New Persian Remote World Selling A Suite Of Malicious Tools – Cyble

Key Takeaways

  • Cyble Research and Intelligence Labs (CRIL) has recently identified a website called Persian Remote World engaged in the sale of a variety of malicious tools.
  • Persian Remote World provides an extensive range of malicious tools, including Remote Access Trojans (RATs), loaders, and crypters.
  • The site developers offer these malicious tools under different subscription models at varying prices.
  • According to the website, the RAT can perform multiple privilege escalation and defense evasion operations.
  • In addition to conventional RAT capabilities, Persian RAT also performs ransomware functionalities.
  • The developer behind this project shared the free version of Persian Loader on their Telegram channel.

Overview

In our ongoing efforts to gather real-time threat intelligence, CRIL came across a new malware loader, Persian Loader, present in VirusTotal. This loader has a link to a Telegram channel that hosts a free Persian Loader builder. The channel also contains a link to the website Persian Remote World, which sells multiple software tools with malicious capabilities. This website sells a range of malicious tools, including Remote Access Trojans (RAT), loaders, and crypters. CRIL began searching for an active infection or campaign in the wild that uses Persian Remote World-related tools, but no such activities have been identified so far.

The website offers Persian RAT along with a panel to construct the RAT binary and manage infected systems. The RAT panel includes details such as PC Name, Server, IP Address, User, Windows OS version, Architecture, CPU, GPU, and country, as stated on the Persian Remote World website. The developers are selling these RATs under a subscription model ranging from a 1-month plan priced at $20 to a lifetime subscription available for $200, as shown below.

Persian RAT Post on Website
Figure 1 – Persian RAT Post on Website

Persian Remote World is promoting a malicious loader named Persian Loader. This loader includes both a builder panel and a client management panel, showcasing an active list of victims and offering functionalities to execute files on compromised systems. This panel incorporates options to reconnect with victims, start or stop listening, execute files, and build the loader binary, all outlined in the accompanying figure. The developers are selling this tool for a monthly subscription fee of $20, as shown below.

Persian Loader Post on Website
Figure 2 – Persian Loader Post on Website

Persian Security, a tool created by Persian Remote World, is a crypter that can encrypt and obfuscate executable files to prevent detection and analysis. This crypter is sold for 45$ per month to 650$ for a lifetime subscription, making it the most expensive tool of all. The figure below shows the website hosting the Persian Crypter.

Persian Security Post on Website
Figure 3 – Persian Security Post on Website

The website also includes a link to a Telegram channel created on October 18th, signaling that the developers have only recently commenced the development of these tools. The Telegram channel hosts a free Persian Loder Builder and offers a paid version for 20$ per month. The figure below shows this Telegram channel.

Persian Remote World Telegram Channel
Figure 4 – Persian Remote World Telegram Channel

Technical Details

Persian RAT

CRIL came across a Persian RAT malware sample on VirusTotal, which has sha256 hash: 43403eeb7b8ea5705c727a0fff8d714ea3e27449b6b9ba0edd12c666848e2492. Notably, the file size is 3.75 MB, which is relatively large compared to contemporary RAT binaries. Upon execution, Persian RAT establishes a mutex named “Persian” through the CreateMutexW() API. This mutex prevents the occurrence of multiple instances on a system and facilitates coordination during multithreading operations. The figure below shows the routine to create the mutex.

Persian RAT Creating Mutex
Figure 5 – Persian RAT Creating Mutex

Following the establishment of the mutex, Persian RAT proceeds to activate the SeShutdownPrivilege and SeDebugPrivilege privileges through the AdjustTokenPrivileges() API. These privileges facilitate various malicious operations:

  • SeShutdownPrivilege provides the capability to initiate system reboots
  • SeDebugPrivilege empowers a process to examine and modify the memory of other processes

The figure below shows the routine to set privileges.

Routine to Set Privileges
Figure 6 – Routine to Set Privileges

Persian RAT is manually controlled; it waits for the C&C instructions to perform any malicious activities. However, based on our static analysis, we can see numerous routines suggestive of the RAT possessing multiple highly malicious capabilities. These capabilities have been expounded upon in the following sections.

Firewall operation:

Persian RAT includes a function enabling Threat actor (TA) to manipulate victim system firewalls. This involves the use of netsh commands for firewall control, with the following operations:

  • Enable firewall: netsh firewall set opmode enable
  • Disable firewall: netsh firewall set opmode disable
  • Turn on current profile state: netsh advfirewall set currentprofile state on
  • Turn off current profile state: netsh advfirewall set currentprofile state off
Persian RAT Routine to Manipulate Firewalls
Figure 7 – Persian RAT Routine to Manipulate Firewalls

Keylogger:

Persian RAT contains a routine designed to capture keystrokes from the victim and transmit them to the TA. The TA possesses the capability to send commands that enable or disable keylogging as required. The figure below shows the routine related to keylogging.

Figure 8 Persian RAT Routine for Keylogging
Figure 8 – Persian RAT Routine for Keylogging

Persian RAT has a routine for stealing cookies from the victim’s system, targeting the following browsers:

  • Mozilla Firefox
  • Google Chrome
  • Microsoft Edge

Games and Software:

Persian RAT additionally focuses on different games and applications installed on the victim’s system. TAs can scan diverse games and programs, exfiltrating crucial files from their respective directories. The games and applications targeted by Persian RAT are:

  • AppDataRoamingSpotify
  • C:Program FilesiTunes
  • C:Program FilesEpic Games
  • C:Riot GamesLeague of Legends
  • C:Program FilesEpic GamesFortnite
  • C:Program Files (x86)Minecraft Launcher
  • C:Program Files (x86)Overwatchretail
  • C:Program Files (x86)SteamsteamappscommonCounter-Strike Global Offensive
  • C:Riot GamesVALORANT
  • C:Program Files (x86)Origin GamesApex
  • C:Program FilesGenshin ImpactGenshin Impact Game
  • AppDataLocalDiscord
  • AppDataRoamingExodus
  • AppDataRoamingatomic
  • AppDataRoamingFileZilla
  • AppDataRoamingVMware
  • AppDataRoamingTelegram Desktop
  • C:Program Files (x86)Steam
  • C:Program Files (x86)Rockstar Games
  • C:Program Files (x86)Ubisoft
  • C:Program Files (x86)Origin
  • C:Program Files (x86)Battle.net

Commands:

The RAT incorporates a range of embedded commands pertaining to User Account Control (UAC), firewall manipulation, ransomware operations and screen capture functionality, and interactions with banking websites. Following are the commands embedded in the RAT.

  • DISABLEUAC
  • DISABLEFIREWALL
  • STARTBOMB
  • STARTRANSOMWARE
  • STARTSCREENWATCHING
  • STOPSCREENWATCHING
  • ACTIVATEBANKING
  • DISABLEBANKING

Targeting Banking and Financial organizations:

We also came across some interesting hard-coded strings in the binary, suggesting that the RAT targets several financial institutions, as shown below.

Hardcoded Strings referring to Financial Institutions
Figure 9 – Hardcoded Strings referring to Financial Institutions

Persian Loader

Persian Loader allows the execution of other executable files on the victim system. The Persian loader binary employs TCP Sockets, facilitating the execution of second-stage payloads within infected systems. The Persian Loader builder and management tool, namely Persian X Loader 5.0, was hosted on their Telegram channel for free. The figure below shows the Persian X Loader 5.0 Builder panel.

Persian X Loader 5.0 Builder Panel
Figure 10 – Persian X Loader 5.0 Builder Panel

Persian X Loader 5.0 can create a custom listener server, which can be bound to any designated port. This listener acts as a server for the malicious loaders created by the Persian X Loader 5.0 Builder. The figure below shows the Persian Loader management panel for listening ports.

Port Binding for Persian Loader
Figure 11 – Port Binding for Persian Loader

The TA can build the malicious loader binary using Persian X Loader 5.0 by adding the listener server IP and port within the builder. When executed in the victim’s systems, the newly built executable will then connect to the listener server on the listener port. The figure below shows the builder for Persian Loader.

Persian Loader Builder
Figure 12 – Persian Loader Builder

The Persian Loader has a panel to manage already deployed loaders running on victim systems. This panel has various options, which include reconnecting the specific victim, starting the listening server, stopping the listening server, executing the file in the already infected system, and building new loader binaries. The figure below shows the active panel for Persian loader to execute other malicious files on the compromised system.

Persian Loader Panel for Executing Files Remotely
Figure 13 – Persian Loader Panel for Executing Files Remotely

Conclusion

The malicious tools that we have observed and analyzed available on Persian Remote World pose a significant threat to potential victims. Threat Actors can remotely execute commands, exfiltrate data, and manipulate system settings on infected systems. RATs are a risk to user privacy, financial security, and the integrity of critical data by enabling unauthorized control.

Threat Actors can perform identity theft, financial fraud, and unauthorized modifications to systems. The persistent nature of RATs makes them particularly dangerous, as they can operate undetected for extended periods, complicating mitigation efforts and further emphasizing the importance of robust cybersecurity measures.  

Our Recommendations 

  • The initial infiltration for RATs and loaders typically takes place via phishing websites or emails. It is crucial to only download and install software applications from well-known and trusted sources and avoid opening emails from unknown senders.
  • Users should confirm the legitimacy of websites by verifying the presence of a secure connection (https://) and ensuring the accurate spelling of domain names.
  • Deploy strong antivirus and anti-malware solutions to detect and remove malicious executable files.
  • Enhance the system security by creating strong, distinct passwords for each of the accounts and, whenever feasible, activate two-factor authentication.
  • Regularly back up data to guarantee the ability to recover it in case of an infection and keep users informed about the most current phishing and social engineering methods employed by cybercriminals.

MITRE ATT&CK® Techniques 

Tactic  Technique ID  Technique Name 
Execution  (TA0002) User Execution (T1203) User opens the malicious software installer
Execution  (TA0002) Command and Scripting Interpreter: Windows Command Shell (T1059.003) RAT can execute itself using cmd.exe
Privilege Escalation (TA0004) Abuse Elevation Control Mechanism: Bypass User Account Control (T1548.002)   RAT has a module to bypass UAC
Defense Evasion (TA0005) Abuse Elevation Control Mechanism: Bypass User Account Control (T1548.002)   RAT has a module to bypass UAC
Defense Evasion (TA0005) Impair Defenses: Disable or Modify System Firewall (T1562.004) RAT has capabilities to disable or enable Firewall
Credential Access (TA0006) Credentials from Password Stores: Credentials from web Browsers  (T1555.003) RAT can access browser data of Chrome, Firefox and Edge
Credential Access (TA0006) Input Capture: Keylogging (T1056.001) RAT can capture keystrokes
Credential Access (TA0006) Input Capture: GUI Input Capture (T1056.002) RAT can take screenshots
Discovery (TA0007) File and Directory Discovery (T1083) RAT can discover Games and Application files and directories
Command and Control (TA0011) Non-Application Layer Protocol (T1095) RAT uses TCP for C&C communication
Exfiltration (TA0010) Exfiltration Over CC&C Channel (T1041) Exfiltration Over C&C Channel
Impact (TA0040) Data Encrypted for Impact (T1486) RAT has a routine to deploy ransomware in it

Indicators of Compromise (IOCs) 

Indicators  Indicator Type  Details 
edb799ce59664a93495cddeed72cef6a
a3f087c21420034bd9544a2d144fbb90ca138afc
43403eeb7b8ea5705c727a0fff8d714ea3e27449b6b9ba0edd12c666848e2492
MD5
SHA1
SHA256
Persian RAT
85b82f2333b7f9b8c0e12ac86e136c67
084270a306e14db5cc8540f3adc8ea1ffa511ba5
4d978a6f806a95c5ee89f8a394ad2a2e4336ad6554922fcde38c46311ac17874
MD5
SHA1
SHA256
Persian Builder
185d2a857bf220f849266b717c860f99
c123aff3567852b5fca04ee3cf40195714325ade
464851b14b01e9ca6ff2f6fbc12c3368e3e89bc6f37174742f6a58e20b881d6e
MD5
SHA1
SHA256
Persian Loader
79628c79d517656a9238e77d8b1f2bed
0f83407aaa82196929c51ff42cba49faad7a4d81
06c496e9d53db6b272f4443e85dfc61f934598f70dbcb78c0f0a371bf86888ed
MD5
SHA1
SHA256
Persian Loader
032df29c4c01ca8f08fd7e3006a2482b
85e2a9aa15a4a75a1d5a6eeb8f72ccb3b8d9a088
d57ea1ea7bbe1894cb161e44bb109f74c8f2338601796b58fa30c2edcdae2017
MD5
SHA1
SHA256
Persian Loader

Source: https://cyble.com/blog/new-persian-remote-world-selling-a-suite-of-malicious-tools/