Beware! Fake Google Authenticator Sites Spreading DeerStealer Malware

by Esmeralda McKenzie
Beware! Fake Google Authenticator Sites Spreading DeerStealer Malware

Beware! Fake Google Authenticator Sites Spreading DeerStealer Malware

Untrue Google Authenticator

Researchers from ANY RUN identified a malware distribution advertising campaign dubbed DeerStealer that leverages deceptive websites masquerading as legitimate Google Authenticator download pages.

The preliminary found web sites, “authentificcatorgoolglte[.]com,” closely resembles the official Google online page “security.google/intl/en_my/cybersecurity-advancements,” presumably to trick users into believing it’s a right provide for the software program.

AD 4nXfACanfaKWSpcDUYyhqABQTrSWN w7F MeKcUkdPVA8bx8b2haNwrtTZ oiPTHArj8HbH9BVTLTRqgq zHYQ4HI8RRR2OZKIuVtOUtSxSGGDLkp FdsoUGs5eqhBj46yF6sU2ggCuvtn8mF oSXdMPFujbOgwsaLhTfalWfKzdqBwgPXdgN 5g?key=S7q2btoC eXt2oe U695kQ
example of deceptive characteristic

Clicking the “Accept” button on this deceptive web sites triggers a two-fold malicious action: first, it transmits the visitor’s IP address and nation data to a Telegram bot, likely for monitoring and capacity sufferer identification.

Google Info

2d, as a replacement of downloading the genuine Google Authenticator app, the web sites redirects users to a malicious file hosted on GitHub on the repository “github[.]com/ggle24/ggle2.”

It likely incorporates the DeerStealer malware itself, disguised as a trusty software program. Once downloaded and executed, DeerStealer can doubtlessly rob tender person data without their data.

AD 4nXeBTcPDMOvU Nys6NiF01qAkaKwEM0TknGXJcRPDRyPKWV kqdJGRDv9f549CCUL5IFnVx06YtMkfOKoIzmowkMqWuz k5eITefsWCW25AqAMbsLdS7VasIGrRux2gxS3kItZbHgbYr0Apek87xLUyg9G9SNV0zhWIN3PUyRPPMKdCBPm854WU?key=S7q2btoC eXt2oe U695kQ
JavaScript code that sends visitor data to the Telegram bot when the file is downloaded

On June 19, 2024, person “fedor_emeliyanenko_bog” launched the Telegram bot Tuc-tuc, which began logging messages that incorporated the originating characteristic and allowed for the extraction of active phishing websites linked to this advertising campaign.

Researchers occupy identified a checklist of domains associated with these phishing assaults by examining the chat ancient past.

AD 4nXcIt 9HdolqCNXF2waI9MUvxFE6UtWx0j1WPEwA6Dj0jbgWMGU P0UjUzn jXcg34aIn7ZjsDv7TEvkgFt IQR8Kd4hkS82HNuxfJ5vnbwWuyNBaOWEwtZQbGRxBpXaTKDGwsYoqTp09OTfWmkGC ICAXnIAVbpZXL vtIOfkWxR0Wf1nG6rg?key=S7q2btoC eXt2oe U695kQ
Untrue Domains

The Delphi-primarily primarily based stealer, originating from GitHub, self-incorporates a malicious payload delivered by way of a Reedcode-signed file, which employs obfuscation to cloak its actions, at the side of API calls wrapped in capabilities that retrieve addresses from world variables and secure the most of JMP RAX for execution.

Additional obfuscation comes from a broad selection of obscured constants interior the code, complicating analysis. The payload runs straight away in memory without rising a persistent file on the machine.

AD 4nXenNbldY8V7Bi224BOejBmSsVz aDvdd4D1RHoWYSXgF1sBWnQGpzPqYQXupnpC4NxBZGjQHklJvTl4iSkfU 6NmEKURO4TBgFhNQ0JhqpsPDDBVFVkMJcXhex ld00baihXgC6 HypQ7hII3ymKCk7gWFaf01f5wv5xbfR65Oxlsx3OGMAmg?key=S7q2btoC eXt2oe U695kQ
Sample data

The analyzed sample in ANY.RUN reveals the communique traits of a capacity client connecting to a Exclaim and Management (C2) server.

The sample initiates communique by sending a POST demand containing the tool’s hardware ID (HWID) to the “paradiso4.relaxing” domain, which likely serves for authentication or registration applications.

Following the server’s response, the sample transmits data in subsequent one-manner POST requests, suggesting a capacity data exfiltration try or reporting functionality to the C2 server.

AD 4nXemGNszunUkzdSR N9f3VwN56q2dhkS TV x5He1hVQAGTRm2xTbjtFibUoUmf R1HkwlCcphJQ2A0nGGqjeTWBsvLflupwqK IFHIU3IMaYdT4hxAqf eILqt9Aer7SFjjwsoPkaiuHTFkmddamj9gs YX5qbgn5nSXilniMg1EllmI2Gedh4?key=S7q2btoC eXt2oe U695kQ
Encrypted data from traffic

Evaluation of the sent data unearths a high frequency of the byte 0xC, suggesting single-byte XOR encryption with a key of 0xC as a result of XOR’s properties with zero.

Decryption the usage of CyberChef efficiently uncovers PKZip archives containing machine data esteem hostnames, processor crucial aspects, and working processes, confirming the encryption manner and indicating capacity data exfiltration or machine monitoring actions.

AD 4nXcef4RvHF7jIjEMb ws5 kANx4 3YPpzTJrXEU4st xg v0K0nppbReQ65qWvglxyftetMlVkQh XM8tdWrlr8spmiVqhTmaiao ZUprRUSxV69YlJvLVOM0SSM6nWK0CnUQB2rUBAWQAp71odaRl8fW3yf5BhSrDXiDGeiDrB5BRm hPyze38?key=S7q2btoC eXt2oe U695kQ
New XFiles model liberate

Researchers identified a YARA rule matching a DeerStealer sample, therefore discovering two identical samples linked to the XFiles family, sharing the frequent tactic of the usage of deceptive, legitimate tool websites for distribution.

While DeerStealer is a compiled machine-code software program, XFiles is a .NET-primarily primarily based malware that employs staged C2 communique, sending HWID in the origin before data transmission, now not like XFiles’ single POST demand.

IOCs

4640d425d8d43a95e903d759183993a87bafcb9816850efe57ccfca4ace889ec
569ac32f692253b8ab7f411fec83f31ed1f7be40ac5c4027f41a58073fef8d7d
5e2839553458547a92fff7348862063b30510e805a550e02d94a89bd8fd0768d
66282239297c60bad7eeae274e8a2916ce95afeb932d3be64bb615ea2be1e07a
a6f6175998e96fcecad5f9b3746db5ced144ae97c017ad98b2caa9d0be8a3cb5
b116c1e0f92dca485565d5f7f3b572d7f01724062320597733b9dbf6dd84dee1
b5ab21ddb7cb5bfbedee68296a3d98f687e9acd8ebcc4539f7fd234197de2227
cb08d8a7bca589704d20b421768ad01f7c38be0c3ea11b4b77777e6d0b5e5956
d9db8cdef549e4ad0e33754d589a4c299e7082c3a0b5efdee1a0218a0a1bf1ee
E24c311a64f57fd16ffc98f339d5d537c16851dc54d7bb3db8778c26ccb5f2d1

Source credit : cybersecuritynews.com

Related Posts