{"id":2616,"date":"2024-09-25T19:03:50","date_gmt":"2024-09-25T19:03:50","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2616"},"modified":"2025-07-29T05:55:21","modified_gmt":"2025-07-29T05:55:21","slug":"russians-behind-predatorthief-malware-as-a-service-keep-customers-happy-with-regular-updates","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/russians-behind-predatorthief-malware-as-a-service-keep-customers-happy-with-regular-updates\/","title":{"rendered":"Russians behind PredatorThief malware-as-a-service keep customers happy with regular updates"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"446\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/PredatorThief20malware.webp\" alt=\"\" class=\"wp-image-2630\" style=\"width:662px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>LMNTRIX Cyber Defence Center has been tracking a Russian group of malware mongers, selling their software from Deep and Dark Web forums. This group is known as \u201cPredator The Thief\u201d.&nbsp;<\/p>\n\n\n\n<p>The group first appeared in early March &nbsp;2019, developing and propagating a multiple malware strains since then \u2013 the most recent coming last week with an update to their data stealer malware PredatorThief v3.2.1. Given how frequent the updates are, we believe these are being made as soon as previous versions are detected.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"854\" height=\"1024\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-45-854x1024.webp\" alt=\"\" class=\"wp-image-2623\"\/><\/figure>\n\n\n\n<p>The threat actors host multiple secret groups and forums on the Deep and Dark Web to sell their malware, and most members of the group appear to be Russian as the posts and advertisements are primarily in Russian Cyrillic.&nbsp;<\/p>\n\n\n\n<p>With each updated version, the threat actors work to increase functionality and usability of their malware. The most recent version, released on April 25 2019, &nbsp;includes a fully fledged UI for their customers to manage the malware from a single panel.&nbsp;<\/p>\n\n\n\n<p>Since first seeing the group on March 1 2019, LMNTRIX Threat Intelligence has so far detected seven different variants of the malware &nbsp;\u2013 these are categorised under the malware family <strong>Trojan.PredatorThief<\/strong>.The <em>MD5<\/em> hashes for each variant is listed in the image below:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"747\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-43-1024x747.webp\" alt=\"\" class=\"wp-image-2624\"\/><\/figure>\n\n\n\n<p>The samples shown above highlight the timeline of malware detection over the past two months. This shows how rapidly new variants are being released after detection \u2013 for example, after a version was discovered on March 1 a new variant was already in the wild within days and discovered on March 5.&nbsp;<\/p>\n\n\n\n<p><strong>Malware Analysis:<\/strong><\/p>\n\n\n\n<p>The File version properties, Resource Icon, and Dialog Boxes of the malware show some common characteristics, with each variant signed with verified signatures and signer status shows as <em><strong>\u201cValid\u201d.<\/strong><\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"615\" height=\"295\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-42.webp\" alt=\"\" class=\"wp-image-2625\"\/><\/figure>\n\n\n\n<p>The version information shows Copyright as <em><strong>\u201cLegalCopyright&#8221;, &#8220;(c) 2015 Company VMware\u201d.<\/strong><\/em> This shows how the malware authors are using spoofed certificate details to evade detection. &nbsp;<\/p>\n\n\n\n<p>Looking into the code, it has references to clipboard, event log, installs device\/driver and queries for visible\/invisible windows. The malware can also modify the registry keys to gain persistence in the execution process. The below list shows the reference of fake certificates.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"710\" height=\"143\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-42.webp\" alt=\"\" class=\"wp-image-2626\"\/><\/figure>\n\n\n\n<p>The malware includes multiple techniques to detect debuggers, process monitoring tools and virtual machines in order to evade detection. The PredatorThief trojan PE32 exe file modifies the executable and performs an unauthorised process injection to recently created process. The spawned process performs web query for DNS and HTTP POST request contacting the command and control server. The below process diagram shows the sequence of events performed by the malware.&nbsp;<\/p>\n\n\n\n<p><em><strong><br><\/strong><\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-40-1024x575.webp\" alt=\"\" class=\"wp-image-2627\"\/><\/figure>\n\n\n\n<p>Further analysis shows the malware opens the clipboard and collects the clipboard data. If the GetClipboardData function succeeds, the return value is the handle to a clipboard object in the indicated format. The clipboard data is vital information for the attackers as they use it to achieve several malicious objectives. Additionally, the code has <strong>lstrlenA<\/strong> and <strong>TextOutA<\/strong>, which are used to determine the length of the specified characters and writes the characters at the specified location. &nbsp;<em><strong><br><\/strong><\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"339\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-38-1024x339.webp\" alt=\"\" class=\"wp-image-2628\"\/><\/figure>\n\n\n\n<p>This malware has also inducted HTTP Connections to transfer the different credentials to the attacker\u2019s server from the victims machine. Functions like WinHttpSetCredentials are being used to send authorisation credentials.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"415\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-37.webp\" alt=\"\" class=\"wp-image-2629\"\/><figcaption class=\"wp-element-caption\"><br><\/figcaption><\/figure>\n\n\n\n<p>While performing HTTP requests, the malware has already spotted login URL and the authentication parameters like username, password in the function call \u2013 WinHttpSetCredentials.&nbsp;<\/p>\n\n\n\n<p><strong>Protection:<\/strong><\/p>\n\n\n\n<p>The \u201cMITRE ATT&amp;CK\u201d matrix lists the different Tools, Tactics and Procedures (TTP) which the attackers use to achieve their objectives. Analyzing the TTP of the PredatorTheft malware variant, it follows the below attributes of the Attack matrix:<\/p>\n\n\n\n<p>1.&nbsp;&nbsp; &nbsp;T1055: Process Injection: involves writing malicious code directly into the process (without a file on disk) then invoking execution with either additional code or by creating a remote thread.<\/p>\n\n\n\n<p>2.&nbsp;&nbsp; &nbsp;T1115: Clipboard Data: Adversaries collect data stored in the Windows clipboard from users copying information within or between applications.<\/p>\n\n\n\n<p>3.&nbsp;&nbsp; &nbsp;T1003: Credential Dumping: Credential dumping is the process of obtaining account login and password information, normally in the form of a hash or a clear text password, from the operating system and software. Credentials can then be used to perform Lateral Movement and access restricted information.&nbsp;<\/p>\n\n\n\n<p>Alternatively, LMNTRIX\u2019s Adaptative Threat Response platform provides complete endpoint security with detection techniques mapped to the \u201cMITRE ATT&amp;CK\u201d framework. With advanced analytics, LMNTRIX platform brings light to threats that otherwise go undetected, along with detailed analysis to provide attack attribution. The LMNTRIX platform includes an inbuilt offline capability which uses machine learning models to classify malicious files and quickly isolates the location and determines the extent of the executable.<\/p>\n\n\n\n<p><strong>Indicators of compromise:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Info<\/td><td>Value<\/td><\/tr><tr><td>Md5<\/td><td>5703b386f2c7108e2988a9d51e4406f0<\/td><\/tr><tr><td>Md5<\/td><td>6421790b5ee44f21d25eb82b559ce92c<\/td><\/tr><tr><td>Md5<\/td><td>92e4f5079f0f8325aacdb0d9f40010b5<\/td><\/tr><tr><td>Md5<\/td><td>5703b386f2c7108e2988a9d51e4406f0<\/td><\/tr><tr><td>Md5<\/td><td>9dbd902db87f17aaebc321158d516dcf<\/td><\/tr><tr><td>Md5<\/td><td>325c914e1e6e26edcc9a803506e941be<\/td><\/tr><tr><td>Md5<\/td><td>579d42d23a66fbb2f5d9de5f812c6827<\/td><\/tr><tr><td>URL<\/td><td>www[.]Saflot[.]com<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>On 2019-04-30<\/p>\n","protected":false},"excerpt":{"rendered":"<p>LMNTRIX Cyber Defence Center has been tracking a Russian group of malware mongers, selling their software from Deep and Dark Web forums. This group is known as &ldquo;Predator The Thief&rdquo;.&nbsp; The group first appeared in early March &nbsp;2019, developing and propagating a multiple malware strains since then &ndash; the most recent coming last week with [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2630,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2616","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2616"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2616\/revisions"}],"predecessor-version":[{"id":4298,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2616\/revisions\/4298"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2630"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}