{"id":2634,"date":"2024-09-25T19:15:15","date_gmt":"2024-09-25T19:15:15","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2634"},"modified":"2025-07-29T05:57:34","modified_gmt":"2025-07-29T05:57:34","slug":"ursnif-sniffs-out-and-hijacks-emails-thread","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/ursnif-sniffs-out-and-hijacks-emails-thread\/","title":{"rendered":"URSNIF sniffs out and hijacks emails thread"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"474\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/test.webp\" alt=\"\" class=\"wp-image-2654\" style=\"width:554px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>LMNTRIX Cyber Defense Center has recently intercepted a malware campaign related to URSNIF malware variants targeting Banking and Financial Institutions.<\/p>\n\n\n\n<p>In December 2018, there was a rise of attacks aimed at delivering URSNIF, via spam email campaigns or hijacking existing email threads. First seen in the wild in 2007, URSNIF is also known as GOZI.&nbsp;<\/p>\n\n\n\n<p>The most recent campaign is constantly evolving, with the attackers modifying their tools, tactics and procedures (TTP) whenever their malware-serving domains are flagged by any major web filtering solution. Each new domain hosts at least 17 variants of the malware, with some open source threat intelligence reporting up to 20 variants.<\/p>\n\n\n\n<p>In this report, we provide a brief of our findings on this active threat campaign, with a specific focus on the adversary tradecraft leveraged during all the phases of the attack lifecycle. The information in this report is derived from multiple URSNIF-related incident responses carried out by the LMNTRIX Cyber Defense Center.<\/p>\n\n\n\n<p>Using the methodologies described in this post, the LMNTRIX Cyber Defense Center\u2019s Incident Response Team has uncovered additional organizations infected with URSNIF. We strongly encourage organizations to leverage the indicators, TTPs, and detections in this post to improve their defenses and hunt for related activity in their networks.<\/p>\n\n\n\n<p><strong>Attacker TTP<\/strong><\/p>\n\n\n\n<p>The current threat campaign is spreading by either spearphising or hijacking existing mail threads. The latter involves sending an email that mimics a previous email thread. In both cases, the victim receives a password-protected archive attachment with the password included in the mail body. The archive contains a document with highly obfuscated and evasive malicious macro script. Upon execution, the macro executes a PowerShell script that connects to the attacker\u2019s domain and downloads the URSNIF malware. The malware is downloaded to the ProgramData folder with a random filename, which is then executed.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"879\" height=\"923\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-46.webp\" alt=\"\" class=\"wp-image-2644\"\/><\/figure>\n\n\n\n<p><strong>Spearphising, Attribution and Detection<\/strong><\/p>\n\n\n\n<p>The malicious emails originated from either a legitimate company the victim had prior dealings with, or an organisation unknown to the victim. These were either made to look like a part of an email chain, or hijacked an existing mail chain. In most cases, victims who were not in the banking or financial sectors were used to propagate the attack to financial targets.&nbsp;<\/p>\n\n\n\n<p>Due to the financial motivations of this campaign, and that of previous URSNIF campaigns, LMNTRIX attributes the threat actor as a financially motivated group.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"992\" height=\"699\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-44.webp\" alt=\"\" class=\"wp-image-2645\"\/><\/figure>\n\n\n\n<p>The above redacted screenshot shows an email containing the malicious attachment. This was sent from a known contact, who was already infected, to the victim organization by hijacking a year-old email thread.&nbsp;<\/p>\n\n\n\n<p>This phishing mail was identified with LMNTRIX Active Defense platform which monitors network traffic for any malicious communication. When the unsuspecting victim opened the malicious document and the macro was executed, the entire execution lifecycle was detected by our LMNTRIX platform.<\/p>\n\n\n\n<p><strong>Evasive Obfuscated Macro<\/strong><\/p>\n\n\n\n<p>Using of malicious macro code is a common trick to fool users into clicking on \u201cEnable Editing\u201d and \u201cEnable Content\u201d in Microsoft Word. This allows the execution of the malicious Visual Basic (VB) macro code.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"955\" height=\"619\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-43.webp\" alt=\"\" class=\"wp-image-2646\" srcset=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-43.webp 955w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-43-280x180.webp 280w\" sizes=\"(max-width: 955px) 100vw, 955px\" \/><\/figure>\n\n\n\n<p>The document looks the same from the user\u2019s perspective, but we noticed slight variances in the obfuscation techniques in their VB macro code. As shown below, it is evident that the malicious code is fragmented and obfuscated with a combination of techniques.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"791\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-43-1024x791.webp\" alt=\"\" class=\"wp-image-2647\"\/><\/figure>\n\n\n\n<p>Also, the attackers use COM object ID to reference WScript object in VB, and leverage VB constants to spell out \u201ccmd.exe\u201d to evade any traditional anti-virus detection.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"125\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-41-1024x125.webp\" alt=\"\" class=\"wp-image-2648\"\/><\/figure>\n\n\n\n<p><strong><br><br>PowerShell Execution<\/strong><\/p>\n\n\n\n<p>The VB macro code executes PowerShell via \u201ccmd.exe \/c \u201d command. The PowerShell command contains a base64 encoded command that is decoded at runtime before execution. The below screenshot shows the command executed by VB macro and the cmd.exe.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"752\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-39-1024x752.webp\" alt=\"\" class=\"wp-image-2649\"\/><\/figure>\n\n\n\n<p>The decoded PowerShell script uses in-built PowerShell functionalities to download the malware in an extensive way which is unnecessary from a programmer\u2019s point-of-view, but is effective in evading static string-matching rules. The PowerShell script also uses COM object ID to reference ShellBrowserWindow, and create the instance, which then executes the downloaded malware using ShellExecute method. The malware executes from the \u201cC:\\ProgramData\u201d folder, which is inferred from the GetFolderPath(\u201cCommonApplicationData\u201d) environment variable.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.lmntrix.com\/ckfinder\/userfiles\/images\/Gozi_Campaign\/7.png\" alt=\"\" \/>\n\n<\/figure>\n\n\n\n<p><strong>Malware Analysis<\/strong><\/p>\n\n\n\n<p>The malware samples collected during the Incident Response process were analyzed separately and were found to have similar objectives and varied minutely. The overall similarities are analyzed and are presented below:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>1.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439050 &nbsp; &nbsp;FUNC KERNEL32.dll_DeleteFileA<br>2.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439054 &nbsp; &nbsp;FUNC KERNEL32.dll_GetCurrentThread<br>3.&nbsp;&nbsp; &nbsp; &nbsp; 0x0043906c &nbsp; &nbsp;FUNC KERNEL32.dll_GetEnvironmentVariableA<br>4.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439070 &nbsp; &nbsp;FUNC KERNEL32.dll_VirtualProtectEx<br>5.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439074 &nbsp; &nbsp;FUNC KERNEL32.dll_FindFirstChangeNotificationA<br>6.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439080 &nbsp; &nbsp;FUNC KERNEL32.dll_RaiseException<br>7.&nbsp;&nbsp; &nbsp; &nbsp; 0x0043908c &nbsp; &nbsp;FUNC KERNEL32.dll_VirtualProtect<br>8.&nbsp;&nbsp; &nbsp; &nbsp; 0x0043909c &nbsp; &nbsp;FUNC KERNEL32.dll_GetProcAddress<br>9.&nbsp;&nbsp; &nbsp; &nbsp; 0x004390a0 &nbsp; &nbsp;FUNC KERNEL32.dll_LoadLibraryExA<br>10.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439104 &nbsp; &nbsp;FUNC KERNEL32.dll_GetCurrentProcess<br>11.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439108 &nbsp; &nbsp;FUNC KERNEL32.dll_TerminateProcess<br>12.&nbsp;&nbsp; &nbsp; &nbsp; 0x0043910c &nbsp; &nbsp;FUNC KERNEL32.dll_IsProcessorFeaturePresent<br>13.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439110 &nbsp; &nbsp;FUNC KERNEL32.dll_IsDebuggerPresent<br>14.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439118 &nbsp; &nbsp;FUNC KERNEL32.dll_QueryPerformanceCounter<br>15.&nbsp;&nbsp; &nbsp; &nbsp; 0x0043911c &nbsp; &nbsp;FUNC KERNEL32.dll_GetCurrentProcessId<br>16.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439120 &nbsp; &nbsp;FUNC KERNEL32.dll_GetCurrentThreadId<br>17.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439130 &nbsp; &nbsp;FUNC KERNEL32.dll_GetModuleFileNameW<br>18.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439140 &nbsp; &nbsp;FUNC KERNEL32.dll_GetModuleHandleExW<br>19.&nbsp;&nbsp; &nbsp; &nbsp; 0x0043914c &nbsp; &nbsp;FUNC KERNEL32.dll_GetModuleFileNameA<br>20.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439150 &nbsp; &nbsp;FUNC KERNEL32.dll_GetACP&nbsp;<br>21.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439178 &nbsp; &nbsp;FUNC KERNEL32.dll_IsValidCodePage<br>22.&nbsp;&nbsp; &nbsp; &nbsp; 0x0043917c &nbsp; &nbsp;FUNC KERNEL32.dll_GetOEMCP<br>23.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439180 &nbsp; &nbsp;FUNC KERNEL32.dll_GetEnvironmentStringsW<br>24.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439184 &nbsp; &nbsp;FUNC KERNEL32.dll_FreeEnvironmentStringsW<br>25.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439188 &nbsp; &nbsp;FUNC KERNEL32.dll_GetCommandLineA<br>26.&nbsp;&nbsp; &nbsp; &nbsp; 0x0043918c &nbsp; &nbsp;FUNC KERNEL32.dll_GetCommandLineW<br>27.&nbsp;&nbsp; &nbsp; &nbsp; 0x004391a0 &nbsp; &nbsp;FUNC KERNEL32.dll_WriteConsoleW<br>28.&nbsp;&nbsp; &nbsp; &nbsp; 0x004391a4 &nbsp; &nbsp;FUNC KERNEL32.dll_ReadConsoleW<br>29.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439000 &nbsp; &nbsp;FUNC ADVAPI32.dll_RegCreateKeyA<br>30.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439004 &nbsp; &nbsp;FUNC ADVAPI32.dll_RegCloseKey<br>31.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439008 &nbsp; &nbsp;FUNC ADVAPI32.dll_RegQueryValueExA<br>32.&nbsp;&nbsp; &nbsp; &nbsp; 0x0043900c &nbsp; &nbsp;FUNC ADVAPI32.dll_RegOpenKeyExA<br>33.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439010 &nbsp; &nbsp;FUNC ADVAPI32.dll_SystemFunction036<br>34.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439034 &nbsp; &nbsp;FUNC GPEDIT.DLL_BrowseForGPO<br>35.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439038 &nbsp; &nbsp;FUNC GPEDIT.DLL_DeleteGPOLink<br>36.&nbsp;&nbsp; &nbsp; &nbsp; 0x0043903c &nbsp; &nbsp;FUNC GPEDIT.DLL_CreateGPOLink<br>37.&nbsp;&nbsp; &nbsp; &nbsp; 0x00439040 &nbsp; &nbsp;FUNC GPEDIT.DLL_ExportRSoPData<br>38.&nbsp;&nbsp; &nbsp; &nbsp; 0x0044c224 &nbsp; &nbsp;FUNC USER32.dll_SetWindowsHookExA<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The malware included multiple techniques to detect debuggers, process monitoring tools and virtual machines, including some of the libraries listed above, cpuid instruction, time delta calculation, custom TLS call-back and checking if parent processes have a visible window.<\/p>\n\n\n\n<p>The main program itself is invoked after going through multiple checks and custom C++ exception handling over SEH, filtering out any possibility of being executed in an environment which is trying to analyze the binary or has some module missing in the system. The actual malware is loaded into a code page and executed by pushing the ImageBase offset to the function handling the execution of the malware code.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"607\" height=\"648\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-33.webp\" alt=\"\" class=\"wp-image-2650\"\/><\/figure>\n\n\n\n<p>The malware is seen to make DNS requests to domains which are currently taken down. Historical intelligence confirms that the domains are the attacker\u2019s command-and-control sites. The connections are made by calling Internet Explorer, referencing it\u2019s COM object ID with hidden window state.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"90\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9-29-1024x90.webp\" alt=\"\" class=\"wp-image-2651\"\/><\/figure>\n\n\n\n<p><strong><br><br>Evolving Attacker Infrastructure<\/strong><\/p>\n\n\n\n<p>During the incident response process, we found the attackers were quick to identify when their domain names were flagged by major web filtering solutions. When discovered, the attackers shifted their entire malware hosting infrastructure from one domain to another, including the URL path. As seen below, the domains were very recently bought \u2013 as recently as April 12.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"430\" height=\"253\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/10-28.webp\" alt=\"\" class=\"wp-image-2652\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"381\" height=\"274\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/11-20.webp\" alt=\"\" class=\"wp-image-2653\"\/><\/figure>\n\n\n\n<p>After shifting their infrastructure, we noticed the attackers changed the names of the malware files. Additionally, the attackers disabled directory listing and directory traversal on their web server which prevented our analysts from discovering further malware.<br><br>We also noticed the attackers hosted 17 variants of the malware with 4 unique metadata entries for Internal File Name, with some open source threat intelligence reporting the attackers hosted 20 variants. All details are mentioned in the below IOC table.<br><br><strong>Protection<\/strong><br><br>The \u201cMITRE ATT&amp;CK\u201d knowledge base extensively covers the techniques often employed by attackers and maps them to various stages in the attack lifecycle. This URSNIF campaign can be detected with the following MITRE techniques:<br><br>1.&nbsp;&nbsp; &nbsp;T1064 \u2013 Scripting \u2013 Find suspicious script execution from Word documents with WINWORD as the parent process.<br><br>2.&nbsp;&nbsp; &nbsp;T1086 \u2013 PowerShell \u2013 Find suspicious PowerShell process execution, especially with \u201c-executionpolicy bypass\u201d or \u201c-encodedcommand\u201d parameters.<br><br>3.&nbsp;&nbsp; &nbsp;Suspicious Run Locations \u2013 Find executables that are being executed from suspicious or non-standard locations.&nbsp;<br><br>Alternatively, LMNTRIX\u2019s Adaptative Threat Response platform provides complete endpoint security with detection techniques mapped to the \u201cMITRE ATT&amp;CK\u201d framework. With advanced analytics, LMNTRIX platform brings light to threats that otherwise go undetected, along with detailed analysis to provide attack attribution. The LMNTRIX platform includes an inbuilt offline capability which uses machine learning models to classify malicious files and quickly isolates the location and determines the extent of the executable.<br><br><strong>Indicator of Compromise<\/strong><br><br>The table below lists the Indicators of Compromise which can help security professionals identify URSNIF activity. The domains hosting c2 and payload are spread across Russia with nameservers in China.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Info<\/td><td>Value<\/td><td>Type<\/td><\/tr><tr><td>Malicious Archive<\/td><td>C52D3C8BA7A533CB0F626F17EB53F041<\/td><td>MD5<\/td><\/tr><tr><td>Malicious Archive<\/td><td>C1B1956B993A24BD67B5B3EEE7CE10B8<\/td><td>MD5<\/td><\/tr><tr><td>Malicious Document<\/td><td>A35CF8BBE4BC38FD18E6C1D7175C613D<\/td><td>MD5<\/td><\/tr><tr><td>Malicious Document<\/td><td>F86B4E1CAE9E28BBB1FFDBAE60507DA4<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>C51CE7435DEBB06A417AA2F3C78C8308<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>01DDF162162C13D966BC8D6322D2DA37<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>5A135A394438B8BCFD21FE6D210FD82C<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>3035FAA296AE8DC4967398A5F1B707B6<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>3A48338F5442B05804D6F468E1325147<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>9935899CEC2523E3A01A94726613B970<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>F98E09109382F5CCC5F8C29B2AE0941A<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>E3B3BE605A78EB8F8A525C80D1713E6B<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>726533DD927253C1AE95848C82F9217C<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>CBFD61EB79473AD51CA292372A165EB3<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>6AA59540D3D1098AF0D3D14773E66E3A<\/td><td>MD5<\/td><\/tr><tr><td>Attacker Domain<\/td><td>nyifdmacyzechariah[.]top<\/td><td>Domain<\/td><\/tr><tr><td>Attacker Domain<\/td><td>rzwemerson[.]xyz<\/td><td>Domain<\/td><\/tr><tr><td>Attacker Domain URL<\/td><td>hxxp :\/\/nyifdmacyzechariah[.]top\/ skoex \/po2[.]php?l=defol[1-20]. fgs<\/td><td>URL Pattern<\/td><\/tr><tr><td>Attacker Domain URL<\/td><td>hxxp :\/\/rzwemerson[.]xyz\/ skoex \/po2[.]php?l=pofabo[1-20]. fgs<\/td><td>URL Pattern<\/td><\/tr><tr><td>Internal Name<\/td><td>Mavice Soillarge<\/td><td>String Constant<\/td><\/tr><tr><td>Internal Name<\/td><td>Kentico Software Readsoldier<\/td><td>String Constant<\/td><\/tr><tr><td>Internal Name<\/td><td>Saturn Systems Classany<\/td><td>String Constant<\/td><\/tr><tr><td>Internal Name<\/td><td>ShipCompliant Truemight<\/td><td>String Constant<\/td><\/tr><tr><td>Attacker C2<\/td><td>npvwfavian[.]info<\/td><td>Domain<\/td><\/tr><tr><td>Attacker C2<\/td><td>z982756[.]info<\/td><td>Domain<\/td><\/tr><tr><td>Attacker C2<\/td><td>jyjeramypoe[.]com<\/td><td>Domain<\/td><\/tr><tr><td>Attacker C2<\/td><td>185[.]22[.]153[.]83<\/td><td>IP<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>After shifting their infrastructure, we noticed the attackers changed the names of the malware files. Additionally, the attackers disabled directory listing and directory traversal on their web server which prevented our analysts from discovering further malware.<br><br>We also noticed the attackers hosted 17 variants of the malware with 4 unique metadata entries for Internal File Name, with some open source threat intelligence reporting the attackers hosted 20 variants. All details are mentioned in the below IOC table.<br><br><strong>Protection<\/strong><br><br>The \u201cMITRE ATT&amp;CK\u201d knowledge base extensively covers the techniques often employed by attackers and maps them to various stages in the attack lifecycle. This URSNIF campaign can be detected with the following MITRE techniques:<br><br>1.&nbsp;&nbsp; &nbsp;T1064 \u2013 Scripting \u2013 Find suspicious script execution from Word documents with WINWORD as the parent process.<br><br>2.&nbsp;&nbsp; &nbsp;T1086 \u2013 PowerShell \u2013 Find suspicious PowerShell process execution, especially with \u201c-executionpolicy bypass\u201d or \u201c-encodedcommand\u201d parameters.<br><br>3.&nbsp;&nbsp; &nbsp;Suspicious Run Locations \u2013 Find executables that are being executed from suspicious or non-standard locations.&nbsp;<br><br>Alternatively, LMNTRIX\u2019s Adaptative Threat Response platform provides complete endpoint security with detection techniques mapped to the \u201cMITRE ATT&amp;CK\u201d framework. With advanced analytics, LMNTRIX platform brings light to threats that otherwise go undetected, along with detailed analysis to provide attack attribution. The LMNTRIX platform includes an inbuilt offline capability which uses machine learning models to classify malicious files and quickly isolates the location and determines the extent of the executable.<br><br><strong>Indicator of Compromise<\/strong><br><br>The table below lists the Indicators of Compromise which can help security professionals identify URSNIF activity. The domains hosting c2 and payload are spread across Russia with nameservers in China.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Info<\/td><td>Value<\/td><td>Type<\/td><\/tr><tr><td>Malicious Archive<\/td><td>C52D3C8BA7A533CB0F626F17EB53F041<\/td><td>MD5<\/td><\/tr><tr><td>Malicious Archive<\/td><td>C1B1956B993A24BD67B5B3EEE7CE10B8<\/td><td>MD5<\/td><\/tr><tr><td>Malicious Document<\/td><td>A35CF8BBE4BC38FD18E6C1D7175C613D<\/td><td>MD5<\/td><\/tr><tr><td>Malicious Document<\/td><td>F86B4E1CAE9E28BBB1FFDBAE60507DA4<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>C51CE7435DEBB06A417AA2F3C78C8308<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>01DDF162162C13D966BC8D6322D2DA37<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>5A135A394438B8BCFD21FE6D210FD82C<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>3035FAA296AE8DC4967398A5F1B707B6<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>3A48338F5442B05804D6F468E1325147<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>9935899CEC2523E3A01A94726613B970<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>F98E09109382F5CCC5F8C29B2AE0941A<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>E3B3BE605A78EB8F8A525C80D1713E6B<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>726533DD927253C1AE95848C82F9217C<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>CBFD61EB79473AD51CA292372A165EB3<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>6AA59540D3D1098AF0D3D14773E66E3A<\/td><td>MD5<\/td><\/tr><tr><td>Attacker Domain<\/td><td>nyifdmacyzechariah[.]top<\/td><td>Domain<\/td><\/tr><tr><td>Attacker Domain<\/td><td>rzwemerson[.]xyz<\/td><td>Domain<\/td><\/tr><tr><td>Attacker Domain URL<\/td><td>hxxp :\/\/nyifdmacyzechariah[.]top\/ skoex \/po2[.]php?l=defol[1-20]. fgs<\/td><td>URL Pattern<\/td><\/tr><tr><td>Attacker Domain URL<\/td><td>hxxp :\/\/rzwemerson[.]xyz\/ skoex \/po2[.]php?l=pofabo[1-20]. fgs<\/td><td>URL Pattern<\/td><\/tr><tr><td>Internal Name<\/td><td>Mavice Soillarge<\/td><td>String Constant<\/td><\/tr><tr><td>Internal Name<\/td><td>Kentico Software Readsoldier<\/td><td>String Constant<\/td><\/tr><tr><td>Internal Name<\/td><td>Saturn Systems Classany<\/td><td>String Constant<\/td><\/tr><tr><td>Internal Name<\/td><td>ShipCompliant Truemight<\/td><td>String Constant<\/td><\/tr><tr><td>Attacker C2<\/td><td>npvwfavian[.]info<\/td><td>Domain<\/td><\/tr><tr><td>Attacker C2<\/td><td>z982756[.]info<\/td><td>Domain<\/td><\/tr><tr><td>Attacker C2<\/td><td>jyjeramypoe[.]com<\/td><td>Domain<\/td><\/tr><tr><td>Attacker C2<\/td><td>185[.]22[.]153[.]83<\/td><td>IP<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>After shifting their infrastructure, we noticed the attackers changed the names of the malware files. Additionally, the attackers disabled directory listing and directory traversal on their web server which prevented our analysts from discovering further malware.<br><br>We also noticed the attackers hosted 17 variants of the malware with 4 unique metadata entries for Internal File Name, with some open source threat intelligence reporting the attackers hosted 20 variants. All details are mentioned in the below IOC table.<br><br><strong>Protection<\/strong><br><br>The \u201cMITRE ATT&amp;CK\u201d knowledge base extensively covers the techniques often employed by attackers and maps them to various stages in the attack lifecycle. This URSNIF campaign can be detected with the following MITRE techniques:<br><br>1.&nbsp;&nbsp; &nbsp;T1064 \u2013 Scripting \u2013 Find suspicious script execution from Word documents with WINWORD as the parent process.<br><br>2.&nbsp;&nbsp; &nbsp;T1086 \u2013 PowerShell \u2013 Find suspicious PowerShell process execution, especially with \u201c-executionpolicy bypass\u201d or \u201c-encodedcommand\u201d parameters.<br><br>3.&nbsp;&nbsp; &nbsp;Suspicious Run Locations \u2013 Find executables that are being executed from suspicious or non-standard locations.&nbsp;<br><br>Alternatively, LMNTRIX\u2019s Adaptative Threat Response platform provides complete endpoint security with detection techniques mapped to the \u201cMITRE ATT&amp;CK\u201d framework. With advanced analytics, LMNTRIX platform brings light to threats that otherwise go undetected, along with detailed analysis to provide attack attribution. The LMNTRIX platform includes an inbuilt offline capability which uses machine learning models to classify malicious files and quickly isolates the location and determines the extent of the executable.<br><br><strong>Indicator of Compromise<\/strong><br><br>The table below lists the Indicators of Compromise which can help security professionals identify URSNIF activity. The domains hosting c2 and payload are spread across Russia with nameservers in China.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Info<\/td><td>Value<\/td><td>Type<\/td><\/tr><tr><td>Malicious Archive<\/td><td>C52D3C8BA7A533CB0F626F17EB53F041<\/td><td>MD5<\/td><\/tr><tr><td>Malicious Archive<\/td><td>C1B1956B993A24BD67B5B3EEE7CE10B8<\/td><td>MD5<\/td><\/tr><tr><td>Malicious Document<\/td><td>A35CF8BBE4BC38FD18E6C1D7175C613D<\/td><td>MD5<\/td><\/tr><tr><td>Malicious Document<\/td><td>F86B4E1CAE9E28BBB1FFDBAE60507DA4<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>C51CE7435DEBB06A417AA2F3C78C8308<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>01DDF162162C13D966BC8D6322D2DA37<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>5A135A394438B8BCFD21FE6D210FD82C<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>3035FAA296AE8DC4967398A5F1B707B6<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>3A48338F5442B05804D6F468E1325147<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>9935899CEC2523E3A01A94726613B970<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>F98E09109382F5CCC5F8C29B2AE0941A<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>E3B3BE605A78EB8F8A525C80D1713E6B<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>726533DD927253C1AE95848C82F9217C<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>CBFD61EB79473AD51CA292372A165EB3<\/td><td>MD5<\/td><\/tr><tr><td>Malware<\/td><td>6AA59540D3D1098AF0D3D14773E66E3A<\/td><td>MD5<\/td><\/tr><tr><td>Attacker Domain<\/td><td>nyifdmacyzechariah[.]top<\/td><td>Domain<\/td><\/tr><tr><td>Attacker Domain<\/td><td>rzwemerson[.]xyz<\/td><td>Domain<\/td><\/tr><tr><td>Attacker Domain URL<\/td><td>hxxp :\/\/nyifdmacyzechariah[.]top\/ skoex \/po2[.]php?l=defol[1-20]. fgs<\/td><td>URL Pattern<\/td><\/tr><tr><td>Attacker Domain URL<\/td><td>hxxp :\/\/rzwemerson[.]xyz\/ skoex \/po2[.]php?l=pofabo[1-20]. fgs<\/td><td>URL Pattern<\/td><\/tr><tr><td>Internal Name<\/td><td>Mavice Soillarge<\/td><td>String Constant<\/td><\/tr><tr><td>Internal Name<\/td><td>Kentico Software Readsoldier<\/td><td>String Constant<\/td><\/tr><tr><td>Internal Name<\/td><td>Saturn Systems Classany<\/td><td>String Constant<\/td><\/tr><tr><td>Internal Name<\/td><td>ShipCompliant Truemight<\/td><td>String Constant<\/td><\/tr><tr><td>Attacker C2<\/td><td>npvwfavian[.]info<\/td><td>Domain<\/td><\/tr><tr><td>Attacker C2<\/td><td>z982756[.]info<\/td><td>Domain<\/td><\/tr><tr><td>Attacker C2<\/td><td>jyjeramypoe[.]com<\/td><td>Domain<\/td><\/tr><tr><td>Attacker C2<\/td><td>185[.]22[.]153[.]83<\/td><td>IP<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>On 2019-04-18<\/p>\n","protected":false},"excerpt":{"rendered":"<p>LMNTRIX Cyber Defense Center has recently intercepted a malware campaign related to URSNIF malware variants targeting Banking and Financial Institutions. In December 2018, there was a rise of attacks aimed at delivering URSNIF, via spam email campaigns or hijacking existing email threads. First seen in the wild in 2007, URSNIF is also known as GOZI.&nbsp; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2654,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2634","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2634"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2634\/revisions"}],"predecessor-version":[{"id":4301,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2634\/revisions\/4301"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2654"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}