Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

10/16/2019
10:30 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Even RATs Need Marketing

Palo Alto Networks' Unit 42 researchers have discovered a new and previously undocumented Remote Access Tool (RAT).

Palo Alto Networks' Unit 42 researchers discovered a new and previously undocumented Remote Access Tool (RAT) last month and then blogged about it. They say that they found almost 50 instances of it in more than 2,200 attack sessions they monitored within the first month it was available for sale. The report goes into the RAT manager/builder, client malware, as well as profiling the 18-year-old Swedish threat actor they assert is behind it.

Using the handles Speccy and Rafiki, the author posted a link to the RAT sales site on some dark web forums in the beginning of September. He thoughtfully posted a setup video for it as well. This hands-on sales approach may be indicating the rise of personalized, "artisanal" malware efforts. Taking a commodity product (the RAT) and adding value by overlaying additional buyer services is similar to what craft breweries do. It may serve as a justification for higher product prices, as well.

Speccy on his sales site offers licenses to his RAT at a relatively high price when compared to other commodity RATs. $49 gets a 31-day license, and there are discount plans of $117 for 93 days, and $438 for one year. Payment is made in major cryptocurrencies.\r\nThe features of the RAT are enumerated on the site too, but boil down to "you can do anything you want" to the target/victim. Blackremote (that's the name of the RAT) uses the third-party "CodeVEST" licensing system, which is also to be found on underground forums.

When it is unpacked after purchase, the manager/builder installs a 9MB main executable BLACK-RC.EXE, a pair of resource libraries, and a resource directory with a pair of .wav files. The builder can customize the client to the form needed by the purchaser.

Both the builder and client that will be on the victim machine are heavily protected, using more than one obfuscator (Agile.NET, Babel .NET, Crypto Obfuscator, Dotfuscator, Goliath.NET, SmartAssembly, Spices.Net, Xenocode).

The command and control path for the RAT was well known to Unit42. The same C2 has been observed by them as being used by the same actor in over 50 Netwire, Nanocore, Quasar and Remcos commodity RAT samples that date back to early 2018.

The researchers say that they have outed the perpetrator. In the blog they note that, "Unit 42 has fully identified this actor; we will not share his identity here, but we have ensured that the correct authorities have been advised. The longer this is sold, not only the more samples of this RAT will be built and spread, but also the opportunity for other actors to crack this RAT and distribute it indiscriminately. It is important to identify and interdict the sale of such malware as early as possible to prevent its proliferation, which enables a large population of unsophisticated threat actors."

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14300
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
CVE-2020-14298
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
CVE-2020-15050
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
CVE-2020-10987
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
CVE-2020-10988
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version 15.03.05.19 allows unauthenticated remote attackers to start a telnetd service on the device.