APT Hackers Behind SysJoker Attacking Critical Industrial Sectors

by Esmeralda McKenzie
APT Hackers Behind SysJoker Attacking Critical Industrial Sectors

APT Hackers Behind SysJoker Attacking Critical Industrial Sectors

SysJoker Serious Industrial Sectors

SysJoker malware changed into as soon as within the origin stumbled on to be worn by the APT community dubbed “WildCard” and centered Israel’s academic sector. However, the operations of this APT risk actor admire expanded to encompass extra malware variants, with one amongst them stumbled on to be written in Rust programming language.

This unique rust malware has been coined “Rustdown” by the malware developers. To boot to this, the risk actor has also shifted their focal level to crucial sectors interior Israel, love education, IT infrastructure, and electrical energy generation.

EHA

Doc

Free Webinar

Dwell API Assault Simulation Webinar

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface prove how APIs will be hacked. The session will quilt: an exploit of OWASP API High 10 vulnerability, a brute force legend dangle-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could well well bolster security over an API gateway

Technical Prognosis

Two unique malware variants had been stumbled on, which admire evolved from the SysJoker malware. These variants had been named DMADevice.exe and AppMessagingRegistrar.exe and had been written in C++.

There had been three samples of malware variants stumbled on in two of them DMADevice.exe and AppMessagingRegistrar.exe.

Frame 46
Timeline of Operation

DMADevice

In step with the samples analyzed, this malware had a code same to SysJoker. Furthermore, one unfamiliar string changed into as soon as identified to be precisely the identical within the SysJoker malware.

It changed into as soon as the customized alphabet “0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghilmnopqrstuvmxyz” that changed into as soon as characterize within the code of each and every SysJoker and the DMA instrument malware variants. This string misses two characters, “jk”, the identical on each and every samples.

AppMessagingRegistrar

This variant changed into as soon as identified to be compiled after the DMAdevice variant and likewise shares the identical code as SysJoker. However, there are diverse capabilities, XOR keys, and URL paths on this malware. The URL paths worn by this malware are,

  • api/update
  • /api/register
  • /api/library
  • /api/requests

This malware is downloaded from a ZIP file and executed by a DLL file masquerading as Plucky browser.  Furthermore, the utilization of Gdrive and OneDrive changed into as soon as an identical on each and every DMAdevice and AppMessagingRegistrar variants of SysJoker malware.

RustDown: The unique variant

As of October 2023, the APT community has been stumbled on to be relying on a particular malware written in Rust, which changed into as soon as a 32-bit Dwelling windows executable that disguised itself as a PHP framework component.

The codebase of this malware changed into as soon as unique however shared the identical Ways, Ways, and Procedures of the WildCard APT community.

This malware implements a couple of calls to the Sleep API with random time periods which changed into as soon as same to the SysJoker malware. Furthermore, it also copies the executable to any other discipline the utilization of PowerShell for persistence.

A full document about these unique variants of SysJoker malware and the WildCard APT community has been printed, which affords detailed files about the TTP, provide code, hash values, and diverse files.

Indicators of Compromise

Rustdown

d4095f8b2fd0e6deb605baa1530c32336298afd026afc0f41030fa43371e3e72

DMAdevice (SysJoker Might perchance well 2022 Variant)

e076e9893adb0c6d0c70cd7019a266d5fd02b429c01cfe51329b2318e9239836
6c8471e8c37e0a3d608184147f89d81d62f9442541a04d15d9ead0b3e0862d95

AppMessagingRegistrar (SysJoker June 2022 Variant)

67ddd2af9a8ca3f92bda17bd990e0f3c4ab1d9bea47333fe31205eede8ecc706

SysJoker Downloader

96dc31cf0f9e7e59b4e00627f9c7f7a8cac3b8f4338b27d713b0aaf6abacfe6f

Useless Drop Resolver URL

  • https://onedrive.are residing[.]com/win?resid=16E2AEE4B7A8BBB1%21112&authkey=!AED7TeCJaC7JNVQ (RustDown)
  • https://onedrive.are residing[.]com/win?cid=F6A7DCE38A4B8570&resid=F6A7DCE38A4B8570%21115&authkey=AKcf8zLcDneJZHw (DMAdevice.exe)
  • https://onedrive[.]are residing.com/win?cid=3014636895E3FE3B&resid=3014636895E3FE3B%21106&authkey=AD4OGrVz9h17Jzo (AppMessagingRegistrar.exe)

C2

  • 85.31.231[.]49:443 (Rustdown)
  • sharing-u-file[.]com (DMAdevice.exe)
  • audiosound-visible[.]com (AppMessagingRegistrar.exe)filestorage-brief[.]org (SysJoker Downloader)

Source credit : cybersecuritynews.com

Related Posts