CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations

By Cluster25 Threat Intel Team
October 12, 2023

Cluster25 observed and analyzed several phishing-based attacks to be linked to a Russia-nexus nation-State threat actor. The attack involves the use of malicious archive files that exploit the recently discovered vulnerability affecting the WinRAR compression software versions prior to 6.23 and traced as CVE-2023-38831.

The lure file consists in a PDF document, contained in the archive, that shows a list of Indicator of Compromise (IoCs) with domain names and hashes related to different malware, including SmokeLoader, Nanocore RAT, Crimson RAT and AgentTesla. Due to the vulnerability, the click on the PDF file causes a BAT script to be executed, which launches PowerShell commands to open a reverse shell that gives the attacker the access to the targeted machine and a PowerShell script that steals data, including login credentials, from the Google Chrome and Microsoft Edge browsers. To exfiltrate the data, attackers uses the legit web service webhook[.]site.

INSIGHTS

The lure sample is an archive file named IOC_09_11.rar, probably with the intention of masquerading itself as a file to be used to share Indicators of Compromise (IoCs). The archive is crafted to exploit the WinRAR vulnerability traced as CVE-2023-38831: it contains a bogus PDF file named IOC_09_11.pdf with a trailing space character in its filename and a directory with the same name (including the trailing space) with the file named “IOC_09_11.pdf .cmd”, which is a BAT script.

Content of the malicious RAR file

Due to the vulnerability, if the victim user has an installed version of the WinRAR software prior to 6.23, the opening of the bogus PDF file causes the BAT script to be executed. The BAT script first launches a background command of WinRAR to extract its content in the %TEMP% directory, then it deletes the script file from it and opens the PDF file to show the lure to the victim. The latter shows a list of IoCs containing domain names and hashes related to different malware, including SmokeLoader, Nanocore RAT, Crimson RAT and AgentTesla.

Content of lure PDF document used by attackers

Then, the script begins the malicious activity, launching three PowerShell commands.

Content of.bat script used in the kill-chain

The first command writes a Private RSA Key in the file rsakey under the directory %LOCALAPPDATA%Temp. The file is used by the second command to open a reverse shell that gives the attacker access to the targeted machine, using the SSH tool with the TCP port 443 at the IP address 216.66.35[.]145.

Code snippet of PowerShell code used in the kill-chain

The third command executes a Base64-encoded string that once decoded shows the following PowerShell script:

Redacted second-stage code snippet of PowerShell code used in the kill-chain

The script retrieves and decrypts the data, including the Login credentials, from the Google Chrome and Microsoft Edge browsers, then it sends it to the threat actor using the legit Webhook.site service, which allows users to set a unique URL and to obtain a log of requests or emails sent to it, so to inspect their content. The script performs a POST request with the retrieved data to the following URL, containing the unique token owned by the attacker:

WEBHOOK URL
http://webhook[.]site/e2831741-d8c8-4971-9464-e52d34f9d611

According to the Cluster25 visibility and considering the sophistication of the infection chain, the attack could be related with low-to-mid confidence to the Russian state-sponsored group APT28 (aka Fancy Bear, Sednit).

MITRE ATT&CK MATRIX

TACTIC TECHNIQUE DESCRIPTION
Initial Access T1566.001 Phishing: Spearphishing Attachment
Execution T1059.003 Command and Scripting Interpreter: Windows Command Shell
Execution T1204.002 User Execution: Malicious File
Defense Evasion T1140 Deobfuscate/Decode Files or Information
Defense Evasion T1036 Masquerading
  Discovery   T1082   System Information Discovery
  Collection   T1005   Data from Local System
  Command and Control   T1105   Ingress Tool Transfer
  Command and Control   T1071   Application Layer Protocol
  Command and Control   T1102   Web Service
  Exfiltration   T1567   Exfiltration Over Web Service

INDICATORS OF COMPROMISE

CATEGORY TYPE VALUE
  PAYLOAD SHA256 072afea7cae714b44c24c16308da0ef0e5aab36b7a601b310d12f8b925f359e7
  PAYLOAD SHA1 9e630c9879e62dc801ac01af926fbc6d372c8416
  PAYLOAD MD5 89939a43c56fe4ce28936ee76a71ccb0
  PAYLOAD SHA256 91dec1160f3185cec4cb70fee0037ce3a62497e830330e9ddc2898f45682f63a
  PAYLOAD SHA1 bd44774417ba5342d30a610303cde6c2f6a54f64
  PAYLOAD MD5 9af76e61525fe6c89fe929ac5792ab62
  NETWORK IPv4 216[.]66[.]35[.]145
  NETWORK URL http://webhook[.]site/e2831741-d8c8-4971-9464-e52d34f9d611

Scroll to Top