THE THREAT
As the U.S. and Canadian tax season approaches, eSentire has observed a substantial increase in malware being delivered through tax-themed phishing emails. Cybercriminals are exploiting the urgency and importance of tax-related communications to trick individuals into opening malicious email links, leading to malware infections.
The observed phishing campaigns utilize tax-themed lures, including tax documents, tax returns, and IRS letters. These emails often appear to be sent from legitimate tax authorities or financial institutions and include malicious links leading to malware payloads hosted on attacker-controlled infrastructure.
eSentire has observed the following malware families being delivered from tax-themed campaigns: GuLoader (which in turn loads RemcosRAT), XWorm, RattyRat, and SorillusRAT. These malware families provide threat actors with a variety of functionalities including keylogging, taking screenshots, audio and webcam recording, file transfer, and remote code execution.
With the increasing sophistication of tax-themed phishing campaigns, it is crucial organizations implement proactive email security measures, as well as educate users to minimize the risk of malware infections and protect sensitive information, during the tax season and throughout the calendar year.
What we’re doing about it
- eSentire MDR for Network has rules in place to identify GuLoader, RemcosRAT, XWorm, RattyRat, and SorillusRAT
- eSentire MDR for Endpoint has a wide array of rules in place to detect malicious activity associated with these threats
- BlueSteel, via eSentire MDR for Endpoint, identifies malicious PowerShell activity
- Known malicious IP addresses are blocked via the eSentire Global Block list
- eSentire’s Threat Response Unit released a TRU Positive blog detailing the Ratty RAT and Sorillus RAT infections
- The eSentire Threat Intelligence team is actively tracking related threats for additional details and detection opportunities
What you should do about it
- Individuals and organizations should be vigilant when receiving unsolicited emails or messages related to taxes
- Train users to identify and report potentially malicious content using Phishing and Security Awareness Training (PSAT) programs
- Review the example of a malicious email included below (Figure 1)
- Protect endpoints against malware by:
- Ensuring antivirus signatures are up-to-date
- Using a Next-Gen AV (NGAV) or Endpoint Detection and Response (EDR) tool to detect and contain threats
- If not required for a business function, block password-protected zip archives at the email boundary
- If not required for a business function, block .jar file attachments in email and block emails with .jar in URLs
- Consider removing Java on systems where it is not required
- Consider creating a new “Open With” parameters for .jar files so they open with notepad.exe
- This setting is found in the Group Policy Management Console under User Configuration > Preferences > Control Panel Settings > Folder Options
- Applying this to other script files (.js, .jse, .hta, .vbs) is also recommended for most users to limit the risk of click-to-execute content
- Enforce the use of Multi-Factor Authentication (MFA) to limit the value of stolen credentials
Additional information
GuLoader is a sophisticated malware loader which has heavily abused tax-themed lures in 2023. eSentire’s Threat Response Unit reported on GuLoader around tax season last year in both April and June of 2023. Starting in early March 2024, eSentire has observed an increase in GuLoader incidents resulting in the deployment of the RemcosRAT malware. In observed incidents, users received tax-themed malicious emails which contain a link to a password protected ZIP archive that impersonates a tax return (Figure 1). The ZIP archive contains an LNK file, which if interacted with, leads to the deployment of GuLoader. GuLoader is then launched resulting in the execution of PowerShell commands, establishing persistence via Registry Run Keys, and ultimately the RemcosRAT payload is injected into the memory of a legitimate process (Figure 2). If not detected and remediated quickly, these incidents will lead to information theft and enable remote control over the victim device.
RemcosRAT, XWorm, RattyRat, and SorillusRAT are all Remote Access Trojans offering various information stealing and remote access capabilities, including keylogging, capturing screenshots, recording audio, transferring files, and remotely controlling target machines.
In a recently observed incident involving XWorm malware, a user was identified downloading a malicious JavaScript file, which was impersonating a tax document; the user was directed to the download page via a malicious email. Upon execution, a PowerShell command was spawned to retrieve the XWorm payload from its Command-and-Control (C2) server. Subsequent JavaScript and PowerShell commands were blocked, via the client’s Endpoint agent, preventing malicious actions from occurring (Figure 3).
For additional technical details relating to recent observations of Ratty Rat and Sorillus RAT, delivered via tax-related lures, see the eSentire TRU Positive blog post Beware the Bait: Java RATs Lurking in Tax Scam Emails, published on February 26th, 2024.
Indicators of Compromise | |
intuitfrauddept[.]com | Phishing Email Domain |
intermountaiinhealthcare[.]org | Phishing Email Domain |
goatratedman[.]com | Phishing Email Domain |
stsebss[.]org | Phishing Email Domain |
hxxps[://]trivolibolit[.]com/wp-content/Hpzion[.]png | GuLoader Payload Hosting URL |
hxxps[://]jantickee[.]com/wp-content/Stanles2[.]png | GuLoader Payload Hosting URL |
hxxps[://]gamonosa[.]sa[.]com/.well-known/kr/UvcZuvTnzIO46.bin | GuLoader Payload Hosting URL |
AA55DC4FBEE738D2EAA714E6136C4E0CE8E3EF99C74F4D764F0BE3B790CE8014 | GuLoader LNK File |
63902401F26CBA19F48EBBE0B4C24BE0E2209686E0001009A5878EF0C57415CD | GuLoader LNK File |
FE10BC87167AA524D762E3BD9D7F38F53AE39A8515C28DFFC68B03229235B2A3 | GuLoader VBS File |
558742072F2E71418380FEBD4462A3C5B6CCF83160F385DF2D3799AA78EC58C2 | GuLoader VBS File |
EE23C722FD3A20CC9189903F7715AC6DA2EF2F5CAE0D8C23487CAC1FBC37A1D4 | GuLoader VBS File |
zarusouyt2994hesut01[.]duckdns[.]org | Remcos C2 |
zarusouyt2994hesut02[.]duckdns[.]org | Remcos C2 |
1shanamubunz[.]com | Remcos C2 |
shakaojafun[.]com | Remcos C2 |
85.209.176[.]69 | Remcos C2 |
hxxp[://]91[.]92[.]243[.]28/////////poom///////////////////////////////////atom[.]xml | XWorm Payload Hosting URL |
91.92.243[.]28 | XWorm C2 |
1C56940B0234BF7BEAC519CB62BD0DBE1E1B96B6F7AAB7F7FFBC7CC253EF5D5E | XWorm JavaScript File |
hxxps[://]sahiomn[.]web[.]app/Tax_documents_PDF[.]zip | SorillusRAT Hosting |
hxxps[://]osaminc[.]web[.]app/2023-FILES-MY1040-w2-IRS-letter-1099r_PDF[.]zip | RattyRAT Hosting |
216FFBB3057F8765E2DD73FDAD6E43ECB5D22821423B8824E23BE03A7692E5AD | Sorillus RAT ZIP archive |
FA4723B6970601FB772E808FA142008649773FD281BE46455C69828C0421AE27 | Sorillus RAT JAR File |
FB420FBABBD1BB240D07D01B3841943D457B9CCC0F019E4B7B80973D8A282D57 | RattyRAT JAR File |
185.196.220[.]62 | RattyRAT C2 & SorillusRAT C2 |
https://www.esentire.com/security-advisories/increase-in-tax-themed-email-lure