Hackers Hide Information-Stealing Malware in PNG Files Using Steganography

by Esmeralda McKenzie
Hackers Hide Information-Stealing Malware in PNG Files Using Steganography

Hackers Hide Information-Stealing Malware in PNG Files Using Steganography

Hackers Veil IMalware in PNG Files

Specialists at Avast, who built on the discoveries of ESET, the first to see and yarn on the threat team identified as “Worok”, conceals malware inner PNG photography to silently infect victims’ computers with recordsdata-stealing malware.

Experiences suppose it targets excessive-profile companies and native governments in Asia. At level to, they’re targeting energy companies in Central Asia and public sector entities in Southeast Asia to steal recordsdata in step with the forms of the attacked companies.

Worok Compromise Chain

The malware is allegedly spread by attackers the utilize of ProxyShell flaws. In a few uncommon circumstances, the ProxyShell vulnerabilities were exploited to shield persistence inner the sufferer’s network.

The attackers then released their personalized malicious kits the utilize of publicly accessible exploit tools. The final compromise chain is therefore straightforward: the first stage is CLRLoader, which executes a short fragment of code to load the following stage (PNGLoader).

AgQO65YRVIRhaySheunm3cI5Zah2u ip8tbh4lObfGIP0uessB4ltUwKEdVWwrn0h3JfDvzOCXGn9DtqYeIZzVIXJf HN7c8uG4onqIWcHyJOtQIbzGQXeJmbqFbU9j9RKtvfdHjgpGpzZYK9YsT9Io8UkRqyhO SL63qQJ1QPO8Qo8v8f1eEUeXDeppVjLN25Sg
Worok Total Compromise Chain

The utilize of Steganographic Ways

The least-critical bit (LSB) encoding, in step with consultants, is one amongst the extra broadly faded steganographic tactics.

This methodology in most cases embeds the info in every pixel’s least essential bits. In this converse methodology, one pixel encodes a nibble (one bit for every alpha, red, green, and blue channel), which formulation that two pixels shield a byte of secret recordsdata.

vImfCaALsJAeaPr7U2YUAYGbxXRoD4fvMVM QjuTlFVgBV0XJ5r5wTbD hMK 4rJ Dg4Ed8Qel12WNkZPj7a xQvd88RI Wk0z47cx8VYY3zE5m8 izYc AfrQcikKLc5NL WIxInemXlD70TMG4y c2iS 9AD ovYGtlYp8OzzEYEaMLJEQnrLMW5ymuXK4IoFjTkqgA
LSB on relate pixels

ESET and Avast were unable to derive smartly the PowerShell script that is the preliminary payload that PNGLoader extracted from these bits.

The 2nd payload, known as DropBoxControl, is a personalised.NET C# info-stealer that exploits the DropBox file recordsdata superhighway hosting carrier for C2 communication, file exfiltration, and other functions. It is miles hid within the assist of PNG recordsdata.

https://decoded.avast.io/wp-thunder/uploads/web sites/2/2022/11/Figure-9.-Malicious-PNG-file-with-steganographically-embedded-C-payload-1024x228.png
Malicious PNG file Containing Data-Stealer

A backdoor known as ‘DropBoxControl’ makes utilize of the DropBox carrier to glue with the attackers. It’s noteworthy that the C&C server is a DropBox narrative, and all communications, including directions, uploads, and downloads, are performed the utilize of approved recordsdata in designated folders.

Specialists suppose DropBoxControl runs instructions in step with the inquire recordsdata after checking the DropBox folder in most cases.

The attackers alter the backdoor thru ten instructions as follows:

c1gDHebs vkzxGU2ExAiW TxwJNKHmGgeUbgW XJbN PtQ0nJ AI1LiqmdkjvYckCmG54fO2FyD2WOqgFmlkFWxQnYZ48Orncu8u42jT7eoIvXeIg4cJei0la iX9J8bMu ChpsosgwGp9vocvv C4eNFxs6TNOYuMjGKLLVDqRwD1jcjoKgyGj413zRJVmshuMhHg 7 w
Backdoor instructions

Closing Discover

The C# payload (DropBoxControl), which is stenographically embedded, verifies ‘Worok’ because the cyberespionage team. Thru the DropBox narrative linked to fresh Google emails, they steal recordsdata.

It is miles doable that Worok’s tools are an APT effort that specializes in excessive-profile organizations within the factitious and public sectors in Asia, Africa, and North The usa given their rarity within the wild.

Azure Full of life Itemizing Safety – Download Free E-Book

Source credit : cybersecuritynews.com

Related Posts