[CB21] Operation Software Concepts: A Beautiful Envelope for Wrapping Weapon by Rintaro Koike, Shogo Hayashi and Ryuichi Tanabe

CODE BLUE
CODE BLUECODE BLUE
Operation Software Concepts
Beautiful Envelope for Wrapping Weapon
NTT Security (Japan) KK
Rintaro Koike, Shogo Hayashi, Ryuichi Tanabe
© NTT All Rights Reserved
About us
• Rintaro Koike (小池 倫太郎)
• Security analyst at NTT Security Japan (threat research, malware analysis)
• Founder of nao_sec
• Shogo Hayashi (林 匠悟)
• Security analyst at NTT Security Japan (responding to EDR detections, creating custom
signatures)
• Co-founder of SOCYETI
• Ryuichi Tanabe (田邉 龍一)
• Security analyst at NTT Security Japan (responding to EDR detections, malware analysis)
• Speaker of VB2021 localhost, TheSAS2021
© NTT All Rights Reserved
Motivation & Goal
Operation Software Concepts
• Introducing campaign overview
• Targets, characteristics, purpose
• Showing detailed analysis results
• SSV Dropper, SSV Downloader, SSV RAT and WerNis RAT
• Considering relationships and attribution
© NTT All Rights Reserved 4
© NTT All Rights Reserved
2021
1. Attack Overview
2. Malware Analysis
3. Attribution
4. Wrap-Up
Agenda
© NTT All Rights Reserved
Attack Flow
2021
SCR
SSV Dropper
DLL
EXE
Legitimate-A
SSV
Downloader
Malware Server
SSV RAT
Create
&
Execute
Download
Load
EXE
C&C Server-A
EXE
Legitimate-B
Data
WerNis RAT
EXE
Legitimate-C
C&C Server-B
EXE
Loader
Data
Mimikatz
DLL
Decoder
Load
Execute
Download
Inject
Download
Load
Domain
Controller
Zerologon
© NTT All Rights Reserved
Evasion Techniques
Techniques used in Operation Software Concepts
• Valid signature
• SSV Dropper
• DLL Side-Loading
• Symantec Endpoint Protection (RtvStart.exe)
• Microsoft Edge Update (MicrosoftEdgeUpdate.exe)
• Process Injection
• WerNis RAT (dllhost.exe)
• Loader & Encoded Data
• SSV Downloader, WerNis RAT, Mimikatz
2021
© NTT All Rights Reserved
Attack Operation Timeline (2021-04-22)
2021
Time (JST) Object Description
16:32 SSV RAT Executed and accessed to C&C server
16:44 – 16:55 SSV RAT Investigated environment of host
17:09 SSV RAT Downloaded WerNis RAT from C&C server
17:15 WerNis RAT Executed and accessed to C&C server
17:17 – 17:43 WerNis RAT Investigated environment of Active Directory
17:52 Mimikatz Exploited DC by Zerologon
17:47 – 17:56 WerNis RAT Captured Desktop many times
18:08 - Attacker stopped operation
© NTT All Rights Reserved
Malware Analysis
8
© NTT All Rights Reserved
2021
© NTT All Rights Reserved
SSV Dropper
With a valid signature
• SOFTWARE CONCEPTS LIMITED
1. Drop exe + dll files
• C:¥ProgramData¥Apacha
› ssvagent.exe
› MSVCR110.dll
2. Execute ssvagent.exe
2021
SSV Dropper
(Signed)
Legit EXE
SSV Downloader
© NTT All Rights Reserved
SSV Downloader
DLL Side-Loading
• ssvagent.exe
• Legitimate & signed exe file
› Symantec Endpoint Protection (RtvStart.exe)
MSVCR110.dll
• SSV Downloader
• Download encoded SSV RAT
› https[:]//www.flushcdn[.]com/download/image9588.jpg
2021
SSV RAT
Legit EXE
SSV Downloader
www.flushcdn[.]com
© NTT All Rights Reserved
SSV Downloader
MSVCR110.dll
• SSV Downloader
• Decode “image9588.jpg”
› 5bytes XOR
» [0x0e, 0x06, 0x33, 0x11, 0x12]
» This actor prefers to use 5bytes XOR
2021
© NTT All Rights Reserved
SSV RAT
Basic RAT
• File operation
• Download, upload, create, delete, move, copy, search
› Download & execute WerNis RAT
• Process operation
• Create, kill self
• Traffic
• RC4 encoded (Key: 0x1fa8cc16)
2021
SSV RAT
DATA
Legit EXE Decoder
WerNis RAT (Encoded)
api.flushcdn[.]com
api.hostupoeui[.]com
© NTT All Rights Reserved
WerNis RAT
2nd RAT
• Mutex
• WerNisSvc3
• File operation
• Download, upload, delete, move, copy, search
› Download & execute Mimikatz
2021
DATA
Legit EXE Decoder
WerNis RAT (Encoded)
info.hostupoeui[.]com
DATA
Decoder
Mimikatz (Encoded)
© NTT All Rights Reserved
WerNis RAT
2nd RAT
• Process operation
• Create, remote shell
• Information theft
• System/disk information, desktop screen, keylogging
› Encoded (XOR 0x7f) & write to “SetEvent.dll”
• Traffic
• HTTPS communication
2021
© NTT All Rights Reserved
Tools
Mimikatz
• mm.exe
• Decode crack.dll
› 5bytes XOR
» [0x09, 0x12, 0x0e, 0x47, 0x51]
• crack.dll
• Encoded Mimikatz
• Attacker exploited Zerologon
2021
© NTT All Rights Reserved
Attribution
16
© NTT All Rights Reserved
2021
© NTT All Rights Reserved
Activity Timeline
2021
Mar-2019 May-2020 Dec-2020 Jan-2021 Mar-2021 May-2021 Jul-2021
RU
WerNis RAT
+ Lockdown
Loader
+ ShadowPad
SSV Dropper
-> SSV
Downloader
MN
Royal Road RTF
-> SSV Dropper
-> SSV
Downloader
SSV Dropper
(looks like Able
Soft)
-> CobaltStrike
Beacon
Malicious
document files
-> PowerShell
SSV Dropper
-> SSV
Downloader
etc
Tonto exploited
Exchange
Server and
executed
ShadowPad
SSV Dropper
-> SSV
Downloader
Lockdown
Loader
-> ShimRAT
© NTT All Rights Reserved
2021
Past SSV family cases
In March 2019, SSV Dropper and SSV
Downloader were observed in an attack
using Royal Road RTF against Mongolia
In May 2020, SSV Dropper “AbleRepair.exe”
executed CobaltStrike Beacon
SSV Dropper Legit EXE
SSV Downloader
Royal Road RTF
DATA
Legit EXE Decoder
CobaltStrike Beacon
SSV Dropper
(AbleRepair.exe)
© NTT All Rights Reserved
Past SSV family cases
In January 2021, SSV Dropper executed SSV Downloader. This can be related to
an attack case against Mongolia in December 2020.
2021
SSV Dropper
(news.exe)
Legit EXE
SSV Downloader
With Macro
PS1
?
drmtake[.]tk
in December 2020
© NTT All Rights Reserved
Past case using WerNis RAT
In March 2021, a Russian defense company
submitted some files at the same time to
VirusTotal
• WerNis RAT Loader (with huge padding)
• Lockdown Loader (with huge padding)
• ShadowPad
2021
© NTT All Rights Reserved
2021
Lockdown Loader
Characteristics
• A loader for executing encoded malware
• In May 2021, a Lockdown Loader
executing ShimRAT was observed
• Mainly observed in Russia
• Contains huge padding data sometimes
Dropper
DATA
Legit EXE
Lockdown
Loader
Shim RAT
© NTT All Rights Reserved
2021
Overlap with others
APT31 (BRONZE VINEWOOD)
• HanaLoader/RAT and SSV family are
similar
• DLL Side-Loading
• File path and name
• Registry key
• Self Deleting method
• Target organization
• Using Mimikatz
Using TopDNS as name server
• Operation Software Concepts
• Russian incident (in March 2021)
• Recent Mofang activities
© NTT All Rights Reserved
2021
Overlap with others
Vicious Panda
• Same target
• 2020/03
› Royal Road RTF
• 2021/08
› SSV Dropper
https://research.checkpoint.com/2020/vicious-panda-the-covid-campaign/
© NTT All Rights Reserved
2021
APT31
Tonto
Mofang
Secureworks
Report
Recent
Mofang
Activity
Royal Road
Related
Attack
Microsoft
Exchange
Related
Attack
Operation
Software
Concepts
Russian
Incident
SSV RAT
SSV
Downloader
SSV Dropper
WerNis RAT
Lockdown
Loader
ShadowPad
ShimRAT
TopDNS
NameServer
© NTT All Rights Reserved
Wrap-Up
25
© NTT All Rights Reserved
2021
© NTT All Rights Reserved
Wrap-Up
Operation Software Concepts
• Targeting Russian and Mongolian government or defense sector
• Multiple stages
• SSV Dropper drops and executes SSV Downloader
• SSV Downloader downloads SSV RAT to operate remotely
• WerNis RAT and Mimikatz can be additionally downloaded and executed
• SSV family has been in use since March 2019 at least
• Overlapping with various attack groups such as Tonto, APT31 and Mofang
• One of these groups may have attacked or the tools maybe shared between these groups
2021
© NTT All Rights Reserved
Any Questions?
27
2021
© NTT All Rights Reserved
Appendix: IOC
• SSV Dropper
• 2b495829b8b3319f98e22f35d7bd48c4dea1b9bafe80749d628da99fede6d694
• c3bf8fb3dbbce74d3448d7608ea6dd0567f6bcc437693abd1dcab0ab7fb48155
• 5d0872d07c6837dbc3bfa85fd8f79da3d83d7bb7504a6de7305833090b214f2c
• 78cc364e761701455bdc4bce100c2836566e662b87b5c28251c178eba2e9ce7e
• be5431c999094078e617ce27d27a064b44616421bde334e0bc6fe625ce961ced
• 002dc9f6823ad8d3de23bcb5e41bcefd895df573ed3d89e0821243aa9b7bb4a8
• 679955ff2a97ea11a181ae60c775eff78fadd767bc641ca0d1cff86a26df8ac8
• 8276c2c3a9680de856f5d6dc920a63445b430496ad16c0f3f45ccaf0e995b296
• 874b946b674715c580e7b379e9597e48c85c04cca3a2790d943f56600b575d2f
2021
© NTT All Rights Reserved
Appendix: IOC
• SSV Dropper
• 33f136069d7c3a030b2e0738a5ee80d442dee1a202f6937121fa4e92a775fead
• 80de328bd22e08855af9d05532b89087d2605f6c469925f48e1cc774e7375304
• eb1005ae12b883a69e81d0f1c0dd162b5e48ada337c163ffbca5d62473913a73
• 9ad30d25e74c272a7965f52a5c06f7343df9a493d21d16b339cc0dc65be8cc2a
2021
© NTT All Rights Reserved
Appendix: IOC
• SSV Downloader
• cff71b69e36cd552ab2eb9bc605269bb6859ddaff2151d1361b0306b922f8a0f
• c15a475f8324fdfcd959ffc40bcbee655cbdc5ab9cbda0caf59d63700989766f
• 93eb4a701aac14be362389665a36f7f0747f118e3fc2095bb93c0ceff72ae605
• 00cf3b462059908085fef43e65417e0cca1ac0314cad8af7d89fb34c01f75a03
• 4d9c89a590deb5f3cda6001ea46f8fe2a6ada74e75a8ad14f5c1d14c2980dc47
• 71bd4e5847776d6731510220c3fdf16ad7a55088bd43681cdb408cb9fde59b3d
• 7a16da50a63f7a181d07b45ae552c87ee9ffeb78c512405bd9bf6243f920d56c
• 48ca9a8188c6d640f20c93a9a106cedc0f78251e4f6c5ad4eacc0266862c9499
• 9b0557eda035fc5817c2a6ab33859bb824389638afc41f9ba49221b312638b64
2021
© NTT All Rights Reserved
Appendix: IOC
• SSV Downloader
• e724b1ffb3b7aea4c9397a8db348fac3576633faced1c80c739bb439f8b3f8fa
• 354bd3dc0f36663e12ec38e302dcfc7a3e57ee13dced3c8a2ff0257532106d3d
• b65c14519f2de3115051b0b0ad7ec1cd207ac66228c95006abc9a6b660c2c278
• 0b3d5dd39b60eb43298f4ab89f2c339acf4dc8609d2f7ad6fa1649fd36f5da88
• 34524a538828a976a131c1a9f38294fd50faf0bf671b299e5978b063d3532604
• 61f2a08b3d113fcb57693fb4d392e8327e688e2f126c4286b3d00d72b5098e09
• 900b77a3fb472a8c7a7853e16c736a7eee5607a13bff3c904700815039d0ac90
2021
© NTT All Rights Reserved
Appendix: IOC
• SSV RAT
• 3e3a7233b46f59ae480f970a9a405756a576447e10676f59c61381ba2789a7cf
• 2affdebbaa4f0cfa64e5c42e70d78665ef9ccb2c731c5fe07582ccdfdc05b0cc
• 727302e57ca2cc3d514786adf940ce1f6665905664856a89ff6be5eb90b1121c
• 7b68299383c3f896e13a5990febba55c7ae6f615e07705125aa15771cd401f5d
• b993aab918421ad79964d5d719a4988778ab5a09fc4c699a041fd07fc678dcb5
• 070eeb088a46942f50832a3207ab44b843f293f9685344e04744fe4586f9631e
2021
© NTT All Rights Reserved
Appendix: IOC
• WerNis RAT
• 72c4c4d80f5878fe80c7cd2552020ea1c7e2c1d1b5ce7fa6b8a172b050d70aac
• a2c65fd4baa610e4d6c764d5ac2cbbce8b4226ca34ce34a8544a5dd09e056a48
• 54d299f45472f0b5aebf7d5461723a23687f521c0878b4a364a25f92372abab1
• Mimikatz
• 596070358c9cff3358f265cbc4d518c37edb748126dc1b9cdff31943c9608e54
• 2b391473abb5608f666fde872e8c2f126e126034143f39a159c9e13daa056d2c
2021
© NTT All Rights Reserved
Appendix: IOC
• Lockdown Loader
• 5bc1ea08648b5683b506fe2934999b881516f286b421b92cb45ec8ad8aeb7481
• aaf8bb3d65022444cea3b4810a519b3fb2cecd6fa1c2aae8ef4a55a5f6a007ae
• 3b3357f44d2ab14090dd77c1d49be70bfe1f8183cd9f30bfbb1cd845587af4d2
• d4ed5d54f422e7702667e0d7723249e5966b52450adf95e7998358c18d3ca2b2
• 9b0c3478bb2a8f08fca66faaf4a005bf6002266a87e9e6a53690ac4207d2c496
• 905e4e31a499b4982470ed69c756464f3ad5df4e6242fb299ed54d572ffe18f5
• 58cc619c251087e56f761a5c277218785b76138eae357b0f12f955ddf59f5fff
• 25750e8196ba73188a91eba8fb2c767bda7450361acc869fbfc86829ed2888e5
2021
© NTT All Rights Reserved
Appendix: IOC
• ShimRAT
• 4ce6e6da83eb521e8735c178b711449c37d2224414a4f05b394e6f80e936a5b4
• 1098eb0ca4e34ca63ba40dd537d00e858c36e14044a6a592c306877401478ffe
• D158cf4fa1a954d1fd5609f67a764fbab188dc03916400caaa15b4c3500ea291
• ShadowPad
• 83025b94d64e778d9ab800152b239ddc5b19074779d164af89da564367f8aee0
• Malicious document file
• b83b1a3fbec8bf0a54bf03ebd89c82d1da00b3012d135974b0183545a3878621
• a92d4b23c85c59c60227a26a9aac6a38520b2d5b52424db2962257c14198501a
• a3e81e5bbf5beeb9568f0c801b2407e33cf9bcc0c12842d6bd6bc62280add81d
2021
1 of 35

Recommended

CrowdStrike Falconと効果的に楽に付き合っていくために by
CrowdStrike Falconと効果的に楽に付き合っていくためにCrowdStrike Falconと効果的に楽に付き合っていくために
CrowdStrike Falconと効果的に楽に付き合っていくためにEiji Hoshimoto
2.4K views30 slides
LayerXのQAチームで目指したい動き方 (社内資料) by
LayerXのQAチームで目指したい動き方 (社内資料)LayerXのQAチームで目指したい動き方 (社内資料)
LayerXのQAチームで目指したい動き方 (社内資料)mosa siru
5.3K views18 slides
[CB21] The Lazarus Group's Attack Operations Targeting Japan by Shusei Tomona... by
[CB21] The Lazarus Group's Attack Operations Targeting Japan by Shusei Tomona...[CB21] The Lazarus Group's Attack Operations Targeting Japan by Shusei Tomona...
[CB21] The Lazarus Group's Attack Operations Targeting Japan by Shusei Tomona...CODE BLUE
433 views92 slides
KeycloakのDevice Flow、CIBAについて by
KeycloakのDevice Flow、CIBAについてKeycloakのDevice Flow、CIBAについて
KeycloakのDevice Flow、CIBAについてHiroyuki Wada
2.9K views33 slides
What should you shift left by
What should you shift leftWhat should you shift left
What should you shift leftYasuharu Nishi
1.7K views27 slides
node-gypを使ったネイティブモジュールの作成 by
node-gypを使ったネイティブモジュールの作成node-gypを使ったネイティブモジュールの作成
node-gypを使ったネイティブモジュールの作成shigeki_ohtsu
20.8K views24 slides

More Related Content

What's hot

骨抜きアジャイルの骨を生み出す 〜私(スクラムマスター)のXP学習記録〜(XP祭り2023 発表資料) by
骨抜きアジャイルの骨を生み出す 〜私(スクラムマスター)のXP学習記録〜(XP祭り2023 発表資料)骨抜きアジャイルの骨を生み出す 〜私(スクラムマスター)のXP学習記録〜(XP祭り2023 発表資料)
骨抜きアジャイルの骨を生み出す 〜私(スクラムマスター)のXP学習記録〜(XP祭り2023 発表資料)NTT DATA Technology & Innovation
861 views44 slides
Mdk3 tool in kali linux by
Mdk3 tool in kali linuxMdk3 tool in kali linux
Mdk3 tool in kali linuxJahangir Aashiq
959 views13 slides
Reactive Webアプリケーション - そしてSpring 5へ #jjug_ccc #ccc_ef3 by
Reactive Webアプリケーション - そしてSpring 5へ #jjug_ccc #ccc_ef3Reactive Webアプリケーション - そしてSpring 5へ #jjug_ccc #ccc_ef3
Reactive Webアプリケーション - そしてSpring 5へ #jjug_ccc #ccc_ef3Toshiaki Maki
34.9K views168 slides
10+ Deploys Per Day: Dev and Ops Cooperation at Flickr by
10+ Deploys Per Day: Dev and Ops Cooperation at Flickr10+ Deploys Per Day: Dev and Ops Cooperation at Flickr
10+ Deploys Per Day: Dev and Ops Cooperation at FlickrJohn Allspaw
1M views78 slides
[JaSST nano] テストケースを作ってもらうときに気を付けていたことをお話するの by
[JaSST nano] テストケースを作ってもらうときに気を付けていたことをお話するの[JaSST nano] テストケースを作ってもらうときに気を付けていたことをお話するの
[JaSST nano] テストケースを作ってもらうときに気を付けていたことをお話するのKazukiNishizono1
210 views17 slides
20120624 wacate2012 s_イブニングセッション(当日用) by
20120624 wacate2012 s_イブニングセッション(当日用)20120624 wacate2012 s_イブニングセッション(当日用)
20120624 wacate2012 s_イブニングセッション(当日用)Masaki Kase
1.8K views20 slides

What's hot(20)

骨抜きアジャイルの骨を生み出す 〜私(スクラムマスター)のXP学習記録〜(XP祭り2023 発表資料) by NTT DATA Technology & Innovation
骨抜きアジャイルの骨を生み出す 〜私(スクラムマスター)のXP学習記録〜(XP祭り2023 発表資料)骨抜きアジャイルの骨を生み出す 〜私(スクラムマスター)のXP学習記録〜(XP祭り2023 発表資料)
骨抜きアジャイルの骨を生み出す 〜私(スクラムマスター)のXP学習記録〜(XP祭り2023 発表資料)
Reactive Webアプリケーション - そしてSpring 5へ #jjug_ccc #ccc_ef3 by Toshiaki Maki
Reactive Webアプリケーション - そしてSpring 5へ #jjug_ccc #ccc_ef3Reactive Webアプリケーション - そしてSpring 5へ #jjug_ccc #ccc_ef3
Reactive Webアプリケーション - そしてSpring 5へ #jjug_ccc #ccc_ef3
Toshiaki Maki34.9K views
10+ Deploys Per Day: Dev and Ops Cooperation at Flickr by John Allspaw
10+ Deploys Per Day: Dev and Ops Cooperation at Flickr10+ Deploys Per Day: Dev and Ops Cooperation at Flickr
10+ Deploys Per Day: Dev and Ops Cooperation at Flickr
John Allspaw1M views
[JaSST nano] テストケースを作ってもらうときに気を付けていたことをお話するの by KazukiNishizono1
[JaSST nano] テストケースを作ってもらうときに気を付けていたことをお話するの[JaSST nano] テストケースを作ってもらうときに気を付けていたことをお話するの
[JaSST nano] テストケースを作ってもらうときに気を付けていたことをお話するの
KazukiNishizono1210 views
20120624 wacate2012 s_イブニングセッション(当日用) by Masaki Kase
20120624 wacate2012 s_イブニングセッション(当日用)20120624 wacate2012 s_イブニングセッション(当日用)
20120624 wacate2012 s_イブニングセッション(当日用)
Masaki Kase1.8K views
Spring Social でソーシャルログインを実装する by Rakuten Group, Inc.
Spring Social でソーシャルログインを実装するSpring Social でソーシャルログインを実装する
Spring Social でソーシャルログインを実装する
Rakuten Group, Inc.10.8K views
Wiki と Figma で情報連携したら 全員ちょっとだけ幸せになった話 by DigitalCube Co. Ltd.
Wiki と Figma で情報連携したら 全員ちょっとだけ幸せになった話Wiki と Figma で情報連携したら 全員ちょっとだけ幸せになった話
Wiki と Figma で情報連携したら 全員ちょっとだけ幸せになった話
What is quality engineer? Is it something tasty? by Yasuharu Nishi
What is quality engineer? Is it something tasty?What is quality engineer? Is it something tasty?
What is quality engineer? Is it something tasty?
Yasuharu Nishi4K views
Keeping Your Kubernetes Cluster Secure by Gene Gotimer
Keeping Your Kubernetes Cluster SecureKeeping Your Kubernetes Cluster Secure
Keeping Your Kubernetes Cluster Secure
Gene Gotimer95 views
CentOS Linux 8 の EOL と対応策の検討 by Masahito Zembutsu
CentOS Linux 8 の EOL と対応策の検討CentOS Linux 8 の EOL と対応策の検討
CentOS Linux 8 の EOL と対応策の検討
Masahito Zembutsu12.9K views
Apache Archiva を試す by bouzuya
Apache Archiva を試すApache Archiva を試す
Apache Archiva を試す
bouzuya4.2K views
テストプロセス改善モデルの最新動向 by 崇 山﨑
テストプロセス改善モデルの最新動向テストプロセス改善モデルの最新動向
テストプロセス改善モデルの最新動向
崇 山﨑6.7K views
OWASP DefectDojo - Open Source Security Sanity by Matt Tesauro
OWASP DefectDojo - Open Source Security SanityOWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security Sanity
Matt Tesauro2K views

Similar to [CB21] Operation Software Concepts: A Beautiful Envelope for Wrapping Weapon by Rintaro Koike, Shogo Hayashi and Ryuichi Tanabe

Targeted attacks on major industry sectors in south korea 20171201 cha minseo... by
Targeted attacks on major industry sectors in south korea 20171201 cha minseo...Targeted attacks on major industry sectors in south korea 20171201 cha minseo...
Targeted attacks on major industry sectors in south korea 20171201 cha minseo...Minseok(Jacky) Cha
3.8K views64 slides
Deepfence.pdf by
Deepfence.pdfDeepfence.pdf
Deepfence.pdfVishwas N
23 views35 slides
The Emergent Cloud Security Toolchain for CI/CD by
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDJames Wickett
125.7K views96 slides
Mobile security part 1(Android Apps Pentesting)- Romansh yadav by
Mobile security part 1(Android Apps Pentesting)- Romansh yadavMobile security part 1(Android Apps Pentesting)- Romansh yadav
Mobile security part 1(Android Apps Pentesting)- Romansh yadavRomansh Yadav
820 views70 slides
Continuous security: Bringing agility to the secure development lifecycle by
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleRogue Wave Software
709 views31 slides
Securing your Cloud Environment v2 by
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2ShapeBlue
1.3K views37 slides

Similar to [CB21] Operation Software Concepts: A Beautiful Envelope for Wrapping Weapon by Rintaro Koike, Shogo Hayashi and Ryuichi Tanabe(20)

Targeted attacks on major industry sectors in south korea 20171201 cha minseo... by Minseok(Jacky) Cha
Targeted attacks on major industry sectors in south korea 20171201 cha minseo...Targeted attacks on major industry sectors in south korea 20171201 cha minseo...
Targeted attacks on major industry sectors in south korea 20171201 cha minseo...
Minseok(Jacky) Cha3.8K views
Deepfence.pdf by Vishwas N
Deepfence.pdfDeepfence.pdf
Deepfence.pdf
Vishwas N23 views
The Emergent Cloud Security Toolchain for CI/CD by James Wickett
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
James Wickett125.7K views
Mobile security part 1(Android Apps Pentesting)- Romansh yadav by Romansh Yadav
Mobile security part 1(Android Apps Pentesting)- Romansh yadavMobile security part 1(Android Apps Pentesting)- Romansh yadav
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Romansh Yadav820 views
Continuous security: Bringing agility to the secure development lifecycle by Rogue Wave Software
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
Securing your Cloud Environment v2 by ShapeBlue
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
ShapeBlue1.3K views
apidays LIVE Paris - Serverless security: how to protect what you don't see? ... by apidays
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays66 views
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel... by Denim Group
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Denim Group1.8K views
Paul Dix [InfluxData] | InfluxDays Keynote: Future of InfluxDB | InfluxDays N... by InfluxData
Paul Dix [InfluxData] | InfluxDays Keynote: Future of InfluxDB | InfluxDays N...Paul Dix [InfluxData] | InfluxDays Keynote: Future of InfluxDB | InfluxDays N...
Paul Dix [InfluxData] | InfluxDays Keynote: Future of InfluxDB | InfluxDays N...
InfluxData223 views
Software management, the seasonal return of DDoS - This Week in Security.pdf by Lior Rotkovitch
Software management, the seasonal return of DDoS - This Week in Security.pdfSoftware management, the seasonal return of DDoS - This Week in Security.pdf
Software management, the seasonal return of DDoS - This Week in Security.pdf
Lior Rotkovitch10 views
The Unexpected Attack Vector: Software Updaters by Priyanka Aash
The Unexpected Attack Vector: Software UpdatersThe Unexpected Attack Vector: Software Updaters
The Unexpected Attack Vector: Software Updaters
Priyanka Aash394 views
Apache HttpD Web Server - Hardening and other Security Considerations by Andrew Carr
Apache HttpD Web Server - Hardening and other Security ConsiderationsApache HttpD Web Server - Hardening and other Security Considerations
Apache HttpD Web Server - Hardening and other Security Considerations
Andrew Carr889 views
Android Penetration testing - Day 2 by Mohammed Adam
 Android Penetration testing - Day 2 Android Penetration testing - Day 2
Android Penetration testing - Day 2
Mohammed Adam72 views
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】 by Hacks in Taiwan (HITCON)
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
Hacking your Droid (Aditya Gupta) by ClubHack
Hacking your Droid (Aditya Gupta)Hacking your Droid (Aditya Gupta)
Hacking your Droid (Aditya Gupta)
ClubHack4.6K views
The Hacking Games - Operation System Vulnerabilities Meetup 29112022 by lior mazor
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
lior mazor23 views
Collaborative security : Securing open source software by Priyanka Aash
Collaborative security : Securing open source softwareCollaborative security : Securing open source software
Collaborative security : Securing open source software
Priyanka Aash195 views
Tick group @avar2019 20191111 cha minseok_publish by Minseok(Jacky) Cha
Tick group @avar2019 20191111 cha minseok_publishTick group @avar2019 20191111 cha minseok_publish
Tick group @avar2019 20191111 cha minseok_publish
Minseok(Jacky) Cha580 views
Software Supply Chain Attacks (June 2021) by TzahiArabov
Software Supply Chain Attacks (June 2021)Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)
TzahiArabov48 views

More from CODE BLUE

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo... by
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...CODE BLUE
396 views72 slides
[cb22] Tales of 5G hacking by Karsten Nohl by
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
91 views34 slides
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A... by
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...CODE BLUE
107 views132 slides
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter... by
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
14 views13 slides
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之 by
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之CODE BLUE
28 views13 slides
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter... by
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
27 views21 slides

More from CODE BLUE(20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo... by CODE BLUE
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
CODE BLUE396 views
[cb22] Tales of 5G hacking by Karsten Nohl by CODE BLUE
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
CODE BLUE91 views
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A... by CODE BLUE
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
CODE BLUE107 views
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter... by CODE BLUE
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE14 views
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之 by CODE BLUE
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
CODE BLUE28 views
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter... by CODE BLUE
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE27 views
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo by CODE BLUE
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
CODE BLUE14 views
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte... by CODE BLUE
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
CODE BLUE16 views
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman by CODE BLUE
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
CODE BLUE23 views
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter... by CODE BLUE
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE9 views
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫 by CODE BLUE
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
CODE BLUE33 views
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-... by CODE BLUE
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
CODE BLUE37 views
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka by CODE BLUE
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
CODE BLUE34 views
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla... by CODE BLUE
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
CODE BLUE8 views
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti... by CODE BLUE
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
CODE BLUE78 views
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info... by CODE BLUE
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
CODE BLUE50 views
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”... by CODE BLUE
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
CODE BLUE13 views
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也 by CODE BLUE
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
CODE BLUE191 views
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat... by CODE BLUE
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
CODE BLUE78 views
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu... by CODE BLUE
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
CODE BLUE53 views

Recently uploaded

Pdffromtextfile_1.pdf by
Pdffromtextfile_1.pdfPdffromtextfile_1.pdf
Pdffromtextfile_1.pdfTRIEU QUANG NGO
6 views2 slides
SOA PPT ON SEA TURTLES.pptx by
SOA PPT ON SEA TURTLES.pptxSOA PPT ON SEA TURTLES.pptx
SOA PPT ON SEA TURTLES.pptxEuniceOseiYeboah
9 views18 slides
PB CV v0.3 by
PB CV v0.3PB CV v0.3
PB CV v0.3Pedro Borracha
10 views16 slides
Synthetic Biology.pptx by
Synthetic Biology.pptxSynthetic Biology.pptx
Synthetic Biology.pptxShubNoor4
5 views15 slides
Yin Sun - Shell by
Yin Sun - ShellYin Sun - Shell
Yin Sun - ShellDutch Power
82 views17 slides
CitSciOz MOUA Inspiring Change Through Art by
CitSciOz MOUA Inspiring Change Through ArtCitSciOz MOUA Inspiring Change Through Art
CitSciOz MOUA Inspiring Change Through ArtChristian Bartens
43 views16 slides

Recently uploaded(20)

Synthetic Biology.pptx by ShubNoor4
Synthetic Biology.pptxSynthetic Biology.pptx
Synthetic Biology.pptx
ShubNoor45 views
OSMC 2023 | Will ChatGPT Take Over My Job? by Philipp Krenn by NETWAYS
OSMC 2023 | Will ChatGPT Take Over My Job? by Philipp KrennOSMC 2023 | Will ChatGPT Take Over My Job? by Philipp Krenn
OSMC 2023 | Will ChatGPT Take Over My Job? by Philipp Krenn
NETWAYS22 views
OSMC | SNMP Monitoring at scale by Rocco Pezzani & Thomas Gelf by NETWAYS
OSMC | SNMP Monitoring at scale by Rocco Pezzani & Thomas Gelf OSMC | SNMP Monitoring at scale by Rocco Pezzani & Thomas Gelf
OSMC | SNMP Monitoring at scale by Rocco Pezzani & Thomas Gelf
NETWAYS15 views
OSMC 2023 | IGNITE: Metrics, Margins, Mutiny – How to make your SREs (not) ru... by NETWAYS
OSMC 2023 | IGNITE: Metrics, Margins, Mutiny – How to make your SREs (not) ru...OSMC 2023 | IGNITE: Metrics, Margins, Mutiny – How to make your SREs (not) ru...
OSMC 2023 | IGNITE: Metrics, Margins, Mutiny – How to make your SREs (not) ru...
NETWAYS8 views
Managing Github via Terrafom.pdf by micharaeck
Managing Github via Terrafom.pdfManaging Github via Terrafom.pdf
Managing Github via Terrafom.pdf
micharaeck5 views
231121 SP slides - PAS workshop November 2023.pdf by PAS_Team
231121 SP slides - PAS workshop November 2023.pdf231121 SP slides - PAS workshop November 2023.pdf
231121 SP slides - PAS workshop November 2023.pdf
PAS_Team156 views
Christan van Dorst - Hyteps by Dutch Power
Christan van Dorst - HytepsChristan van Dorst - Hyteps
Christan van Dorst - Hyteps
Dutch Power87 views
Post-event report intro session-1.docx by RohitRathi59
Post-event report intro session-1.docxPost-event report intro session-1.docx
Post-event report intro session-1.docx
RohitRathi5912 views
Helko van den Brom - VSL by Dutch Power
Helko van den Brom - VSLHelko van den Brom - VSL
Helko van den Brom - VSL
Dutch Power86 views
Roozbeh Torkzadeh - TU Eindhoven by Dutch Power
Roozbeh Torkzadeh - TU EindhovenRoozbeh Torkzadeh - TU Eindhoven
Roozbeh Torkzadeh - TU Eindhoven
Dutch Power84 views

[CB21] Operation Software Concepts: A Beautiful Envelope for Wrapping Weapon by Rintaro Koike, Shogo Hayashi and Ryuichi Tanabe

  • 1. Operation Software Concepts Beautiful Envelope for Wrapping Weapon NTT Security (Japan) KK Rintaro Koike, Shogo Hayashi, Ryuichi Tanabe
  • 2. © NTT All Rights Reserved About us • Rintaro Koike (小池 倫太郎) • Security analyst at NTT Security Japan (threat research, malware analysis) • Founder of nao_sec • Shogo Hayashi (林 匠悟) • Security analyst at NTT Security Japan (responding to EDR detections, creating custom signatures) • Co-founder of SOCYETI • Ryuichi Tanabe (田邉 龍一) • Security analyst at NTT Security Japan (responding to EDR detections, malware analysis) • Speaker of VB2021 localhost, TheSAS2021
  • 3. © NTT All Rights Reserved Motivation & Goal Operation Software Concepts • Introducing campaign overview • Targets, characteristics, purpose • Showing detailed analysis results • SSV Dropper, SSV Downloader, SSV RAT and WerNis RAT • Considering relationships and attribution
  • 4. © NTT All Rights Reserved 4 © NTT All Rights Reserved 2021 1. Attack Overview 2. Malware Analysis 3. Attribution 4. Wrap-Up Agenda
  • 5. © NTT All Rights Reserved Attack Flow 2021 SCR SSV Dropper DLL EXE Legitimate-A SSV Downloader Malware Server SSV RAT Create & Execute Download Load EXE C&C Server-A EXE Legitimate-B Data WerNis RAT EXE Legitimate-C C&C Server-B EXE Loader Data Mimikatz DLL Decoder Load Execute Download Inject Download Load Domain Controller Zerologon
  • 6. © NTT All Rights Reserved Evasion Techniques Techniques used in Operation Software Concepts • Valid signature • SSV Dropper • DLL Side-Loading • Symantec Endpoint Protection (RtvStart.exe) • Microsoft Edge Update (MicrosoftEdgeUpdate.exe) • Process Injection • WerNis RAT (dllhost.exe) • Loader & Encoded Data • SSV Downloader, WerNis RAT, Mimikatz 2021
  • 7. © NTT All Rights Reserved Attack Operation Timeline (2021-04-22) 2021 Time (JST) Object Description 16:32 SSV RAT Executed and accessed to C&C server 16:44 – 16:55 SSV RAT Investigated environment of host 17:09 SSV RAT Downloaded WerNis RAT from C&C server 17:15 WerNis RAT Executed and accessed to C&C server 17:17 – 17:43 WerNis RAT Investigated environment of Active Directory 17:52 Mimikatz Exploited DC by Zerologon 17:47 – 17:56 WerNis RAT Captured Desktop many times 18:08 - Attacker stopped operation
  • 8. © NTT All Rights Reserved Malware Analysis 8 © NTT All Rights Reserved 2021
  • 9. © NTT All Rights Reserved SSV Dropper With a valid signature • SOFTWARE CONCEPTS LIMITED 1. Drop exe + dll files • C:¥ProgramData¥Apacha › ssvagent.exe › MSVCR110.dll 2. Execute ssvagent.exe 2021 SSV Dropper (Signed) Legit EXE SSV Downloader
  • 10. © NTT All Rights Reserved SSV Downloader DLL Side-Loading • ssvagent.exe • Legitimate & signed exe file › Symantec Endpoint Protection (RtvStart.exe) MSVCR110.dll • SSV Downloader • Download encoded SSV RAT › https[:]//www.flushcdn[.]com/download/image9588.jpg 2021 SSV RAT Legit EXE SSV Downloader www.flushcdn[.]com
  • 11. © NTT All Rights Reserved SSV Downloader MSVCR110.dll • SSV Downloader • Decode “image9588.jpg” › 5bytes XOR » [0x0e, 0x06, 0x33, 0x11, 0x12] » This actor prefers to use 5bytes XOR 2021
  • 12. © NTT All Rights Reserved SSV RAT Basic RAT • File operation • Download, upload, create, delete, move, copy, search › Download & execute WerNis RAT • Process operation • Create, kill self • Traffic • RC4 encoded (Key: 0x1fa8cc16) 2021 SSV RAT DATA Legit EXE Decoder WerNis RAT (Encoded) api.flushcdn[.]com api.hostupoeui[.]com
  • 13. © NTT All Rights Reserved WerNis RAT 2nd RAT • Mutex • WerNisSvc3 • File operation • Download, upload, delete, move, copy, search › Download & execute Mimikatz 2021 DATA Legit EXE Decoder WerNis RAT (Encoded) info.hostupoeui[.]com DATA Decoder Mimikatz (Encoded)
  • 14. © NTT All Rights Reserved WerNis RAT 2nd RAT • Process operation • Create, remote shell • Information theft • System/disk information, desktop screen, keylogging › Encoded (XOR 0x7f) & write to “SetEvent.dll” • Traffic • HTTPS communication 2021
  • 15. © NTT All Rights Reserved Tools Mimikatz • mm.exe • Decode crack.dll › 5bytes XOR » [0x09, 0x12, 0x0e, 0x47, 0x51] • crack.dll • Encoded Mimikatz • Attacker exploited Zerologon 2021
  • 16. © NTT All Rights Reserved Attribution 16 © NTT All Rights Reserved 2021
  • 17. © NTT All Rights Reserved Activity Timeline 2021 Mar-2019 May-2020 Dec-2020 Jan-2021 Mar-2021 May-2021 Jul-2021 RU WerNis RAT + Lockdown Loader + ShadowPad SSV Dropper -> SSV Downloader MN Royal Road RTF -> SSV Dropper -> SSV Downloader SSV Dropper (looks like Able Soft) -> CobaltStrike Beacon Malicious document files -> PowerShell SSV Dropper -> SSV Downloader etc Tonto exploited Exchange Server and executed ShadowPad SSV Dropper -> SSV Downloader Lockdown Loader -> ShimRAT
  • 18. © NTT All Rights Reserved 2021 Past SSV family cases In March 2019, SSV Dropper and SSV Downloader were observed in an attack using Royal Road RTF against Mongolia In May 2020, SSV Dropper “AbleRepair.exe” executed CobaltStrike Beacon SSV Dropper Legit EXE SSV Downloader Royal Road RTF DATA Legit EXE Decoder CobaltStrike Beacon SSV Dropper (AbleRepair.exe)
  • 19. © NTT All Rights Reserved Past SSV family cases In January 2021, SSV Dropper executed SSV Downloader. This can be related to an attack case against Mongolia in December 2020. 2021 SSV Dropper (news.exe) Legit EXE SSV Downloader With Macro PS1 ? drmtake[.]tk in December 2020
  • 20. © NTT All Rights Reserved Past case using WerNis RAT In March 2021, a Russian defense company submitted some files at the same time to VirusTotal • WerNis RAT Loader (with huge padding) • Lockdown Loader (with huge padding) • ShadowPad 2021
  • 21. © NTT All Rights Reserved 2021 Lockdown Loader Characteristics • A loader for executing encoded malware • In May 2021, a Lockdown Loader executing ShimRAT was observed • Mainly observed in Russia • Contains huge padding data sometimes Dropper DATA Legit EXE Lockdown Loader Shim RAT
  • 22. © NTT All Rights Reserved 2021 Overlap with others APT31 (BRONZE VINEWOOD) • HanaLoader/RAT and SSV family are similar • DLL Side-Loading • File path and name • Registry key • Self Deleting method • Target organization • Using Mimikatz Using TopDNS as name server • Operation Software Concepts • Russian incident (in March 2021) • Recent Mofang activities
  • 23. © NTT All Rights Reserved 2021 Overlap with others Vicious Panda • Same target • 2020/03 › Royal Road RTF • 2021/08 › SSV Dropper https://research.checkpoint.com/2020/vicious-panda-the-covid-campaign/
  • 24. © NTT All Rights Reserved 2021 APT31 Tonto Mofang Secureworks Report Recent Mofang Activity Royal Road Related Attack Microsoft Exchange Related Attack Operation Software Concepts Russian Incident SSV RAT SSV Downloader SSV Dropper WerNis RAT Lockdown Loader ShadowPad ShimRAT TopDNS NameServer
  • 25. © NTT All Rights Reserved Wrap-Up 25 © NTT All Rights Reserved 2021
  • 26. © NTT All Rights Reserved Wrap-Up Operation Software Concepts • Targeting Russian and Mongolian government or defense sector • Multiple stages • SSV Dropper drops and executes SSV Downloader • SSV Downloader downloads SSV RAT to operate remotely • WerNis RAT and Mimikatz can be additionally downloaded and executed • SSV family has been in use since March 2019 at least • Overlapping with various attack groups such as Tonto, APT31 and Mofang • One of these groups may have attacked or the tools maybe shared between these groups 2021
  • 27. © NTT All Rights Reserved Any Questions? 27 2021
  • 28. © NTT All Rights Reserved Appendix: IOC • SSV Dropper • 2b495829b8b3319f98e22f35d7bd48c4dea1b9bafe80749d628da99fede6d694 • c3bf8fb3dbbce74d3448d7608ea6dd0567f6bcc437693abd1dcab0ab7fb48155 • 5d0872d07c6837dbc3bfa85fd8f79da3d83d7bb7504a6de7305833090b214f2c • 78cc364e761701455bdc4bce100c2836566e662b87b5c28251c178eba2e9ce7e • be5431c999094078e617ce27d27a064b44616421bde334e0bc6fe625ce961ced • 002dc9f6823ad8d3de23bcb5e41bcefd895df573ed3d89e0821243aa9b7bb4a8 • 679955ff2a97ea11a181ae60c775eff78fadd767bc641ca0d1cff86a26df8ac8 • 8276c2c3a9680de856f5d6dc920a63445b430496ad16c0f3f45ccaf0e995b296 • 874b946b674715c580e7b379e9597e48c85c04cca3a2790d943f56600b575d2f 2021
  • 29. © NTT All Rights Reserved Appendix: IOC • SSV Dropper • 33f136069d7c3a030b2e0738a5ee80d442dee1a202f6937121fa4e92a775fead • 80de328bd22e08855af9d05532b89087d2605f6c469925f48e1cc774e7375304 • eb1005ae12b883a69e81d0f1c0dd162b5e48ada337c163ffbca5d62473913a73 • 9ad30d25e74c272a7965f52a5c06f7343df9a493d21d16b339cc0dc65be8cc2a 2021
  • 30. © NTT All Rights Reserved Appendix: IOC • SSV Downloader • cff71b69e36cd552ab2eb9bc605269bb6859ddaff2151d1361b0306b922f8a0f • c15a475f8324fdfcd959ffc40bcbee655cbdc5ab9cbda0caf59d63700989766f • 93eb4a701aac14be362389665a36f7f0747f118e3fc2095bb93c0ceff72ae605 • 00cf3b462059908085fef43e65417e0cca1ac0314cad8af7d89fb34c01f75a03 • 4d9c89a590deb5f3cda6001ea46f8fe2a6ada74e75a8ad14f5c1d14c2980dc47 • 71bd4e5847776d6731510220c3fdf16ad7a55088bd43681cdb408cb9fde59b3d • 7a16da50a63f7a181d07b45ae552c87ee9ffeb78c512405bd9bf6243f920d56c • 48ca9a8188c6d640f20c93a9a106cedc0f78251e4f6c5ad4eacc0266862c9499 • 9b0557eda035fc5817c2a6ab33859bb824389638afc41f9ba49221b312638b64 2021
  • 31. © NTT All Rights Reserved Appendix: IOC • SSV Downloader • e724b1ffb3b7aea4c9397a8db348fac3576633faced1c80c739bb439f8b3f8fa • 354bd3dc0f36663e12ec38e302dcfc7a3e57ee13dced3c8a2ff0257532106d3d • b65c14519f2de3115051b0b0ad7ec1cd207ac66228c95006abc9a6b660c2c278 • 0b3d5dd39b60eb43298f4ab89f2c339acf4dc8609d2f7ad6fa1649fd36f5da88 • 34524a538828a976a131c1a9f38294fd50faf0bf671b299e5978b063d3532604 • 61f2a08b3d113fcb57693fb4d392e8327e688e2f126c4286b3d00d72b5098e09 • 900b77a3fb472a8c7a7853e16c736a7eee5607a13bff3c904700815039d0ac90 2021
  • 32. © NTT All Rights Reserved Appendix: IOC • SSV RAT • 3e3a7233b46f59ae480f970a9a405756a576447e10676f59c61381ba2789a7cf • 2affdebbaa4f0cfa64e5c42e70d78665ef9ccb2c731c5fe07582ccdfdc05b0cc • 727302e57ca2cc3d514786adf940ce1f6665905664856a89ff6be5eb90b1121c • 7b68299383c3f896e13a5990febba55c7ae6f615e07705125aa15771cd401f5d • b993aab918421ad79964d5d719a4988778ab5a09fc4c699a041fd07fc678dcb5 • 070eeb088a46942f50832a3207ab44b843f293f9685344e04744fe4586f9631e 2021
  • 33. © NTT All Rights Reserved Appendix: IOC • WerNis RAT • 72c4c4d80f5878fe80c7cd2552020ea1c7e2c1d1b5ce7fa6b8a172b050d70aac • a2c65fd4baa610e4d6c764d5ac2cbbce8b4226ca34ce34a8544a5dd09e056a48 • 54d299f45472f0b5aebf7d5461723a23687f521c0878b4a364a25f92372abab1 • Mimikatz • 596070358c9cff3358f265cbc4d518c37edb748126dc1b9cdff31943c9608e54 • 2b391473abb5608f666fde872e8c2f126e126034143f39a159c9e13daa056d2c 2021
  • 34. © NTT All Rights Reserved Appendix: IOC • Lockdown Loader • 5bc1ea08648b5683b506fe2934999b881516f286b421b92cb45ec8ad8aeb7481 • aaf8bb3d65022444cea3b4810a519b3fb2cecd6fa1c2aae8ef4a55a5f6a007ae • 3b3357f44d2ab14090dd77c1d49be70bfe1f8183cd9f30bfbb1cd845587af4d2 • d4ed5d54f422e7702667e0d7723249e5966b52450adf95e7998358c18d3ca2b2 • 9b0c3478bb2a8f08fca66faaf4a005bf6002266a87e9e6a53690ac4207d2c496 • 905e4e31a499b4982470ed69c756464f3ad5df4e6242fb299ed54d572ffe18f5 • 58cc619c251087e56f761a5c277218785b76138eae357b0f12f955ddf59f5fff • 25750e8196ba73188a91eba8fb2c767bda7450361acc869fbfc86829ed2888e5 2021
  • 35. © NTT All Rights Reserved Appendix: IOC • ShimRAT • 4ce6e6da83eb521e8735c178b711449c37d2224414a4f05b394e6f80e936a5b4 • 1098eb0ca4e34ca63ba40dd537d00e858c36e14044a6a592c306877401478ffe • D158cf4fa1a954d1fd5609f67a764fbab188dc03916400caaa15b4c3500ea291 • ShadowPad • 83025b94d64e778d9ab800152b239ddc5b19074779d164af89da564367f8aee0 • Malicious document file • b83b1a3fbec8bf0a54bf03ebd89c82d1da00b3012d135974b0183545a3878621 • a92d4b23c85c59c60227a26a9aac6a38520b2d5b52424db2962257c14198501a • a3e81e5bbf5beeb9568f0c801b2407e33cf9bcc0c12842d6bd6bc62280add81d 2021