Trend Micro Inc.

08/09/2024 | News release | Distributed by Public on 08/08/2024 21:35

A Dive into Earth Baku’s Latest Campaign

StealthReacher (aka DodgeBox) can be considered as an enhanced variant of StealthVector, featuring code obfuscation techniques such as FNV1-a and other defense evasion mechanisms. Compared to the older StealthVector, it uses AES algorithms for encryption and MD5 hashing for checksum. Based on our observations, StealthReacher is the specified loader to launch the new modular backdoor, SneakCross.

It's noting that both StealthVector and StealthReacher will perform re-encryption after the first initiation via XOR encryption, with the key being the victim's computer name. From a digital forensics' aspect, it is challenging to decrypt and analyze the collected payload even though all the components (loader and payload) were collected at the same time.

SneakCross is a new modular backdoor that uses Google services for its command-and-control (C&C) communication. It employs Windows Fibers to evade detection from network protection products and EDR solutions. We believe it to be the successor to their previous modular backdoor, ScrambleCross, which was mentioned in our previous report. The modular design allows attackers to easily update its capabilities, modify its behavior, and customize functionality for different scenarios.

In Google Cloud's report, they mentioned that they successfully found at least 15 plugins that support various backdoor functions including:

  • Shell Operations
  • File System Operations
  • Process Operations
  • Network Probing
  • Network Store Interface Operations
  • Screen Operations
  • System Information Discovery
  • File Manipulation Operations
  • Keylogger
  • Active Directory Operations
  • File Uploader
  • RDP
  • DNS Operations
  • DNS Cache Operations
  • Registry Operations

Post-Exploitation routine

During the post-exploitation stage, Earth Baku will deploy various tools on the victim's environment for persistence, privilege escalation, discovery and exfiltration. In this section, we 'll examine the most noteworthy of these tools.

Persistence: reverse-tunnel

We found the threat actors attempting to build reverse tunnels with the following tools for persistent control access to compromised machines:

Customized iox tool

The perpetrators built their own iox tunneling tool based on its public source code. Changes include simplified required arguments (local IP/Port) and an additional special argument -ggg. To launch the tool, the user needs to input this special argument, after which the tool works properly.

Rakshasa

Rakshasa is a powerful proxy tool written in Go, designed specifically for multi-level proxying and internal network penetration.

Tailscale

Tailscale is a Virtual Private Network (VPN) service created to enable secure connectivity between devices within a unified virtual network. Recently, we have identified threat actors attempting to incorporate compromised systems into their virtual networks using the Tailscale platform. Additionally, these threat actors have been using legitimate Tailscale servers as intermediaries, significantly complicating the process of tracing the origins of their activities.

Exfiltration

Within the victim's environment, we found many MEGAcmd tools dropped onto infected machines. MEGAcmd is a command-line tool used for interacting with the MEGA cloud storage service. We infer that the threat actors attempted to use this tool for exfiltrating stolen data to MEGA, hoping to capitalize on its ability to efficiently upload large volumes of data. This procedure was also observed with an associated group, Earth Lusca

Footprint destruction

During our investigation, we found that Earth Baku intentionally corrupted their StealthVector loader by wiping out the first 1000 bytes of the file. By doing this, the threat actor can evade security products (as seen with the number of detections in VirusTotal at the time of writing compared to the original variant, which was detected by several security vendors). This is a common approach to make it harder for analysts to analyze the tools used in the ransomware attacks, but it's relatively rare to see in an APT attack. This shows that Earth Baku is both knowledgeable and meticulous with its malicious activities.

Conclusion

Earth Baku has significantly expanded its reach from the Indo-Pacific to Europe and MEA since late 2022. Their recent operations showcase advanced techniques, including the use of public-facing applications like IIS servers for initial access and the deployment of the Godzilla webshell for control. The group has employed new loaders such as StealthVector and StealthReacher, to stealthily launch backdoor components, and added SneakCross as their latest modular backdoor. Earth Baku also used several tools during its post-exploitation including a customized iox tool, Rakshasa, TailScale for persistence, and MEGAcmd for efficient data exfiltration. These developments underscore Earth Baku's evolving and increasingly sophisticated threat profile, which can potentially pose significant challenges for cybersecurity defenses.

Recommendations

To defend against cyberespionage tactics and minimize the risk of compromise, both individual users and organizations implement the following best practices:

  • Implementing the principle of least privilege: Restricting access to sensitive data and closely monitoring user permissions makes it more challenging for attackers to move laterally within a corporate network.
  • Addressing security gaps: Regularly updating systems and applications and enforcing strict patch management policies allows organizations to address security gaps within their system. Furthermore, employing virtual patching can help secure legacy systems for which patches are unavailable.
  • Developing a proactive incident response strategy: Deploying defensive measures designed to identify and mitigate threats in the event of a breach, and conducting regular security drills improves the effectiveness of an organization's incident response plan.
  • Adopting the 3-2-1 backup rule: Maintaining at least three copies of corporate data in two different formats, with one air-gapped copy stored off-site ensures that data remains intact even in the event of a successful attack. Regularly updating and testing these backups helps ensure the integrity of the data.

Trend solutions

Organizations looking to defend themselves from sophisticated attacks can consider powerful security technologies such as Trend Vision One™, which allows security teams to continuously identify attack surfaces, including both known and unknown, plus managed and unmanaged cyber assets.

It assists organizations in prioritizing and addressing potential risks and vulnerabilities by evaluating critical factors, such as the likelihood and impact of possible attacks, providing a comprehensive set of prevention, detection, and response capabilities, all supported by advanced threat research, intelligence, and AI. Vision One enhances an organization's overall security posture and effectiveness, offering robust protection against all types of attacks.

Indicators of Compromise

The indicators of compromise for this entry can be found here.