WrnRAT Disguised as Gambling Games

Short Summary:

AhnLab SEcurity intelligence Center (ASEC) has identified malware being distributed under the guise of gambling games. This malware, named WrnRAT, is designed to control infected systems and steal information. It is distributed through deceptive websites and disguised as various installers, including those for gambling games and computer optimization programs.

Key Points:

  • Malware disguised as gambling games like badugi, 2-player go-stop, and hold’em.
  • Threat actor created a fake gambling game website to distribute malware.
  • Malware named WrnRAT can control infected systems and steal information.
  • Distribution methods include using platforms like HFS and batch scripts with Korean comments.
  • WrnRAT captures user screens and transmits system information.
  • Users are advised to avoid downloading from suspicious sources and to keep security software updated.

MITRE ATT&CK TTPs – created by AI

  • Command and Control (T1071)
    • WrnRAT transmits captured screen data and system information back to the threat actor.
  • Credential Dumping (T1003)
    • WrnRAT may collect sensitive information from the infected system.
  • Execution (T1203)
    • Malware is executed through deceptive installers like “Installer2.exe” and “Installer3.exe”.
  • Persistence (T1053)
    • WrnRAT is designed to maintain persistence on the infected system.

AhnLab SEcurity intelligence Center (ASEC) recently discovered that malware was being distributed under the guise of gambling games such as badugi, 2-player go-stop, and hold’em. The threat actor created a website disguised as a gambling game site, and if the game launcher is downloaded, it installs malware that can control the infected system and steal information. The malware appears to have been created by the threat actor and is referred to as WrnRAT based on the strings used in its creation.

Figure 1. Deceitful page for downloading gambling games

The above case appears to be just one instance, and there is also evidence of distribution disguised as a computer optimization program. For the distribution of malware, platforms like HFS were used.

Figure 2. Platforms used for malware distribution

It is presumed that batch malware is initially installed, through which a dropper is installed. A characteristic of the batch script is that it contains comments written in Korean.

Figure 3. Batch installer

The dropper malware is distributed under names like “Installer2.exe”, “Installer3.exe”, and “installerABAB.exe”, and it was developed in .NET. When executed, the dropper creates a launcher and WrnRAT, executes WrnRAT using the launcher, and then deletes itself. WrnRAT is created in a path disguised as Internet Explorer under the name “iexplorer.exe”.

Figure 4. Dropper and launcher malware

WrnRAT is developed in Python and is distributed as an executable file using PyInstaller. The primary feature of WrnRAT is to transmit captures of the user’s screen, but it also supports sending basic system information and terminating specific processes. The threat actor is also creating and using additional malware that configures firewalls.

Command Function
PC_INFO_REQ Transmit system information (IP, MAC address, Client ID, gateway)
SET_MONITOR_STATE Configure monitoring state (screen capture)
KILL_PROCESS_REQ Terminate target process
SET_CAPTURE_DELAY Configure screen capture delay time
SET_CAPTURE_QUALITY Configure screen capture quality

Table 1. Commands supported by WrnRAT

Figure 5. Configuration data of WrnRAT

Recently, malware disguised as gambling games such as badugi, 2-player go-stop, and hold’em is being distributed to steal information. The threat actor appears to be motivated by financial gain and targets users of gambling games to capture screenshots. As a result, the attacker can monitor the gameplay of gambling game users, and illegal game users may incur additional financial losses. Users should avoid downloading installers from illegal and suspicious sources. Also, V3 should be updated to the latest version so that malware infection can be prevented.

MD5

0159b9367f0d0061287120f97ee55513
03896b657e434eb685e94c9a0df231a4
0725f072bcd9ca44a54a39dcec3b75d7
0d9e94a43117a087d456521abd7ebc03
1b8dfc3f131aaf091ba074a6e4f8bbe6
URL

http[:]//112[.]187[.]111[.]83[:]5723/installerABAB/MicrosoftEdgeUpdate[.]exe
http[:]//112[.]187[.]111[.]83[:]5723/installerABAB/bound[.]exe
http[:]//112[.]187[.]111[.]83[:]5723/installerABAB/iexplore[.]exe
http[:]//112[.]187[.]111[.]83[:]5723/installerABAB/installerABAB[.]cmd
http[:]//112[.]187[.]111[.]83[:]5723/installerABAB/installerABAB[.]exe
FQDN

aaba1[.]kro[.]kr
delete1[.]kro[.]kr
inddio23[.]kro[.]kr
nt89kro[.]kr
nt89s[.]kro[.]kr
IP

160[.]251[.]93[.]181

Source : https://asec.ahnlab.com/en/84086/