FatalRAT Targets Cryptocurrency Users

FatalRAT

Key Takeaways

  • Cyble Research and Intelligence Labs (CRIL) has uncovered a novel phishing campaign tailored to cryptocurrency users.
  • This campaign was deploying a well-known FatalRAT along with additional malware such as Clipper and Keylogger.
  • The Threat Actors (TAs) orchestrating this campaign employ the DLL side-loading technique to load and execute FatalRAT, Clipper, and Keylogger modules.
  • FatalRAT is a Remote Access Trojan that provides attackers with control over the victim’s computer and is equipped with extensive capabilities for stealing sensitive information.
  • The inclusion of a clipper module alongside FatalRAT suggests a targeted strategy aimed at cryptocurrency users, and the addition of a keylogger module enhances data interception capabilities.
  • The TAs behind this campaign are targeting Chinese-speaking individuals or organizations, as evidenced by using Chinese-language installers.

Overview

CRIL has recently uncovered a sophisticated phishing campaign that specifically targets cryptocurrency users, with a notable emphasis on users of the Exodus platform. In this intricate scheme, threat actors (TAs) have employed a deceptive website meticulously designed to mimic legitimate cryptocurrency applications.

The deceptive site, resembling the interface of the Exodus crypto wallet, aims to lure unsuspecting users into divulging their sensitive information. Exodus offers users the ability to manage their cryptocurrency holdings and conduct transactions. Available as both a desktop application and a mobile app.

The image below shows the deceptive phishing site, mimicking the authentic application interface.

Phishing

Figure 1 – Phishing site

Once unsuspecting users are lured into downloading the software disguised as genuine Exodus installers from the phishing site, they inadvertently install a Remote Access Trojan known as FatalRAT. Additionally, this installer also deploys other malicious components, such as Clipper and Keylogger, marking a new development compared to previous campaigns.

The TAs have executed a multi-staged attack incorporating multiple components packaged within a single installer file, culminating in the installation of the FatalRAT malware, a clipper, and a keylogger. Notably, the TAs have employed DLL side-loading techniques as part of their strategy to evade detection, a method that has been observed in previous campaigns as well. The image below shows the infection chain observed in the current campaign.

Figure 2 – Infection chain

Upon installation on a victim’s system, the Trojanized Exodus crypto-wallet installer application grants the attackers unauthorized access and control, enabling them to steal sensitive information from web browsers, capturing keystrokes, data manipulation—particularly concerning wallet addresses in the clipboard—and other malicious activities, all concealed from users in the background.

This operation is further enhanced by launching the Exodus installation in the foreground, tactically employing it as a diversion to mislead and distract users, as illustrated in the accompanying figure.

Figure 3 – Displaying the Exodus application in the victim’s machine

Technical Analysis

Upon execution of the downloaded malicious installer (.msi), it drops numerous files into two distinct directories within the C:ProgramData folder, named MoCo and Mo. The image below displays all the files along with their respective folder names.

Figure 4 – Extracted files from the installer

All files listed are components of a multi-staged attack primarily utilizing the DLL side-loading method to execute the final payloads aimed at evading detection by security software. The attack chain unfolds as follows:

  • A legitimate executable, thelp.exe (Browser Support Module), is launched by the installer. Following this, thelp.exe utilizes DLL sideloading to load a malicious DLL file named “XLFSIO.dll,” which subsequently loads the loader module named “mt.dll” during runtime, as depicted in the figure below.

Figure 5 – Malicious files used for DLL Sideloading

  • The file mt.dll is responsible for launching and executing two additional files named “Mi.JPG” and “BMi.jpg.” However, instead of images, these files contain a shellcode along with an embedded DLL, as shown below.

Figure 6 – Loader file containing the Shellcode filenames

  • This shellcode’s objective is to load and execute the embedded DLL in memory by invoking an export function named SignalChromeElf.
  • SignalChromeElf function performs decryption, loading, and execution of an encrypted payload present within the embedded DLL. This encrypted payload corresponds to the FatalRAT malware.

Similarly, other components such as Clipper and Keylogger are also observed being loaded into memory using similar methods.

Fatal RAT

FatalRAT is a Remote Access Trojan endowed with a broad spectrum of capabilities, allowing remote execution by an attacker. Initially detected in August 2021, the FatalRAT malware possesses capabilities including keystroke logging, screen resolution manipulation, downloading and executing files, as well as stealing data stored within web browsers.

Before commencing its infiltration procedures, the malware meticulously conducts a series of evaluations. These checks encompass assessments for virtual machine environments, processor types, and active processes, among other factors. Once successfully passing these checks, FatalRAT proceeds to decrypt configuration strings containing the Command and Control (C&C) server address as shown in the image below. Subsequently, any pilfered information is swiftly transmitted to the designated C&C server.

Figure 7 – FatalRAT Configuration strings

Based on our analysis, we’ve concluded that the version of FatalRAT employed in this campaign closely resembles the variant previously identified by AT&T and ESET. In this analysis, we will dive deeper into the Clipper and the keylogger modules.

Clipper

When thelp.exe is executed, it concurrently initiates the execution of the “BMi.jpg” file directly into memory through the utilization of the DLL “mt.dll.”

The file “BMi.jpg” contains a shellcode along with an embedded DLL (like FatalRAT), which is identified as Clipper. This shellcode is designed to load and execute the embedded DLL in memory by invoking DllEntryPoint(), as shown in the figure below.

Figure 8 – Shellcode content with Clipper DLL

After the Clipper content is executed in memory, it utilizes API functions associated with the Windows Clipboard, as depicted in the figure below, to carry out its Clipper activities.

Figure 9 – Clipper functions

The table below shows the details of targeted cryptocurrencies and their regular expressions.

Crypto
currencies
Regular Expression

TAs Crypto wallet address
BTC
(Bitcoin)
^(1|3|bc1|tb1)[a-zA-Z0-9]{25,61}$ 3CRsnPAe1NkhMDaxYNvm61s8DKh79WrwDL
ETH (Ethereum) ^0x[a-fA-F0-9]{40}$ 0x5C4b06FcfA8c3417E6F6248c32101a8Abd7936eE

The aforementioned Clipper malware performs the following activities:

  • The malware continuously monitors clipboard activity by calling OpenClipboard() to gain access to the clipboard.
  • Once the clipboard is open, it uses GetClipBoardData() to retrieve the content stored in the clipboard.
  • It then checks if the clipboard content matches any cryptocurrency address patterns defined by the regular expressions mentioned in the above table.
  • If a cryptocurrency address is matched, the malware replaces it with a pre-defined malicious wallet address controlled by the Threat Actor.
  • After modifying the clipboard content, the malware uses SetClipBoardData() to update the clipboard with the manipulated data, which now contains the TA’s wallet address instead of the original one.
  • When the user attempts to paste the cryptocurrency address into a transaction field, they unknowingly paste the TA’s address instead, resulting in the redirection of funds to the attacker’s wallet.

The figure below shows the code snippet used to perform the malicious Clipper activity.

Figure 10 – Code snippet of Clipper’s functionalities

The figure below illustrates the presence of Clipper malware strings within the memory of the “thelp.exe” file.

Figure 11 – Presence of Clipper strings in the memory of thelp.exe

Keylogger Module

In this campaign, we have observed that TAs have placed the keylogger module in an additional directory (C:ProgramDataMo) intended to log all keystrokes and system events. Although the FatalRAT malware already encompasses the keylogging function, this module operates independently without requiring direct intervention from the attacker.

Upon execution of the Trys.exe file, it employs DLL sideloading to dynamically load the “ty.dll” file. Subsequently, this action starts the execution of the “M.jpg” shellcode, which in turn executes the embedded Keylogger module within the memory, as shown below.

Figure 12 – Presence of M.JPG shellcode filename in ty.dll

The following figure illustrates the presence of keylogger module strings within the memory of the “Trys.exe” process.

Figure 13 – Presence of Keylogger strings in the memory of Trys.exe

Prior to initiating the keylogger functions, the malware attempts to identify virtual environments by checking VMware-related processes, paths, and other indicators. If such a virtual environment is detected, the code exits without executing further actions, as shown in the figure below.

Figure 14 – Anti-Vm methods

After that, the malware proceeds to capture keystrokes and system events on the victim’s system. It then saves this information with the filename “sys.key” in the %programdata% folder. The following image depicts the data recorded by the keylogger malware.

Figure 15 – Saved Keylogger file

Within the keylogger, the remote server’s name is encoded in reverse, as shown in the figure below. During runtime, it retrieves the exact domain name from the reversed string and establishes a connection to it for data exfiltration.

  • 1-27.qq-weixin[.]org

Figure 16 – Hardcoded server name in reverse order

Attribution

It’s plausible that the group responsible for the previous campaign may be behind this recent attack. This speculation is based on similarities such as the infection chain, file names, and an error observed in the scheduled tasks created. Additionally, the targeting of Chinese individuals, evident Chinese language versions of software used, and the C&C server pattern look similar.

Conclusion

The increasing popularity of cryptocurrency has attracted the interest of this group, leading them to transition from creating fake websites mimicking popular applications to targeting crypto users directly. Given the behavior of this campaign, we can safely conclude that the primary targets of this campaign are cryptocurrency users.

With the incorporation of a potent blend of the RAT (Remote Access Trojan) and a dedicated clipper module, the attackers can seamlessly extract sensitive information from their victims. Clipper malware poses a notable danger to individuals engaged in cryptocurrency activities, as it specifically focuses on intercepting their transactions and redirecting funds to the wallets of TAs. In light of these threats, crypto users must remain vigilant and proactive against such attacks.

Recommendations

  • Before accessing or downloading from any site, it is essential to diligently verify the URLs.
  • Crypto users should carefully check their wallet addresses before making any cryptocurrency transaction to ensure there is no change when copying and pasting the actual wallet addresses.
  • The seeds for wallets should be stored safely and encrypted on any device.
  • Before submitting the cryptocurrency wallet information, verify the authenticity source.
  • Use strong passwords and enforce multi-factor authentication wherever possible.
  • Keep a close eye on your cryptocurrency accounts for any unauthorized activity or suspicious transactions.
  • Review and update advertising policies on major platforms like Google and social media networks to prevent the dissemination of malicious ads promoting cryptocurrency scams.

MITRE ATT&CK® Techniques

Tactic  Technique ID  Technique Name 
 Initial Access (TA0027)  Phishing (T1660)  Malware distribution via phishing site
Execution  (TA0002 User Execution (T1204) The user needs to manually execute the file downloaded from the phishing site. 
Defense  Evasion  (TA0005)  Masquerading (T1036.008) Downloads file disguised as a legitimate application.
Defense Evasion (TA0005) Hijack Execution Flow: DLL Side-Loading (T1574.002) Malware uses DLL sideloading for payload execution
Defense Evasion (TA0005) Disable or Modify Tools (T1562.001) Uses taskkill to terminate processes
Collection  (TA0009 Clipboard Data  (T1115 Monitors clipboard data and replaces crypto addresses with their address.
Exfiltration (TA0036) Exfiltration Over C2 Channel (T1646) Sending exfiltrated data over C&C server
Impact (TA0040) Financial Theft (T1657) Swaps crypto address to transfer funds to TA’s crypto address.

Indicators of Compromise (IOCs)

Indicators  Indicator  Type  Description 
hxxps://exodue[.]com URL Phishing Site
f80f8a725028bcc09639f7b1ff9439436d974f0bf92871048092eaec5d7458f0 SHA256 Downloaded malicious installer
d56471adbfd095d1be1d4b8288d14283efbf6414912064a97423751a69c1427f SHA256 BMi.jpg
(Clipper)
715138e6cb30bd18cc6afad6322e35f6f1a3d40ac135a1a9bc76cb884508c686 SHA256 M.jpg
(Keylogger)
8b0fde6e42ba17b0b475bb8dd54b8554cc6682d81b9e632f8890daa9ceefd48d SHA256 Mi.jpg
(FatalRAT)
a5ca7b8af70d6e483007c6c9c60b0a2002e150b0f479744989fdd58ad2fc62d3 SHA256 malicious installer
03e8610b95753eee43179b1ccc3fb72c8595a7d76e9b0290ea765f8e6372d4f9 SHA256 malicious installer
0555ba582ffdb07a3e93a4d936d2d0d2bd506040f12e5b55e042e82d4bc169ad SHA256 malicious installer
fba1b353b063a068bd8a191ce699d335158028a6c94282a27f86b784cd4e94e5 SHA256 malicious installer
b3c47e48facfb1d6e4f93b1e9b91c1a931f5e491c5ab4aa0fc5c10ed077674b4 SHA256 malicious installer
149271557eec7f5b17cd046d1f9936dca1654be1edd7835f005fbba145d65b8c SHA256 malicious installer
1b6ab4d69332a041109c9a8b7bc1d12dd28566a0614363f7887d9044e4345a2e SHA256 malicious installer
e1368e893c44b29acfe7e9e190bbe448deda18d1847ed697b01c17a373207053 SHA256 malicious installer
efc27a42e520918f83b041f81975e8dbca9916d159dfc41380112c20b43bcd39 SHA256 malicious installer
c03a524b4e0561141012a6dc17f09bc8d0bf772cf2c94731971a50d67dccb2f4 SHA256 malicious installer
47835bbb98d4660ffa225000797e22c3cfd48ae43af8ccf0999a760b8c3a92ba SHA256 malicious installer
1-27[.]qq-weixin[.]org Domain C&C
38[.]181[.]70[.]178 IP C&C
1-31.qq-weixin[.]org Domain Sibling Domains
1-8.qq-weixin[.]org Domain Sibling domains

Yara Rule

rule FatalRAT

{
meta:

            author = “Cyble Research and Intelligence Labs”

            description = “Detects FatalRAT dll files”

            date = “2024-04-10”

            os = “Windows”

            hash = “69cbdb401d6c03f3d64b3bf48d527cb4bf507952f34b170a3d020707fc4ff7be”

strings:

            $a1  = “SVP7” ascii nocase

            $a2  = “SVP7-Thread running” ascii nocase

            $a3  = “DisableLockWorkstation” ascii nocase

condition:

            uint16(0) == 0x5a4d and all of them

}

The post FatalRAT’s New Prey: Cryptocurrency Users in the Crosshairs appeared first on Cyble.




Source: Original Post