search
HomeOperation and MaintenanceSafetyAnalysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Background

On March 17, 2019, 360 Threat Intelligence Center intercepted a case of a suspected "Golden Rat" APT organization (APT-C-27) using the WinRAR vulnerability (CVE-2018-20250[6] ) Targeted attack samples targeting the Middle East. The malicious ACE compressed package contains an Office Word document that uses a terrorist attack as a bait to induce the victim to decompress the file. When the victim decompresses the file through WinRAR on the local computer, the vulnerability will be triggered. After the vulnerability is successfully exploited, the vulnerability will be built-in The backdoor program (Telegram Desktop.exe) is released into the user's computer startup directory. When the user restarts or logs in to the system, the remote control Trojan will be executed to control the victim's computer.

360 Threat Intelligence Center discovered through correlation analysis that this attack activity is suspected to be related to the "Golden Rat" APT organization (APT-C-27), and after further tracing and correlation, we also found multiple Malicious samples of the Android platform related to this organization are mainly disguised as some commonly used software to attack specific target groups. Combined with the text content related to the attacker in the malicious code, it can be guessed that the attacker is also familiar with Arabic.


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Detection of backdoor program (TelegramDesktop.exe) on VirusTotal

Sample analysis

360 threats The Intelligence Center analyzed the sample that exploited the WinRAR vulnerability. The relevant analysis is as follows.

Using terrorist attacks to induce decompression

314e8105f28530eb0bf54891b9b3ff69#File name This Office Word document is part of a malicious compressed file whose contents are related to a terrorist attack. Due to its political, geographical and other particularities, the Middle East has suffered numerous terrorist attacks and its people have suffered greatly. Therefore, people in the region are sensitive to terrorist attacks and other incidents, which increases the possibility of victims decompressing files:
##MD5


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East
Decoy document translation content

If the user decompresses the malicious compressed package, the WinRAR vulnerability will be triggered, thereby releasing the built-in backdoor program to the user's startup directory Medium:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East
The released backdoor program Telegram Desktop.exe will be executed when the user restarts the computer or logs in to the system.

Backdoor(Telegram Desktop.exe)

##File name##MD5##36027a4abfb702107a103478f6af49be76fd23de8f977f51d832a87d7b0f7692a0ff8af333d74fa5ade2e99fec010689.NET

The backdoor program TelegramDesktop.exe will read data from the PE resource and write it to: %TEMP%\Telegram Desktop.vbs, then execute the VBS script and sleep for 17 seconds until the VBS script is completed:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

The main function of this VBS script is to decode the built-in string through Base64 and write the decoded string to the file: %TEMP%\Process. exe, and finally execute Process.exe:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

After execution of Process.exe, file 1717.txt will be created in the %TEMP% directory and written Data related to the final executed backdoor program for subsequent use by Telegram Desktop.exe:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Then TelegramDesktop.exe will read 1717. txt file and replace the special characters in it:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Then decode the data through Base64 and load the decoded data in the memory. Data:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

The data finally loaded and executed in the memory is the njRAT backdoor program. The relevant configuration information is as follows:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

njRAT

The njRAT backdoor program executed by memory loading will first create a mutex to ensure that only one instance is running:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

And determine whether the current running path is the path set in the configuration file. If not, copy itself to the path to start execution:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Then close the attachment checker and firewall:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

and open the keylogging thread, and write the results of the keylogging to the registry :


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Open the communication thread, establish communication with the C&C address and accept command execution:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

##The njRAT remote control also has multiple functions such as remote SHELL, plug-in download and execution, remote desktop, file management, etc.:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

AndroidPlatformSampleAnalysis

360 Threat Intelligence Center also related to multiple Android platform malicious samples recently used by the "Golden Rat" (APT-C-27) APT organization through VirusTotal, which also used 82.137. 255.56 as the C&C address (82.137.255.56:1740):


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East
##The recently associated Android platform backdoor samples are mainly disguised as Android system updates, Office Upgrade programs and other commonly used software. The following is our analysis of an Android sample disguised as an Office upgrader

Telegram Desktop.exe
SHA256
Compilation information
##File MD5##File name
1cc32f2a351927777fc3b2ae5639f4d5
OfficeUpdate2019.apk

After the Android sample is started, it will induce the user to activate the device manager, then hide the icon and run it in the background:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Induces the user to complete the installation Afterwards, the sample will display the following interface:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Then the sample will obtain the online IP address and port through Android's default SharedPreferences storage interface. If obtained If not, decode the default hard-coded IP address and port online:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

# #Decoding algorithm of related IP address:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

#The final decoded IP address is: 82.137.255.56, and the port also needs to be hard-coded. Add 100 to get the final port 1740:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Once successfully connected to the C&C address, online information will be sent immediately, control instructions will be received and executed. This sample can record, take photos, perform GPS positioning, upload contacts/call records/text messages/files, and execute commands from the cloud and other functions


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

The list of related commands and functions of the Android backdoor sample is as follows:

##CommandFunction##1617##18192021Copy files according to cloud instructionsMove files according to cloud instructionsRename the file according to the cloud instructionsRun FileCreate the directory according to the cloud instructionsExecute cloud commandExecute a ping commandGet and upload contact information##32Get and upload text messages33Get and upload call recordsStart recording
Heartbeat management
connect
Get the specified file Basic information
Download file
Upload files
Delete files ##22
23
24
25
28
29
30
31
##34
##35 Stop and upload the recording file
36 Take photos
37 Start GPS positioning
38 Stop GPS positioning and upload location information
39 Use the cloud to send ip/port
40 Reports the currently used ip/port
to the cloud 41 Get installed application information

It is worth noting that the command information returned by this sample contains information related to Arabic, so we speculate that the attacker is more likely to be familiar with using Arabic:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Tracing and correlation

By querying the C&C address of the backdoor program captured this time (82.137.255.56:1921), it can be seen that this IP address has been used by APT many times since 2017. - Used by the C-27 (Golden Rat) organization, this IP address is suspected to be the organization’s inherent IP asset. On the big data correlation platform of 360 Network Research Institute, you can view multiple sample information associated with the IP address


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

Through 360 Threat Intelligence The central threat analysis platform (ti.360.net) queried the C&C address and it was also labeled with APT-C-27 related tags:


Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East

And the functional modules, code logic, built-in information language, target group, network assets and other information of the relevant Trojan samples (Windows and Android platforms) captured this time are all the same as those used by APT-C-27[2] exposed earlier. Trojan sample information is highly similar. Therefore, according to the 360 ​​Threat Intelligence Center, the relevant samples intercepted this time are also related to the "Golden Rat" APT organization (APT-C-27).

As we predicted, attacks using the WinRAR vulnerability (CVE-2018-20250) to spread malicious programs are in the outbreak stage. The 360 ​​Threat Intelligence Center has previously observed multiple APT attacks using this vulnerability. , and the targeted attack activities intercepted this time by the suspected "Golden Rat" APT organization (APT-C-27) that exploited the WinRAR vulnerability is just one example of many cases of using this vulnerability to carry out targeted attacks. Therefore, the 360 ​​Threat Intelligence Center once again reminds users to take timely measures to prevent this vulnerability. (See the "Mitigation Measures" section)

Mitigation Measures

1. The software manufacturer has released the latest WinRAR version. The 360 ​​Threat Intelligence Center recommends that users promptly update and upgrade WinRAR (5.70 beta 1) To the latest version, the download address is as follows:

32-bit: http://win-rar.com/fileadmin/winrar-versions/wrar57b1.exe

64-bit: http://win -rar.com/fileadmin/winrar-versions/winrar-x64-57b1.exe

2. If the patch cannot be installed temporarily, you can directly delete the vulnerable DLL (UNACEV2.DLL), which will not affect general use. , but an error will be reported when encountering ACE files.

Currently, all products based on the threat intelligence data of 360 Threat Intelligence Center, including 360 Threat Intelligence Platform (TIP), Tianqing, Tianyan Advanced Threat Detection System, 360 NGSOC, etc., already support such attacks. accurate detection.

The above is the detailed content of Analysis of how to use WinRAR vulnerability to target targeted attack activities in the Middle East. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:亿速云. If there is any infringement, please contact admin@php.cn delete
WinRAR32位-winrar怎么设置中文?WinRAR32位-winrar怎么设置中文?Mar 18, 2024 am 11:01 AM

WinRAR作为一款优秀的压缩包管理器,是档案工具RAR在Windows环境下的图形界面。WinRAR适用于备份数据,缩减电子邮件附件的大小,解压缩从Internet上下载的RAR、ZIP及其它类型文件,并且可以新建RAR及ZIP格式等的压缩类文件,而WinRAR32位版本则深受广大用户的好评,今天就让小编为大家详细介绍一下WinRAR32位,以及winrar怎么设置中文吧!一、WinRAR32位的由来WinRAR32位的作为Windows版本的RAR压缩文件管理器,这是一个允许你创建、管理和控

winrar怎么加密压缩包-winrar加密压缩包方法winrar怎么加密压缩包-winrar加密压缩包方法Mar 23, 2024 pm 12:10 PM

小编将为大家介绍加密压缩的三种方法:方法一:加密最简单的加密方法,就是在加密文件时输入想要设置的密码,完成加密和压缩了。方法二:自动加密普通的加密方式,需要我们加密每个文件的时候都需要输入密码,如果你想要加密大量压缩包,并且密码是一样的话,那么我们可以在WinRAR中设置自动加密,之后只要正常压缩文件,WinRAR会给每个压缩包添加密码。方法如下:打开WinRAR,点击选项–设置设置界面中,切换到【压缩】,点击创建默认配置–设置密码在这里输入我们想要设置的密码,点击确定就完成设置了,我们只需要正

winrar 64位-winrar怎么解压?winrar 64位-winrar怎么解压?Mar 18, 2024 pm 12:55 PM

WinRAR是一款功能强大的压缩文件管理工具,提供了丰富的功能和易于使用的界面。WinRAR64位版本特别针对64位操作系统进行了优化,能够更好地利用系统资源和性能。接下来就让小编为大家介绍一下winrar64位以及解答一下winrar怎么解压吧!一、winrar64位是什么软件WinRAR是一款功能强大的压缩包管理器。这款软件可用于备份您的数据,缩减电子邮件附件的大小,解压缩从Internet上下载的RAR、ZIP及其它文件,并且可以新建RAR及ZIP格式的文件。目前最新WINRAR版本为Wi

winrar的32位版本的含义是什么?winrar的32位版本的含义是什么?Jan 18, 2024 am 09:00 AM

很多人都听过winrar32位和winrar64位,但是大部分都不知道这两者的区别,甚至不知道winrar32位是什么?其实它就是一款压缩工具的格式,只能用在32位的系统上。winrar32位什么意思答:winrar32位是为普通用户设计的。winrar32位是为不需要大量内存和浮点性能的普通用户而设计的。winrar32位拓展介绍1、winrar32位是为普通用户所设计的,winrar64位的用户多是需要大量内存的。winrar64位的运算速度是winrar32位的两倍。2、winrar64位

winrar是电脑自带的吗winrar是电脑自带的吗Jul 28, 2022 pm 02:26 PM

winrar不是电脑自带的,它是一个独立的软件,需要下载安装。WinRAR是一款功能强大的压缩包管理器,它是档案工具RAR在Windows环境下的图形界面。WinRAR内置程序可以解开CAB、ARJ、LZH、TAR、GZ、ACE、UUE、BZ2、JAR、ISO、Z和7Z等多种类型的档案文件、镜像文件和TAR组合型文件;对于RAR格式档案文件提供了独有的恢复记录和恢复卷功能。

winrar密码保护的使用方法介绍winrar密码保护的使用方法介绍Jan 18, 2024 am 09:06 AM

很多人都知道winrar要怎么压缩文件,但是对于一些需要保密的文件却不知道如何添加密码。对于这种情况,我们只需要在压缩文件中就可以完成操作。winrar如何加密码1、选择需要加密的文件,单击鼠标右键,选择“添加到压缩文件”。2、在“常规”栏中选择“设置密码”选项。3、输入两次密码之后,点击“确定”。如果在此处勾选了加密文件夹,那么压缩出来的文件在之后打开前都要输入密码。4、最后回到“常规”栏,点击“确定”,文件就开始压缩了。等待压缩结束,就完成了文件加密了,快来实践一下吧。

如何利用WinRAR漏洞针对中东地区的定向攻击活动分析如何利用WinRAR漏洞针对中东地区的定向攻击活动分析May 30, 2023 am 08:55 AM

背景2019年3月17日,360威胁情报中心截获了一例疑似“黄金鼠”APT组织(APT-C-27)利用WinRAR漏洞(CVE-2018-20250[6])针对中东地区的定向攻击样本。该恶意ACE压缩包内包含一个以恐怖袭击事件为诱饵的OfficeWord文档,诱使受害者解压文件,当受害者在本地计算机上通过WinRAR解压该文件后便会触发漏洞,漏洞利用成功后将内置的后门程序(TelegramDesktop.exe)释放到用户计算机启动项目录中,当用户重启或登录系统都会执行该远控木马,从而控制受害者

可以删除winrar文件夹吗?可以删除winrar文件夹吗?Jan 24, 2024 pm 10:57 PM

许多小伙伴在使用完WinRAR之后想要删除WinRAR的文件夹,但又担心会对下载的软件程序有影响。那么WinRAR文件夹能不能删除呢,我们一起来看一下吧。winrar文件夹可以删除吗答:WinRAR文件夹可以删除。不会对软件程序造成影响,但是不建议删除。WinRAR文件夹可以删除吗拓展说明1、如果删除的是WinRAR的快捷方式,那么对下载的没有什么影响。2、如果把WinRAR源程序删除了,网络上下载的许多东西都是以压缩包的形式呈现的,删除了以后就不能打开被压缩的软件了。

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Tools

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!