Threat actors utilizing Large Language Model (LLM) AIs to generate code used in malware campaigns.
Symantec has observed an increase in attacks that appear to leverage Large Language Models (LLMs) to generate malicious code used to download various payloads.
LLMs are a form of generative AI designed to understand and generate human-like text. They have a wide range of applications, from assisting in writing to automating customer service. However, like many powerful technologies, LLMs can also be abused.
Recent malware campaigns observed by Symantec involved phishing emails containing code used to download various payloads, including Rhadamanthys, NetSupport, CleanUpLoader (Broomstick, Oyster), ModiLoader (DBatLoader), LokiBot, and Dunihi (H-Worm). Analysis of the scripts used to deliver malware in these attacks suggests they were generated using LLMs.
LLM Attack Chain Examples
The following example details a campaign targeting a wide range of sectors. The attacks involve phishing emails with attached .zip archives containing malicious .lnk files, which, once executed, trigger LLM-generated PowerShell scripts that lead to the deployment of malware.
The emails purport to relate to an urgent financing issue and contain a password-protected ZIP file, the password for which is also included in the email.
The ZIP file contains an LNK file that, when executed, runs a PowerShell script (Figure 2) likely generated using an LLM. Functions and variables are nicely formatted with leading single-line comments that use highly accurate grammar to explain their usage.
The script can easily be produced automatically using an LLM. We were able to produce similar results during our research using ChatGPT and a series of simple prompts (Figure 3).
Final payloads deployed in this campaign included the Rhadamanthys information-stealing malware and the CleanUpLoader backdoor (aka Broomstick, Oyster).
LLM assist with phishing and payload delivery
The following example details the use of LLM-generated code to facilitate the phishing stage and the payload delivery stage of an attack. The following describes the attack chain events.
1. Initial access: User receives a human-crafted phishing email with an attachment, mimicking an HR notification.
2. Execution of LLM-generated script: Opening the malicious attachment executes an HTML file with embedded JavaScript that is highly likely generated by an LLM. This script is designed to download and execute additional payloads, although the webpage displayed in this case is fairly simple and the HTML behind it is small and quick to load.
Analysis of the HTML file, which facilitates a crucial link of the attack chain, reveals the characteristic features of an LLM-generated file (Figure 6).
The file itself can easily be produced automatically using an LLM, with little human effort required.
3. Final payload download: By the time the user sees the page shown in Figure 5, the next stage payload – a loader for the Dunihi (H-Worm) malware – would have already been downloaded if the user has not configured their browser to ask for download permission first.
Symantec also observed campaigns delivering the ModiLoader (DBatLoader) malware loader, the LokiBot information-stealing Trojan, and NetSupport remote access Trojan. The use of LLMs to generate HTML code used in these campaigns is also suspected.
Conclusion
The potential for AI to revolutionize our world is undeniable; however, it is also revolutionizing cybercrime. AI tools such as LLMs lower the barrier to entry for many threat actors, while increasing the level of sophistication for others.
As we have shown, AI-powered tools have given threat actors not only the ability to quickly craft convincing and targeted phishing emails, but also to generate malicious code that would normally require considerable expertise, time, and resources.
It is worth highlighting that AI is only going to get better. While the benefits for society are sure to be great, malicious actors will also benefit, using it to launch more sophisticated and effective attacks faster and at a larger scale.
Symantec is at the forefront of cybersecurity, offering robust protection against the never-ending wave of new threats, including those recently observed, highly likely generated by LLMs. Our security solutions are equipped with advanced detection capabilities that block AI-based LLM-generated threats, with our threat hunting experts continuously monitoring the threat landscape, harvesting emerging threats, conducting detailed analysis, updating our automation models, and ensuring our customers are always protected.
Indicators of Compromise
If an IOC is malicious and the file is available to us, Symantec Endpoint products will detect and block that file.
IOC | Description |
---|---|
0A90FADE657A0C0AC73D4E085E168AA8515994700A12612D1C20CB00ED15A0CA | PowerShell script |
F5FC667D818A26FBB5C04657B131D86AF1746A349CEB9D6E441D24C8673393B2 | PowerShell script |
FA0FEE451B2DD9C532189705177457D0982E1F27F11E3E2B0B31B9ECE654FF4C | PowerShell script |
9160A5F4DB292A50BAED109BFF1C94738418FB8E6D729D7FC4A7841DB06F8F3E | PowerShell script |
C645FD15DDA1AA3D5554B847E1D243493EA22F81FAF3D1F883100A4B51438B27 | PowerShell script |
121E900D1EFC6D9E537471360848B333BFBBB7E08ECADB1D75897882CE2DCB20 | Rhadamanthys |
29F8B50F737FEEF9EC7439780DAEAD395BF2BF278A4540DDFFE64CA70AA9F462 | Rhadamanthys |
4FB58687A364C3F6D6F7E0CA03654F9DEC0F8832A499D61D40B0D424DB1B1B14 | Rhadamanthys |
2AE6737D691BFF402FC50A29EDDCBE9FD0B0C18250776435F61CE70F3C9481CD | JavaScript |
BC824A97E877EF38D5D14E0D51433F3890873B58B710C0E5D41A4638A1A3FAF4 | JavaScript |
EB8A22036655F0EB19924868031D3CDD273630B167A5FEC72B3C98FE887CA9C6 | JavaScript |
30DD8CBBA98F2E4CBB8D8D85A7A9AC97B0157A77C83D9B8DEAB50C2225C0CB22 | LNK file |
948D0D1FABBD858C13C387737EF833BEB982141CFC2E2D0E26024918EB0AF479 | LNK file |
C7D1DC81BB9CC86DD129AC414E8805DDDBFFF23D347E5F3349D5D59F4172F3BA | LNK file |
A1739E001E0720341F14466231A21BD12A74485DAB59B0F4FDE7F931467CB4B2 | LNK file |
F1CFC6E55777A62A1B269901793550CE8D0126D1035C5BEBF5C8145A83EF842B | LNK file |
DC6C5B4ABB65C8E5169F96A65D0A225C91AD2A58E13ECABA5B3FF29D07A4660B | LNK file |
3A88FCB26F7A6BE68B65AB18D8358365E9A4FD7D4C0EF8FC581771CCFB746271 | Password-protected ZIP file |
44B3095A86F2091CCB9B52B9ECF995BC5B9E2294EB9E38D90E9FD743567F5F22 | Password-protected ZIP file |
BA325F828378C1733044F3022D73D770E2A8E81AEB01605B13866DE7E722075D | Password-protected ZIP file |
CAD698049830745BA6685B5D571DEF86FA77D046D2403A7C48ED8D0258314093 | Password-protected ZIP file |
D38A62A73A9FE1ED0CE7F6902E52D90A056374123D6ECF4D5FF9A01008E922CB | Password-protected ZIP file |
BF0B4C933B9EF188A9073D68D955ADD8CBE8398F3EC2E04CE285D45C8183C033 | Password-protected ZIP file |
4153F2CE9CD956B29A1D1F21669932596FD1564863F65782D1EEA4E06E8623F7 | ZIP file |
5077EEE9D9933E1DB4B311B893A8F3583CA9F0D9F6DB33938A67BF5054133AA8 | ZIP file |
BAC7079571FA4FA2E3543FD4EDFB5144EC4FF9046065C7F11CB8C9552117D138 | ZIP file |
C8032306AB5C5BF09C38BD05A2F41BB4DCE98A56DF0570C6A58F116127E0532D | ZIP file |
9BD692BC32E13185232E95FF7693D0039B5C5C563323982BFAB34A5D1E0379AE | HTML |
B1D48CA54EFB57B9BD626420391FBBC638C9F4271F009DFB31B28C33B76A4228 | HTML |
D05032CA22352BA77CE67A2975A33A5A3A7170705817FE4305B162F7E4E7065B | HTML |
A2C1B716D20B61BC4C57748E1EC195FBAC2C5B143CF960D0FFEE895160D4B0DB | EXE file |
B6AADA8476838CD39EFD5A3681F50ECEB0938BBCDECD3712FDB81394ED2922BB | EXE file |
BB932056CAE8940742E50B4F2B994A802E703F7BC235E7DD647D085AE2B2BAF7 | CleanUpLoader |
C398B3E06EF860670B9597DAED85632834FA961AEA87164B8BA8BB2F094A14EF | CleanUpLoader |
BCDB4F1AF705889ACE73E8A0C8626BC6B615393A4C4F28EA00E5A51EB6E541D9 | VBS |
CD003F5CE0DDE74B9793685C549A6883B405FCA4D533F27FBB050199A2339A28 | VBS |
F06D83CE130BAE96EBFDE9ADDDD0FF1245FEBF768E6D984B69816B252808BA0C | RAR file |
“`html
- MITRE ATT&CK TTPs – created by AI
- Technique Name: Phishing ID: T1566
- Phishing emails are crafted to appear legitimate, often mimicking important notifications (e.g., HR notifications).
- Technique Name: PowerShell ID: T1059.001
- Execution of LLM-generated PowerShell scripts triggered by user interaction with malicious attachments.
- Technique Name: User Execution ID: T1203
- Users are tricked into executing malicious files (e.g., .lnk files) that lead to further payload downloads.
- Technique Name: Command and Scripting Interpreter ID: T1059
- Malicious scripts generated by LLMs are executed to facilitate the download of additional payloads.
- Technique Name: Remote Access Tools ID: T1219
- Deployment of remote access Trojans (e.g., NetSupport) as part of the final payloads.
“`
Source: Original Post