The Evilnum hacking group is showing renewed signs of malicious activity, targeting European organizations that are involved in international migration.
Evilnum is an APT (advanced persistent threat) that has been active since at least 2018 and had its campaign and tools exposed only recently, in 2020.
At that time, ESET published a technical report describing the threat group’s tactics against companies in the financial technology sector, using custom, “homemade” malware.
The latest exposure is thanks to the work of Zscaler’s analysts, who tracked Evilnum’s activity since the beginning of 2022, capturing various artifacts from the attacks.
Campaign details
The targeting and the timing coincided with the Russian invasion of Ukraine, with key migration organizations receiving malicious emails containing macro-laden documents.
The documents used in the campaign carry varying filenames, usually containing the term “compliance.” Zscaler identified at least nine different documents, all mentioned in the IoC section of the report.
The attachment leverage the template injection and VBA code stomping technique to evade detection, leading to the execution of heavily obfuscated JavaScript.
This, in turn, decrypts and drops a malware loader (“SerenadeDACplApp.exe”) and an encrypted binary (“devZUQVD.tmp”), and also creates a scheduled task (“UpdateModel Task”) for persistence.
The loader performs preliminary checks and loads the binary under an extracted file name. The binary injection is done using the old “Heaven’s gate” technique to evade AV detection.
This technique involves invoking 64-bit code in 32-bit processes, and while it has been mitigated in Windows 10, Evilnum still likely uses it to target machines running older OS versions.
The backdoor that is loaded on the compromised system executes to perform the following operations:
- Decrypts the backdoor configuration (C2 domains, User Agent strings, network paths, referrer strings, cookies type strings).
- Resolves API addresses from the libraries retrieved from the configuration
- Performs a mutex check
- Builds data exfiltration string to be sent as part of the beacon request
- Encrypt and encode the generated string with Base64
- Embed the encoded string inside the cookie header field by selecting one of the cookie type strings from the configuration.
Once all steps are finished, the backdoor picks a C2 domain and a path string from the configuration and sends a beacon network request. The C2 may answer with a new encrypted payload.
Additionally, the backdoor captures machine snapshots and sends them to the C2 via POST requests, exfiltrating stolen data in an encrypted form.
This report highlights that Evilnum is still an active threat, so defenders are advised to use the IoCs provided by Zscaler to protect their networks.
While the actor’s origin remains unknown, its most recent victimology indicates a state-level interest in espionage campaigns, which was researchers previously linked to the Belarusian threat group “Ghostwriter.”
Source: www.bleepingcomputer.com