Crib Notes: APT28 – a group so fancy, I can’t bear it.

In the world of cyber security, APT (Advanced Persistent Threat) groups are perhaps the most feared. This is because they are the most well-equipped and technically proficient threat actors, leading many to believe they have government-backing.  

One of the most infamous, APT28 (aka Fancy Bear), was first identified in 2004 by Trend Micro. Since their discovery, they have been implicated in multiple high-profile attacks against Government entities, diplomatic missions and media organisations. 

Most recently, however, researchers have implicated APT 28 in attacks against hotels in several European countries.

Recently: APT 28’s most recent attack targeted businesses in the hospitality industry over July and August this year. FireEye researchers were the first to identify the campaign in which a malicious ‘Hotel Reservation Form’ was sent to target organisations in a classic spearphishing campaign. 

Once the document was opened, and macros enabled, Fancy Bear’s signature malware – GAMEFISH – was dropped on to the terminal. 

After successfully gaining access, APT28 moved laterally through the network to seek machines that controlled both guest and internal Wi-Fi networks. After these were compromised, the group aimed to steal usernames and passwords which would allow further privilege escalation.

Technically: In the past week, we discovered a sample from the above attack campaign and conducted the following analysis:

Initially we spotted the following domains in the client logs:

mvtband(.)net

mvband(.)net  

https://virustotal.com/#/url/fd9cf2adc77595a8977188866c03986e4f70bf2bc6d0dbe5a150aaa8c025feee/detection

https://virustotal.com/#/url/d8a03dbf5409952ea201e11d808faabef555ed96c9f37ffe9769f6694b21b6be/detection

These domains triggered an alert as our threat intelligence feed identified them as Command and Control (C&C) servers. Our LMNTRIX HUNT team then scoured the logs and, by identifying the infected host, we found the malicious document and continued our analysis:

Figure 1 Malicious Document

– C:\Documents and Settings\fancybear\Hotel_Reservation_Form.doc

(78600 bytes) – binary

•    Found ZIP archive

•    Packed      Unpacked    Perc  Date/time   Filename

•    431        1819  23.7  01.01.1980  [Content_Types].xml

•    239         590  40.6  01.01.1980  _rels/.rels

•    342        1601  21.4  01.01.1980  word/_rels/document.xml.rels

•    4343       63115  6.9   01.01.1980  word/document.xml

•    437        1503  29.1  01.01.1980  word/footnotes.xml

•    434        1497  29.0  01.01.1980  word/endnotes.xml

•    191         277  69.0  01.01.1980  word/_rels/vbaProject.bin.rels

•    531         531  100.0 01.01.1980  word/media/image3.gif

•    200         392  51.0  01.01.1980  word/media/image2.wmf

•    197         392  50.3  01.01.1980  word/media/image1.wmf

•    7028       15872  44.3  01.01.1980  word/vbaProject.bin

•    1571        6795  23.2  01.01.1980  word/theme/theme1.xml

•    449        1367  32.9  01.01.1980  word/vbaData.xml

•    6354       30398  21.0  01.01.1980  word/settings.xml

•    47830       95561  50.1  01.01.1980  docProps/app.xml

•    2647       22908  11.6  01.01.1980  word/styles.xml

•    416         815  51.0  01.01.1980  docProps/core.xml

•    549        1816  30.3  01.01.1980  word/fontTable.xml

•    389         928  42.0  01.01.1980  word/webSettings.xml

•    74578      248177  30.1              Total (19 files)

The above list is the document’s internal files. One particular file which perked our interest was “vbaproject.bin” which we extracted for further analysis with officemalscanner. 


                                                 Figure 2 Extracted contents of doc file

The below analysis on the vbaproject.bin file gives us a better understanding of this sample’s behaviour:
 


                                             Figure 3 Interesting strings

Here we see base 64 being used for encoding and decoding – the decoded file gets saved in the AppData location:  


                                Figure 4 Decoded File Saved in AppData location

The saved file is then executed using WMI and then calls for rundll32.exe to execute supporting files, as seen below:


                        Figure 5 Saved file execution and registering supporting files

The following files are then created in the AppData location: mvtband.dat, mrset.bat and user.dat. This mvtband.dat file is the dll file which is registered using rundll32.exe. The file is used as a C&C for APT28. The user.dat file writes the mvtband.dll file and asks the batch file to execute it. 

Prevalence: APT 28 has been implicated in multiple attacks, all of which have targeted high-profile victims or institutions – typically these are seen as espionage exercises designed to gather high-value diplomatic intelligence. For example, it is widely thought the ultimate targets of the recent campaign against the hospitality industry was guests staying at the hotels, rather than the hotels themselves.

As business travellers typically rely on the Wi-Fi networks of the hotels at which they stay, it is easy to see why commandeering the hotel’s Wi-Fi would be an incredibly effective way to target guests. 

The group is known for using multiple attack techniques, rarely relying on the same methods. For example, in 2015 six zero-day exploits were attributed to APT28:


                                              Figure 6 Zero Day exploits attributed to APT28 in 2015

Mitigation: For businesses in the hospitality industry, once an alert is received it is best to unplug the machine from the network. Simple yara rules can scan for the existence of the malicious files in the host and removal scripts will easily search in the specified locations and delete them. We recommend businesses block mvtband(.)net and mvband(.)net in the proxy and firewall. 

For users, always exercise caution when dealing with attachments from unknown users. Travellers – particularly business travellers – should limit their reliance on public Wi-Fi networks.

Targets: APT28 has been linked to multiple attacks against high-profile targets. Past campaigns include the April 2015 attack on the French television network TV5Monde, the March 2016 breach of the U.S. Democratic National Committee, the December 2014 cyber-attack on the German Parliament, the August 2016 breach of the World Anti-Doping Agency, and a campaign in February 2015 to target members of the Dutch Safety Board who were investigating the downing of Malaysian Airlines Flight 17 over Ukraine. 

Attribution: As always, it is incredibly difficult to attribute an attack with 100 per cent certainty. That said, the widely held belief is that APT28 is sponsored by the Russian Government.

Tags: No tags

Comments are closed.