Release Notes
This release consists of the following:
- ToneShell Backdoor and Dropper
- XPhase Clipper
- Coin Dropper, Installer, and Downloader (CT named malware associated with XPhase Clipper)
- TakeOut Powershell dropper and loader
- DiceLoader malware
- RustDoor backdoor
- IceNova (IBM name), aka Latrodectus
- TinyTurla-NG malware
- Pikabot Injector and Core variants
- JKwerlo Ransomware
- HodeRAT implant (CT named malware)
ToneShell
Following a post from Any.RUN on X, including an article from Cyble, we added support for the ToneShell dropper and backdoor components associated with Mustang Panda activity. Given the numerous variants of ToneShell, there are multiple parser components for ACCE ToneShell support to extract the C2 socket addresses or C2 addresses.
- ToneShell Container + Dropper + Single: ef96afb2794f800918fddd76f6756e1c
- ToneShell Backdoor (Multiple): d901af6c326d9d6934d818beef214e81
- ToneShell Backdoor (SOCKADDR_IN): 88a1173f01f6f138c67b1780ad308f99
- ToneShell Backdoor (Thunk): 271fe2f5517c8d999f0f0c8578630422
- ToneShell Backdoor (Dictionary): bb044e4e327eec7617c12d88d9b863ee
XPhase
Cyble recently published research about XPhase Clipper, which is configured with numerous CryptoCurrency addresses for the purposes of monitoring and modifying addresses observed on the infected machines clipboard. While researching XPhase, we identified Nukita compiled Python versions, sharing not only the unique regex patterns, but also multiple CryptoCurrency addresses with the Cyble reported samples.
The VBScript dropper, downloader, and installer components reported by Cyble were unnamed, and we dubbed them “Coin” in order to add ACCE modules for them.
- Coin Dropper + Downloader: 996f4b92cf444d45078887f1c179d533
- XPhase Clipper: 703f720e4fe8e05d5440da781363122b
- XPhase Clipper (Python): e310f7f429b04daec0c238879072149f
DiceLoader
Sekoia published research about a FIN7 intrusion set downloader called DiceLoader, which is loaded into memory using a PowerShell loader known as TakeOut.
The TakeOut PowerShell loader is highly obfuscated, using multiple methods to construct, shuffle, and ultimately concatenate a Base64-encoded payload. Payloads have been observed to include DiceLoader, CARBANAK Backdoor, and CobaltStrike BEACON.
ACCE modules were added for the TakeOut Dropper and Loader, as well as DiceLoader.
- TakeOut + DiceLoader: 828a5d8bc4ff9eb951291593f785f01e
- TakeOut + CARBANAK: 0ce4e5d4713582ad60af2a69059962e3
Pikabot
We continuously monitor an array of sources for new variants of malware that ACCE supports, and recently came across reported Pikabot samples on Malware Bazaar that we did not recognize. As we analyzed the reported sample (and other related samples) we identified a few major changes from previous Pikabot injectors:
- Previous Pikabot injectors used steganography to store chunks of the encrypted component in PE resources. The new version stores the chunks of the encrypted component in Base64 encoded global buffers.
- In previous versions, each chunk was XOR decrypted and, after concatenating all of the buffers, either RC4 or AES-CBC decrypted. In the new version, each buffer is Base64 decoded and RC4 decrypted, and the concatenated results are LZNT1 decompressed.
A marked change was also observed in the configuration for the resulting Pikabot Core components. While the C2 configuration was previously AES-CBC decrypted following string decryption, in the latest version all of the configuration data is in plaintext. Additionally, the configuration data consists of multiple fields, including interval values, a mission id, a registry value, a user-agent string, HTTP headers, and C2 socket addresses and URL paths.
- Pikabot: f5cea7d74d36624df4e136c6c74b30f0
HodeRAT
When we conducted research on Donut Shellcode in October, we observed a fully functional RAT containing RC4 encrypted configuration, including at least 100 C2 socket addresses, a kill date (ranging from 2023-06-04 to 2023-08-26), and optional SSL certificate hashes (fingerprints). We have not observed samples compiled since 2023-08-11, and have finalized support in ACCE for the RAT, dubbing it HodeRAT.
All IOCs associated with HodeRAT can be found on our GitHub, with example ACCE support found below.
- HodeRAT: 13ac24fc44c7794fb4470d7afee2ca4b