc, trigger buttons and links using the Enter key,
    navigate between radio and checkbox elements using the arrow keys, and fill
    them in with the Spacebar or Enter key.
    
    Additionally, keyboard users will find content-skip menus available at any
    time by clicking Alt+2, or as the first element of the site while navigating
    with the keyboard. The background process also handles triggered popups by
    moving the keyboard focus towards them as soon as they appear, not allowing
    the focus to drift outside.
    
    Users can also use shortcuts such as “M” (menus), “H” (headings), “F”
    (forms), “B” (buttons), and “G” (graphics) to jump to specific elements.

Disability profiles supported on our website
 * Epilepsy Safe Profile: this profile enables people with epilepsy to safely
   use the website by eliminating the risk of seizures resulting from flashing
   or blinking animations and risky color combinations.
 * Vision Impaired Profile: this profile adjusts the website so that it is
   accessible to the majority of visual impairments such as Degrading Eyesight,
   Tunnel Vision, Cataract, Glaucoma, and others.
 * Cognitive Disability Profile: this profile provides various assistive
   features to help users with cognitive disabilities such as Autism, Dyslexia,
   CVA, and others, to focus on the essential elements more easily.
 * ADHD Friendly Profile: this profile significantly reduces distractions and
   noise to help people with ADHD, and Neurodevelopmental disorders browse,
   read, and focus on the essential elements more easily.
 * Blind Users Profile (Screen-readers): this profile adjusts the website to be
   compatible with screen-readers such as JAWS, NVDA, VoiceOver, and TalkBack. A
   screen-reader is installed on the blind user’s computer, and this site is
   compatible with it.
 * Keyboard Navigation Profile (Motor-Impaired): this profile enables
   motor-impaired persons to operate the website using the keyboard Tab,
   Shift+Tab, and the Enter keys. Users can also use shortcuts such as “M”
   (menus), “H” (headings), “F” (forms), “B” (buttons), and “G” (graphics) to
   jump to specific elements.

Additional UI, design, and readability adjustments
 1. Font adjustments – users can increase and decrease its size, change its
    family (type), adjust the spacing, alignment, line height, and more.
 2. Color adjustments – users can select various color contrast profiles such as
    light, dark, inverted, and monochrome. Additionally, users can swap color
    schemes of titles, texts, and backgrounds with over seven different coloring
    options.
 3. Animations – epileptic users can stop all running animations with the click
    of a button. Animations controlled by the interface include videos, GIFs,
    and CSS flashing transitions.
 4. Content highlighting – users can choose to emphasize essential elements such
    as links and titles. They can also choose to highlight focused or hovered
    elements only.
 5. Audio muting – users with hearing devices may experience headaches or other
    issues due to automatic audio playing. This option lets users mute the
    entire website instantly.
 6. Cognitive disorders – we utilize a search engine linked to Wikipedia and
    Wiktionary, allowing people with cognitive disorders to decipher meanings of
    phrases, initials, slang, and others.
 7. Additional functions – we allow users to change cursor color and size, use a
    printing mode, enable a virtual keyboard, and many other functions.

Assistive technology and browser compatibility

We aim to support as many browsers and assistive technologies as possible, so
our users can choose the best fitting tools for them, with as few limitations as
possible. Therefore, we have worked very hard to be able to support all major
systems that comprise over 95% of the user market share, including Google
Chrome, Mozilla Firefox, Apple Safari, Opera and Microsoft Edge, JAWS, and NVDA
(screen readers), both for Windows and MAC users.

Notes, comments, and feedback

Despite our very best efforts to allow anybody to adjust the website to their
needs, there may still be pages or sections that are not fully accessible, are
in the process of becoming accessible, or are lacking an adequate technological
solution to make them accessible. Still, we are continually improving our
accessibility, adding, updating, improving its options and features, and
developing and adopting new technologies. All this is meant to reach the optimal
level of accessibility following technological advancements. If you wish to
contact the website’s owner, please use the website's form

Hide Accessibility Interface? Please note: If you choose to hide the
accessibility interface, you won't be able to see it anymore, unless you clear
your browsing history and data. Are you sure that you wish to hide the
interface?
Accept Cancel

Continue



Processing the data, please give it a few seconds...
Press Alt+1 for screen-reader mode


Sumo