www.fortinet.com
Open in
urlscan Pro
2600:1f18:1492:1702:852f:d87f:6683:b05a
Public Scan
URL:
https://www.fortinet.com/blog/threat-research/emansrepo-stealer-multi-vector-attack-chains?&web_view=true
Submission: On September 05 via api from IN — Scanned from US
Submission: On September 05 via api from IN — Scanned from US
Form analysis
1 forms found in the DOMGET /blog/search
<form class="b3-searchbox__form" action="/blog/search" method="get">
<input class="b3-searchbox__input" type="text" name="q" placeholder="Search Blogs">
<button class="b3-searchbox__icon" aria-label="Search" type="submit">
<svg viewBox="0 0 16 16" xmlns="http://www.w3.org/2000/svg">
<path
d="M15.688 14.18l-4.075-4.075C12.36 9.06 12.8 7.78 12.8 6.4 12.8 2.87 9.93 0 6.4 0 2.87 0 0 2.87 0 6.4c0 3.53 2.87 6.4 6.4 6.4 1.38 0 2.66-.44 3.705-1.187l4.075 4.075c.207.208.48.312.753.312.274 0 .547-.104.755-.312.416-.417.416-1.093 0-1.51zM2.133 6.4c0-2.357 1.91-4.267 4.267-4.267s4.267 1.91 4.267 4.267-1.91 4.267-4.267 4.267S2.133 8.757 2.133 6.4z"
fill="#fff">
</path>
</svg>
</button>
</form>
Text Content
Blog * Categories * Business & Technology * FortiGuard Labs Threat Research * Industry Trends * Life at Fortinet * Partners * Customer Stories * PSIRT Blogs * Business & Technology * FortiGuard Labs Threat Research * Industry Trends * Life at Fortinet * Partners * Customer Stories * PSIRT Blogs * CISO Collective * Subscribe FortiGuard Labs Threat Research EMANSREPO STEALER: MULTI-VECTOR ATTACK CHAINS By Pei Han Liao | September 03, 2024 * Article Contents * Attack Flow * Python Infostealer * New Campaign * Conclusion Fortinet Protections * IOCs AddressEmail addressPhishing mailDeliveryMalware By Pei Han Liao | September 03, 2024 Affected Platforms: Microsoft Windows Impacted Users: Microsoft Windows Impact: The stolen information can be used for future attack Severity Level: High In August 2024, FortiGuard Labs observed a python infostealer we call Emansrepo that is distributed via emails that include fake purchase orders and invoices. Emansrepo compresses data from the victim’s browsers and files in specific paths into a zip file and sends it to the attacker’s email. According to our research, this campaign has been ongoing since November 2023. The attacker sent a phishing mail containing an HTML file, which was redirected to the download link for Emansrepo. This variant is packaged by PyInstaller so it can run on a computer without Python. Figure 1: Attack flow in November 2023 Figure 2: The download link for Emansrepo is embedded in RTGS Invoices.html. As time goes by, the attack flow has become increasingly complex. Below are the attack flows we found in July and August 2024: Figure 3: Attack flow in August and July 2024 Various stages are being added to the attack flow before downloading Emansrepo, and multiple mailboxes are used to receive different kinds of stolen data. This article will provide a detailed analysis of each attack chain and its behavior. We will then provide a quick summary of the next campaign. ATTACK FLOW * Chain 1 Figure 4: The phishing mail in chain 1 contains a fake download page The attachment is a dropper that mimics a download page. It creates a link element that points to the data of Purchase-Order.7z and uses the click() method to “download” Purchase-Order.7z. Six seconds later, it redirects to a completely unrelated website. Figure 5: Source code of the attachment Purchase-Order.exe, the file embedded in Purchase-Order.7z, is an AutoIt-compiled executable. It doesn’t include any files, and the AutoIt script determines its behavior. The script has many unused functions, frustrating its analysis. The only meaningful code downloads preoffice.zip to the Temp folder and unzips it into % TEMP%\PythonTemp. The zip archive contains necessary Python modules and tester.py, the malicious script for information stealing. Figure 6: The AutoIt script downloads the Python infostealer * Chain 2 Figure 7: The phishing mail in chain 2 The innermost file in P.O.7z is an HTA file. Its source file is a JavaScript file that shows a hidden window named PowerShell Script Runner and downloads the PowerShell script, script.ps1, with VBScript for the next stage. Figure 8: The decryption algorithm of the JavaScript file and the result The behavior of script.ps1 is similar to the AutoIt script in chain 1. It downloads preoffice.zip to the Temp folder and unzips it to %TEMP%\PythonTemp, but it executes Emansrepo using run.bat. Figure 9: script.ps1 executes run.bat to run the infostealer * Chain 3 Figure 10: The phishing mail in chain 3 The 7z file from the link in the phishing mail contains a batch file obfuscated by BatchShield. Figure 11: The obfuscated batch file After deobfuscation, we can see that it is not as complicated as it first seems. It simply downloads and executes script.ps1 using PowerShell. Figure 12: The deobfuscated batch file PYTHON INFOSTEALER According to the email receiving the data, the infostealer behavior can be divided into three parts. It creates folders to temporarily store the stolen data for each part and deletes them after sending the data to the attacker. The stolen data is attached to the email sent to the attacker. * Part 1 – User information and text files In part 1, the Python stealer collects login data, credit card information, web history, download history, autofill, and text files (less than 0.2 MB) from the Desktop, Document, and Downloads folders. Sender minesmtp8714@maternamedical[.]top Receiver minestealer8412@maternamedical[.]top Target Browsers amigo, torch, kometa, orbitum, cent-browser, 7star, sputnik, vivaldi, google-chrome-sxs, google-chrome, epic-privacy-browser, microsoft-edge, uran, yandex, brave, iridium Folder and files %TEMP%\Browsers: * Text files (less than 0.2 MB) copied from Desktop, Document, Downloads %TEMP%\Browsers\{browser name}: * Saved_Passwords.txt, Saved_Credit_Cards.txt, Browser_History.txt, Download_History.txt, Autofill_Data.txt Attachment Zip file of %TEMP%\Browsers folder Part 1 includes the initial features of Emansrepo since there is only code for part 1 in the November 2023 variant (e346f6b36569d7b8c52a55403a6b78ae0ed15c0aaae4011490404bdb04ff28e5). It’s worth noting that emans841 report has been used as the divider in Saved_Passwords.txt since the December 2023 variant (ae2a5a02d0ef173b1d38a26c5a88b796f4ee2e8f36ee00931c468cd496fb2b5a). Because of this, we call it Emansrepo. Figure 13: The content of Saved_Passwords.txt The variant used in November 2023 uses Prysmax Premium as the divider. By comparing the variant in November 2023 with the first edition of the Prysmax stealer shared on GitHub, we find they contain many similar functions, though the Emansrepo stealer had fewer features. However, as parts 2 and 3 were added to Emansrepo, it has become quite different from the Prysmax stealer. Figure 14: Left: Variant in November 2023. Right: First edition of Prysmax Stealer on GitHub * Part2 – PDF files, extensions, crypto wallets, and game platform Part 2 copies PDF files (less than 0.1 MB) from the Desktop, Document, Downloads, and Recents folders and compresses folders of browser extensions, crypto wallets, and game platforms into zip files. Sender extensionsmtp@maternamedical[.]top Receiver filelogs@maternamedical[.]top Target Browsers Opera, Chrome, Brave, Vivaldi, Yandex, Edge Crypto wallet Atomic Wallet, Guarda, Zcash, Armory, Bytecoin, Exodus, Binance, Electrum, Coinomi, jaxx Game platform Steam, Riot Games Browser extension MetaMask, BNB Chain Wallet, Coinbase Wallet, Ronin Wallet, Trust Wallet, Venom Wallet, Sui Wallet, Martian Aptos & Sui Wallet, TronLink, Petra Aptos Wallet, Pontem Crypto Wallet, Fewcha Move Wallet, Math Wallet, Coin98 Wallet, Authenticator, Exodus Web3 Wallet, Phantom, Core | Crypto Wallet & NFT, TokenPocket - Web3 & Nostr Wallet, SafePal Extension Wallet, Solflare Wallet, Kaikas, iWallet, Yoroi, Guarda, Jaxx Liberty, Wombat, Oxygen - Atomic Crypto Wallet, MEW CX, GuildWallet, Saturn Wallet, Station Wallet, Harmony, EVER Wallet, KardiaChain Wallet, Pali Wallet, BOLT X, Liquality Wallet, XDEFI Wallet, Nami, MultiversX Wallet, Temple - Tezos Wallet, XMR.PT Folder and files in temp folder %TEMP%\pdf_temps: * PDF files (less than 0.1 MB) copied from Desktop, Document, Downloads and Recents folder * {extension ID}.zip * {data folder}.zip Attachment All files in pdf_temp * Part 3 – Cookies Part 3 copies cookie files and zips it into {process_name}_cookies.zip. Sender cookiesmtp@maternamedical[.]top Receiver cooklielogs@maternamedical[.]top Target Browsers Chrome, msedge, brave, opera, 360se, 360browser, yandex, UCBrowser, QQBrowser Folder and files in temp folder %TEMP%\cookies_data: * {process_name}_cookies.zip Zip file Zip files in cookies_data NEW CAMPAIGN We recently found another attack campaign using the Remcos malware, which we believe is related to the same attacker because of the phishing email. Figure 15: Left: the email for the Python infostealer. Right: The email for Remcos. As the above screenshot shows, these attacks have the same content but use different methods to distribute malware. The attack flow for Remcos is much simpler. The attacker just sends phishing emails with a malicious attachment. The attachment is a DBatLoader, which downloads and decrypts data for the payload. The payload is a Remcos protected by a packer. Figure 16: Attack flow of new Remcos campaign CONCLUSION Emansrepo has been active since at least last November, and the attack method is continuously evolving. The attack vectors and malware are ever-changing and pervasive, so it’s vital for organizations to maintain cybersecurity awareness. FortiGuard will continue monitoring these attack campaigns and providing appropriate protections as required. FORTINET PROTECTIONS The malware described in this report is detected and blocked by FortiGuard Antivirus as: W32/Kryptik.EB!tr JS/Agent.FEI!tr BAT/Downloader.2C22!tr FortiGate, FortiMail, FortiClient, and FortiEDR support the FortiGuard AntiVirus service. The FortiGuard AntiVirus engine is part of each solution. As a result, customers who have these products with up-to-date protections are already protected. The FortiGuard CDR (content disarm and reconstruction) service can disarm the embedded link object inside the Excel document. To stay informed of new and emerging threats, you can sign up to receive future alerts. We also suggest our readers go through the free Fortinet Cybersecurity Fundamentals (FCF) training, a module on Internet threats designed to help end users learn how to identify and protect themselves from phishing attacks. FortiGuard IP Reputation and Anti-Botnet Security Service proactively block these attacks by aggregating malicious source IP data from the Fortinet distributed network of threat sensors, CERTs, MITRE, cooperative competitors, and other global sources that collaborate to provide up-to-date threat intelligence about hostile sources. If you believe this or any other cybersecurity threat has impacted your organization, please contact our Global FortiGuard Incident Response Team. IOCS ADDRESS hxxps://bafybeigm3wrvmyw5de667rzdgdnct2fvwumyf6zyzybzh3tqvv5jhlx2ta[.]ipfs[.]dweb[.]link/wetrankfr[.]zip hxxps://bafybeifhhbimsau6a6x4m2ghdmzer5c3ixfztpocqqudlo4oyzer224q4y[.]ipfs[.]w3s[.]link/myscr649612[.]js https://estanciaferreira[.]com[.]br/wp-includes/TIANJIN-DOC-05082024-xls[.]7z hxxps://dasmake[.]top/reader/timer[.]php hxxps://hedam[.]shop/simple/Enquiry.7z 191[.]101[.]130[.]185 192[.]236[.]232[.]35 EMAIL ADDRESS stealsmtp@dasmake[.]xyz hanbox@dasmake[.]xyz publicsmtp@dasmake[.]xyz publicbox@dasmake[.]xyz minesmtp8714@dasmake[.]xyz minestealer8412@dasmake.xyz minesmtp8714@maternamedical[.]top minestealer8412@maternamedical[.]top extensionsmtp@maternamedical[.]top filelogs@maternamedical[.]top cookiesmtp@maternamedical[.]top cooklielogs@maternamedical[.]top PHISHING MAIL a6c2df5df1253f50bd49e7083fef6cdac544d97db4a6c9c30d7852c4fd651921 9e5580d7c3c22e37b589ec8eea2dae423c8e63f8f666c83edabecf70a0948b99 9bd3b8d9ac6ad680b0d0e39b82a439feedd87b9af580f37fa3d80d2c252fef8c 915bad0e2dbe0a18423c046f84d0ff7232fff4e5ba255cc710783f6e4929ab32 64e5c9e7b8dfb8ca8ca73895aa51e585fa7e5414f0e1d10659d3a83b9f770333 b343cce5381b8633b3fd3da56698f60db70c75422e120235a00517d519e37d8d 32bcbce53bfee33112b447340e7114d6d46be4ccf1a5391ad685431afdc8fb86 DELIVERY bee8da411e71547ac765a5e63e177b59582df438432cc3b540b57a6f1a56dd16 70ba3d67b476e98419ecbbbb5d81efcb5a07f55a92c96e7b9207176746e3b7a6 a2fa6790035c7af64146158f1ed20cb54f4589783e1f260a5d8e4f30b81df70d 4cd8c9fa7f5e2484b73ed9c7be55aa859969c3f21ca2834610102231d337841d 6670e5c7521966e82d091e7adff4e16335f03f2e2740b653adcc9bfe35c7bf9b dd656953a6844dd9585f05545a513c4e8c2ded13e06cdb67a0e58eda7575a7a4 9866934dd2b4e411cdabaa7a96a63f153921a6489f01b0b40d7febed48b02c22 MALWARE e346f6b36569d7b8c52a55403a6b78ae0ed15c0aaae4011490404bdb04ff28e5 8e43c97e5bc62211b3673dee13e376a1f5026502ebe9fd9f7f455dc17c253b7f ae2a5a02d0ef173b1d38a26c5a88b796f4ee2e8f36ee00931c468cd496fb2b5a 7a9826be22b6d977d6a0e5179f84d8e88b279fe6d9df8f6c93ebc40a6ba70f06 18459be33cd4f59081098435a0fbaa649f301f985647a75d21b7fc337378e59b 6e7313b6aa37a00b602e620a25a0b71a74503ea967f1814c6c7b8b192535a043 222dd76c461e70c3cb330bacfcf465751b07331c4f8a4415c09f4cd7c4e6fcd9 6e7313b6aa37a00b602e620a25a0b71a74503ea967f1814c6c7b8b192535a043 Tags: infostealer, security attack RELATED POSTS FortiGuard Labs Threat Research RANSOMWARE ROUNDUP - UNDERGROUND FortiGuard Labs Threat Research DEEP ANALYSIS OF SNAKE KEYLOGGER’S NEW VARIANT FortiGuard Labs Threat Research A DEEP DIVE INTO A NEW VALLEYRAT CAMPAIGN TARGETING CHINESE SPEAKERS FortiGuard Outbreak Alerts x FortiGuard Outbreak Alerts Don’t miss out on key information about on-going cybersecurity attacks. Subscribe Today * * * * * * NEWS & ARTICLES * News Releases * News Articles SECURITY RESEARCH * Threat Research * FortiGuard Labs * Threat Map * Ransomware Prevention CONNECT WITH US * Fortinet Community * Partner Portal * Investor Relations * Product Certifications COMPANY * About Us * Exec Mgmt * Careers * Training * Events * Industry Awards * Social Responsibility * CyberGlossary * Sitemap * Blog Sitemap CONTACT US * (866) 868-3678 Copyright © 2024 Fortinet, Inc. All Rights Reserved Terms of Services Privacy Policy | Cookie Settings PRIVACY PREFERENCE CENTER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * FUNCTIONAL COOKIES * ADVERTISING COOKIES YOUR PRIVACY A website may store or retrieve certain information about your browser by using cookies. Cookies store information about how a visitor interacts with a website. The information may be about you, your preferences, your browser, or may be used just to make the website function. We allow certain advertising and analytics partners to collect information from our site through cookies and similar technologies to deliver ads which are more relevant to you, and assist us with advertising-related analytics (e.g., measuring ad performance, optimizing our ad campaigns). This may be considered "selling" or "sharing” / disclosure for targeted online advertising under certain laws. To opt out of these activities, move the toggles for "Performance" and "Advertising" to the left and press "Confirm My Choices." You can also click on the different category headings if you would like to read more about the cookies that we use, and adjust your preferences. Please note that your choice will apply only to your current browser/device. You can choose not to allow some types of cookies; however, please note that blocking some categories of cookies may impact your experience of the site. You can visit our Privacy Policy for more information. privacy policy STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the basic functionality of the website. The website would not work without these cookies, so they cannot be switched off in our systems. You can set your browser to block or alert you about these cookies, but some parts of the site will not work. PERFORMANCE COOKIES Performance Cookies These cookies help us collect certain data, such as count visits and traffic sources, so that we can measure the performance of our site, improve the content, and build better features that enhance your experience. They help us to know which pages are the most and least popular and see how visitors move around the site. They also allow us to measure the effectiveness of our ads on other sites. FUNCTIONAL COOKIES Functional Cookies These cookies allow our website to remember your preferences and choices made on the website, such as region and language, which help us provide enhanced functionality and personalization. These cookies may be set by us or by third party providers whose services we have added to our pages. If you disable these cookies, then some or all of these features may not function properly. ADVERTISING COOKIES Advertising Cookies These cookies may be set through our website by our advertising partners, and use information uniquely identifying your browser and internet device to build a profile of your interests and show you relevant ads on other websites. If you disable these cookies, you will experience less targeted advertising. BACK BUTTON BACK Vendor Search Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Allow All word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1