Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

1/2/2020
09:25 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Fortinet Finds Loader Uses Updated Version of Backdoor

Security firm Fortinet has found traces of how the financially motivated FIN7 group manages to keep on delivering the Carbanak backdoor malware.

When malware has been around for a while, its authors are faced with the need for its maintenance if they want it to continue to succeed in their criminal activity.

Security firm Fortinet has found traces of how the financially motivated FIN7 group does this kind of maintenance on delivering the Carbanak backdoor malware.

FireEye has already looked at one way that FIN7 does this with its BOOSTWRITE loader tool. Fortinet found that the predecessor BIOLOAD tool is a loader as well, but with a different and singular payload. BIOLOAD is not as easily detected as BOOSTWRITE but has the same end effect.

The malware subverts the normal way that Windows will load a Dynamic Linked Library (DLL), by a technique known as DLL search order hijacking (or binary planting). In this case, the attackers use FaceFodUninstaller.exe. This exists on a clean OS installation starting from Windows 10 RS4 (1803) at the "%WINDR%\System32\WinBioPlugIns" folder. The executable is also dependent on winbio.dll, which is usually found in the parent directory ("%WINDR%\System32").

The uninstaller program is started by a built-in scheduled task named FODCleanupTask, which minimizes the attacker's footprint on the machine and therefore reduces the chances of detection even further.\r\nBIOLOAD has the encrypted payload DLL embedded in it. Unlike BOOSTWRITE, it does not support multiple payloads. Decrypting the payload is done by a simple XOR decryption. This is a key point, because it implies that BIOLOAD is tailor-made for every machine it infects. It will use the machine name to derive the decryption key. This means that it does not need to access a remote server in order to fetch the key.

The attacker places the resultant malicious WinBio.dll in the "\System32\WinBioPlugIns" folder, which is home of the legitimate DLL "winbio".

Fortinet says that, "The samples [that they found] target a 64-bit OS and were compiled in March and July of 2019. BOOSTWRITE targets 32-bit machines and was compiled (and signed) in May 2019."

Fortinet also found that BIOLOAD contained newer builds of the Carbanak backdoor than BOOSTWRITE. They were dated January and April of 2019, according to their timestamps. This version checks to see if another Anti-Virus (AV) is running on the machine, besides Kaspersky, AVG and TrendMicro. The result, however, has no effect on the operations of the backdoor.

BIOLOAD has the characteristic of being the first public case of FaceFodUninstaller.exe being abused as host process by a threat actor.

Also, BIOLOAD shows that the attackers are specifically building infections for each targeted machine as well as somehow obtaining the needed administrative permissions to deploy it. This implies that the group needs to gather other critical information about its targets' networks in order to carry out the attack.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Attacker Dwell Time: Ransomware's Most Important Metric
Ricardo Villadiego, Founder and CEO of Lumu,  9/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20902
PUBLISHED: 2020-10-01
Upgrading Crowd via XML Data Transfer can reactivate a disabled user from OpenLDAP. The affected versions are from before version 3.4.6 and from 3.5.0 before 3.5.1.
CVE-2019-20903
PUBLISHED: 2020-10-01
The hyperlinks functionality in atlaskit/editor-core in before version 113.1.5 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in link targets.
CVE-2020-25288
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitra...
CVE-2020-25781
PUBLISHED: 2020-09-30
An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.
CVE-2020-25830
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php.