SideWinder Hacker Group Target Government & Military Using WarHawk Tool

by Esmeralda McKenzie
SideWinder Hacker Group Target Government & Military Using WarHawk Tool

SideWinder Hacker Group Target Government & Military Using WarHawk Tool

SideWinder Hacker Community Target Govt & Militia The utilization of WarHawk Tool

Zscaler ThreatLabz discovered a up to date backdoor called ‘WarHawk’ being inclined by the SideWinder APT risk team to have entities in Pakistan.

The SideWinder team goes by the names Rattlesnake, Hardcore Nationalist, RAZOR TIGER, T-APT-04, and APT-C-17, with a historical previous of focused on executive, militia, and agencies real thru Asia, specifically Pakistan.

“The newly discovered WarHawk backdoor contains varied malicious modules that carry Cobalt Strike, incorporating contemporary TTPs equivalent to KernelCallBackTable injection and Pakistan Standard Time zone trace with a realizing to be obvious that a victorious marketing campaign,” Zscaler ThreatLabz stated.

The Working of WarHawk Backdoor

Experiences deliver the ‘WarHawk’ backdoor includes 4 modules equivalent to:

  • Download & Develop Module
  • Expose Execution Module
  • File Supervisor InfoExfil Module
  • UploadFromC2 Module

Researchers discovered that the ISO file hosted on the respectable web spot of Pakistan’s National Electric Vitality Regulatory Authority “nepra[.]org[.]pk” that can existing a compromise of their web server.

https://lh3.googleusercontent.com/HIa9PKSP2eni41GJnuAl9z4hkXFfrgRuVMUJBJGptoSUaRvo0_91Tsf84EFGqcSTvplfOlj04rOMNhMSxw9EAVv90drH0z0LjTrky8AD1vtjXaIMF3_cvl2BFoHGmjN7vA2B-fyeukue83GI4ec4KQT4VPrF2FyDTwridJXLWzYO5dWOs-5aqAzNQw
National Electric Vitality Regulatory Authority Website online

It disguises itself as a legit application to lure unsuspecting victims into execution. Also, WarHawk decrypts a procedure of API & DLL names the utilization of a String Decryption Routine which takes the Encrypted Hex Bytes as an input after which subtracts each byte with the Key: “0x42” with a realizing to decrypt the string.

https://lh5.googleusercontent.com/9PyOtymwhv439cgHE-1uIHhmwijtqvSM3y2vb6iZVwHYoOvldK3zpDRqRkpLnsVyqvGM9kONZ7EW2lJiCaI0vafYN5R6yuoERKacquzRsZ2p8vXquDFuhcyDgMlg4I4WdOLE265BXf0OaTD6FnSDr6X2cUkcxklJerJcwJPP4O9k6xLrODrUMYkozQ

WarHawk Backdoor disguises as legit applications

The bag & discontinue module is accountable for downloading and executing extra payloads from the remote URL equipped by the CnC server.

The present execution module is accountable for the execution of device instructions on the contaminated machine obtained from the Expose & Withhold a watch on. Therefore, the File Supervisor InfoExfil module gathers and sends the File Supervisor info by essentially sending all over a Module initiation ask to the CnC server.

In the UploadFromC2 module, it’s a ways a up to date characteristic added within the latest WarHawk Backdoor, allowing the risk actor to upload recordsdata on the contaminated machine from the Expose and Withhold a watch on Server.

https://lh3.googleusercontent.com/DgjDCPzxRWLtOPWdCUdG4_OqNleERPMYnYtv1JsghSsr8RYKrbxPIRCoEfu-0NurFKP_oPgFitl_eJnG6xyB-ULbO_JthZgUUEp3y9AR5CXbI7FsHtfkv75Ymtw61Hk0HUW7xyZWmfP8DqGqoDezX4YU10Fn0fUJBhF1ZvUZix61oHB5VuFoqhr_tQ

SideWinder Community Infrastructure

Researchers deliver the following are the symptoms that assist out in determining that the promoting campaign is targeted at Pakistan, ISO recordsdata hosted on Pakistan’s National Electric Vitality Regulatory Authority web spot, risk actors launched by Pakistan’s Cabinet Division inclined as a lure, and the time zone take a look at for “Pakistan Standard Time” that makes certain that the malware is most effective executed underneath Pakistan Standard Time.

“The SideWinder APT Community is constantly evolving their tactics and adding contemporary malware to their arsenal with a realizing to discontinue a hit espionage attack campaigns in opposition to their targets,” concludes the file.

Source credit : cybersecuritynews.com

Related Posts