Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT/Embedded Security //

Command and Control

End of Bibblio RCM includes -->
6/20/2018
08:05 AM
Larry Loeb
Larry Loeb
Larry Loeb

Betabot Trojan Reborn in New Sophisticated Form

As far as malware goes, the Betabot Trojan has gone through several different incarnations. However, its latest form might be the most sophisticated and laying the groundwork for an even larger attack.

In malware, everything old becomes new again. An exploit may work for a time and then be mitigated, but that doesn't stop threat actors from later trying it again in a different form.

So it is with the Betabot Trojan. It was first a banking Trojan that evolved into a password stealer. Mutations along the way turned it into botnet capable of distributing malicious programs.

However, it has now changed again, security researcher Wojciech notes in an recent article.

What it has done in this latest phase is try and exploit CVE-2017–11882, a decades-old vulnerability in Window's Equation Editor that was patched in November 2017. The idea is that Betabot embeds an Object Linking and Embedding (OLE) object into a specially crafted RTF file that is attached to a Word document in order to execute commands on the victim's system.

(Source: Flickr)
(Source: Flickr)

The embedded objects (inteldriverupd1.sct, task.bat, decoy.doc, exe.exe, and 2nd.bat) all look legitimate to the victim, which helps the social engineering part of the attack. Wojciech writes that inteldriverupd1.sct allows the attacker to take advantage of the Windows Script Component. It then is able to create a new object, which will go and run the task.bat script.

Task.bat will check for presence of a "block.txt" file in the temp directory. If the file does not exist, the script will create it. At the end of the script, it starts "2nd.bat" and then deletes itself.

The last of the preliminary stages is executing the 2nd.bat script. It first starts the main exe file and then kills the Word process (winword.exe). After that, Wojciech found that it deletes the Resiliency directory from registry -- for every version -- to hide its own tracks and prevent recovery of the document.

Now, it starts to execute what it really wants. First, a connection is made to "hxxp://goog[.]com/newbuild/t.php?stats=send&thread=0", where it gets "exe.exe".

Exe.exe has multiple layers of obfuscation in it, including embedded images that are "noisy," which it then uses for the data to construct its true executable.

It also does function checks for processes (vmacthlp, vmtools, vboxservice). Should one of them be running, it will terminate.


Now entering its fifth year, the 2020 Vision Executive Summit is an exclusive meeting of global CSP executives focused on navigating the disruptive forces at work in telecom today. Join us in Lisbon on December 4-6 to meet with fellow experts as we define the future of next-gen communications and how to make it profitable.

After the new Betabot variant has been constructed from all this multistage effort, the real fun starts.

After the initial web connection is made, the malware goes through a few redirects (hxxp://sharesale[.]com for one) and ends up at hxxp://shirtbattle[.]com. It seems that the main C&C is at hxxp://onedriveservice[.]com, however.

Betabot is then let loose to burn and pillage the villagers.

The newest exploit bears watching because of all the care that goes into getting it launched and running. Hiding its tracks and its methods suggests that another payload besides Betabot could be downloaded from the C&C server if the threat actor desired.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4146
PUBLISHED: 2022-06-30
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-3414. Reason: This candidate is a duplicate of CVE-2012-3414. Notes: All CVE users should reference CVE-2012-3414 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental u...
CVE-2013-4170
PUBLISHED: 2022-06-30
In general, Ember.js escapes or strips any user-supplied content before inserting it in strings that will be sent to innerHTML. However, the `tagName` property of an `Ember.View` was inserted into such a string without being sanitized. This means that if an application assigns a view's `tagName` to ...
CVE-2021-41506
PUBLISHED: 2022-06-30
Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, HI3518_50H10L_S39 V4.02.R11.7601.Nat.Onvif.20170420, V4.02.R11.Nat.Onvif.20160422, V4.02.R11.7601.Nat.Onvif.20170424, V4.02.R11.Nat.Onvif.20170327, V4.02.R11.Nat.Onvif.20161205, V4.02.R...
CVE-2022-1852
PUBLISHED: 2022-06-30
A NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.
CVE-2022-2078
PUBLISHED: 2022-06-30
A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.