{"id":1486,"date":"2022-03-24T17:25:51","date_gmt":"2022-03-24T16:25:51","guid":{"rendered":"https:\/\/lab52.io\/blog\/?p=1486"},"modified":"2022-03-24T17:31:37","modified_gmt":"2022-03-24T16:31:37","slug":"another-cyber-espionage-campaign-in-the-russia-ukrainian-ongoing-cyber-attacks","status":"publish","type":"post","link":"https:\/\/lab52.io\/blog\/another-cyber-espionage-campaign-in-the-russia-ukrainian-ongoing-cyber-attacks\/","title":{"rendered":"Another cyber espionage campaign in the Russia-Ukrainian ongoing cyber attacks"},"content":{"rendered":"\n<p>From lab52, in connection to the latest events related to the Russia\u2019s ongoing cyberattacks in Ukraine, beyond destructive artifacts seen like Wipers and others, a new wave of malicious office documents (hereinafter maldocs) has been observed attempting to compromise systems leveraging a variant of well-know and open-source malware known as Quasar RAT.<\/p>\n\n\n\n<p>Recently, we identified a maldoc named \u201cUkraine Conflict Update 16_0.doc\u201d with a creation time 2022-03-16 and whose content appears to be retrieved directly from the <a href=\"http:\/\/www.understandingwar.org\">Institute for the Study of War<\/a> website. Due to the creation time, the maldoc was generated with the latest information updated since the most recent information published by this website is from March 23 (considering it at this point in time).<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"886\" height=\"690\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image.png\" alt=\"\" class=\"wp-image-1488\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image.png 886w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-300x234.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-768x598.png 768w\" sizes=\"(max-width: 886px) 100vw, 886px\" \/><\/figure><\/div>\n\n\n\n<p>The latest content of the Institute for the Study of War website, aligned with the current time we are writing this post (2022-03-24), is shown below:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"994\" height=\"716\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-1.png\" alt=\"\" class=\"wp-image-1491\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-1.png 994w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-1-300x216.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-1-768x553.png 768w\" sizes=\"(max-width: 994px) 100vw, 994px\" \/><\/figure><\/div>\n\n\n\n<p>Back to the maldoc analysis, it contains a VBA function that trigger the execution of a base64 encoded Windows PowerShell command:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"522\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-2-1024x522.png\" alt=\"\" class=\"wp-image-1493\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-2-1024x522.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-2-300x153.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-2-768x392.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-2.png 1153w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Applying de-obfuscating techniques, we finally rebuilt the PowerShell command and we found a HTTP GET request from a list of command-and-control servers with the main purpose of obtaining a Windows PE file from the C2 and execute it as a new process of Powershell.exe (PE file obtained from the C2 will be saved into the %TEMP% path and will be renamed as sarewfdsdfh.exe).<\/p>\n\n\n\n<p>Take a look at the highlighted domains, they will be commented later on.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1777\" height=\"522\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-3.png\" alt=\"\" class=\"wp-image-1495\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-3.png 1777w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-3-300x88.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-3-1024x301.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-3-768x226.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-3-1536x451.png 1536w\" sizes=\"(max-width: 1777px) 100vw, 1777px\" \/><\/figure>\n\n\n\n<p>Related to the C2 domains inside this sample, we have found an interesting list of other samples, with the same subject matter that seems to be part of an ongoing campaing. One of them was a ZIP format compressed file (\u201cUkraine Conflict Update 16_0.zip\u201d) containing both a \u201c.xlsm\u201d and a \u201c.docm\u201d MS Office documents with same naming. From what we can assume the initial attack vector goes through a spear phishing email.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"76\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-4-1024x76.png\" alt=\"\" class=\"wp-image-1498\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-4-1024x76.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-4-300x22.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-4-768x57.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-4.png 1038w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"501\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-5-1024x501.png\" alt=\"\" class=\"wp-image-1499\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-5-1024x501.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-5-300x147.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-5-768x376.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-5.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Both files have obfuscated VBA macros, which are responsible for building a script to deploy the infection chain without containing any encoded PowerShell command.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"476\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/1-1-1024x476.png\" alt=\"\" class=\"wp-image-1502\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/1-1-1024x476.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/1-1-300x139.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/1-1-768x357.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/1-1.png 1439w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Rebuilding the scripts by deobfuscating the VBA marcos has made it possible to trace what malicious actions are taken to infect the victim machine. As we can see below, both documents perform all the same actions, sending a HTTP GET request to the C2 asking for a PE file named b29.exe.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1276\" height=\"439\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-6.png\" alt=\"\" class=\"wp-image-1503\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-6.png 1276w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-6-300x103.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-6-1024x352.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-6-768x264.png 768w\" sizes=\"(max-width: 1276px) 100vw, 1276px\" \/><\/figure><\/div>\n\n\n\n<p>Afterwards, if the HTTP response from the command and control server (C2) was succeeded (response code = 200), the Windows PE file will be stored into the %TEMP% directory and later executed by the WINWORD.EXE process.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1311\" height=\"591\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-8.png\" alt=\"\" class=\"wp-image-1505\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-8.png 1311w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-8-300x135.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-8-1024x462.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-8-768x346.png 768w\" sizes=\"(max-width: 1311px) 100vw, 1311px\" \/><\/figure><\/div>\n\n\n\n<p>Regarding network communication, the C2 is hosted on b29[.]bet, which resolves to an IP address (104.18.24[.]213) that belongs to Cloudflare.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"886\" height=\"410\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-9.png\" alt=\"\" class=\"wp-image-1506\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-9.png 886w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-9-300x139.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-9-768x355.png 768w\" sizes=\"(max-width: 886px) 100vw, 886px\" \/><\/figure><\/div>\n\n\n\n<p>With the next domain registrant information:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"730\" height=\"288\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-10.png\" alt=\"\" class=\"wp-image-1507\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-10.png 730w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-10-300x118.png 300w\" sizes=\"(max-width: 730px) 100vw, 730px\" \/><\/figure><\/div>\n\n\n\n<p>Setting our sights on the recent &amp; related artifacts downloaded from the C2, we identified, through the uri hxxp:\/\/b29[.]bet\/SoftwareUpdate.exe, another related maldoc with an interesting topic:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"886\" height=\"344\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-11.png\" alt=\"\" class=\"wp-image-1508\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-11.png 886w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-11-300x116.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-11-768x298.png 768w\" sizes=\"(max-width: 886px) 100vw, 886px\" \/><\/figure><\/div>\n\n\n\n<p>From the aforementioned URI we found a new malicious document contacting to the same C2. This maldoc is named \u201cLeaked_Kremlin_emails_show_Minsk_protoco.doc\u201d and its content is shown below:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"886\" height=\"869\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-12.png\" alt=\"\" class=\"wp-image-1511\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-12.png 886w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-12-300x294.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-12-768x753.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-12-75x75.png 75w\" sizes=\"(max-width: 886px) 100vw, 886px\" \/><\/figure><\/div>\n\n\n\n<p>Analyzing the information contained in the maldoc we found that it was a copy of a new published in the Euromaidan Press, Ukraine Internet-based newspaper. The report from the official source Euromaidan Press can be read <a href=\"https:\/\/euromaidanpress.com\/2019\/10\/25\/leaked-kremlin-emails-show-minsk-protocol-designed-as-path-to-ukraines-capitulation-euromaidan-press-report\/\">here<\/a> . The analysis has revealed some similarities in the infection chain, due to the fact that it is formed by malicious VBA macros and as described below, it uses the same C2 domain and it also uses an encoded PowerShell command.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"886\" height=\"446\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-13.png\" alt=\"\" class=\"wp-image-1512\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-13.png 886w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-13-300x151.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-13-768x387.png 768w\" sizes=\"(max-width: 886px) 100vw, 886px\" \/><\/figure><\/div>\n\n\n\n<p>The maldoc, mainly, uses a base64 encoded Windows PowerShell command (as we saw in the first maldoc analyzed) to perform the download from the C2 and then execute it through a WScript object.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"886\" height=\"402\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-14.png\" alt=\"\" class=\"wp-image-1513\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-14.png 886w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-14-300x136.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-14-768x348.png 768w\" sizes=\"(max-width: 886px) 100vw, 886px\" \/><\/figure><\/div>\n\n\n\n<p>Network communications through the PowerShell command are made with the HTTP protocol, sending a HTTP GET request without using HTTP headers such as User-Agent nor Accept as seen in the previously maldocs. Furthermore, we saw the maldoc contacts with a C2 which domain is contained in the domain list extracted from the first maldoc.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"161\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-15.png\" alt=\"\" class=\"wp-image-1514\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-15.png 750w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-15-300x64.png 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/figure><\/div>\n\n\n\n<p>We also saw it on the online malware sandbox ANYRUN with the same network behavior.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"886\" height=\"619\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-16.png\" alt=\"\" class=\"wp-image-1515\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-16.png 886w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-16-300x210.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-16-768x537.png 768w\" sizes=\"(max-width: 886px) 100vw, 886px\" \/><\/figure><\/div>\n\n\n\n<p>What\u2019s more, this maldoc contacts with the same domain list we found in the first maldoc requesting a Windows PE file named SoftwareUpdate.exe.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"269\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-17-1024x269.png\" alt=\"\" class=\"wp-image-1516\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-17-1024x269.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-17-300x79.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-17-768x202.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-17-1536x404.png 1536w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-17.png 1833w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>So far, we have seen that the most demanded Windows PE file by every maldoc analyzed was SoftwareUpdate.exe and depending on the requesting moment it could be distributed by the C2 or not. After getting this Windows PE file from the C2 and starting to analyze it, based on a simple static analysis we could quickly conclude it was a variant of well-know and open-source malware known as Quasar RAT developed in .NET framework.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"684\" height=\"496\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-18.png\" alt=\"\" class=\"wp-image-1517\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-18.png 684w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-18-300x218.png 300w\" sizes=\"(max-width: 684px) 100vw, 684px\" \/><\/figure><\/div>\n\n\n\n<p>Quasar RAT is a software distributed under the MIT (Massachusetts Institute of Technology) licensed and freely available on <a href=\"https:\/\/github.com\/quasar\/Quasar\">GitHub<\/a>, as you can see here: &nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"835\" height=\"630\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-19.png\" alt=\"\" class=\"wp-image-1518\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-19.png 835w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-19-300x226.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-19-768x579.png 768w\" sizes=\"(max-width: 835px) 100vw, 835px\" \/><\/figure><\/div>\n\n\n\n<p>Subsequently, with a behavior-based approach debugging the sample, we realized this sample checks the current path on which it is executed and copy itself in a new directory named \u201cPDF Reader\u201d into the %PROGRAMFILES% directory. Then, the next step is hiding itself from disk setting its file attributes as hidden. For this purpose, the sample modifies its own enumerate property FileAttributes setting it to Hidden (Application.ExecutablePath -&gt; FileAttributes.Hidden). <\/p>\n\n\n\n<p>Then, with a ready environment, Quasar tries to contact with the C2 notifying a new computer compromised successfully. It was here, at this point of analysis, where we found the same domain list that it had been identified previously through the maldocs analyzed. This C2 domain list is stored in a dynamic object variable named hostsManager, specifically into the attribute queue_0 and each value store every domain, IP address and port associated to contact with the C2. Note that Quasar RAT communicates with the C2 using the same TCP port 4782 and every communication will be encrypted through HTTPS except only one relative to the domain b29[.]bet.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"920\" height=\"826\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-20.png\" alt=\"\" class=\"wp-image-1519\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-20.png 920w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-20-300x269.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-20-768x690.png 768w\" sizes=\"(max-width: 920px) 100vw, 920px\" \/><\/figure><\/div>\n\n\n\n<p>Finally, we found its SSL certificate, identifying the subject as a Quasar Server CA with an expiration date 31\/12\/9999 and it appears that it have been generated since March 04, 2022.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"312\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-21-1024x312.png\" alt=\"\" class=\"wp-image-1520\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-21-1024x312.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-21-300x91.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-21-768x234.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/image-21.png 1240w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>On the whole, beyond destructive artifacts seen into the Russia\u2019s ongoing cyberattacks in Ukraine, it seems there is a place for cyberespionage campaigns which are taking advantage of the information published relative to the Russia\u2019s ongoing cyberwar events. However, we do not have enough evidence to make any kind of attribution up to now.<\/p>\n\n\n\n<p><strong>INDICATORS OF COMPROMISE:<\/strong><\/p>\n\n\n\n<p>MALDOCS:<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\"><table><tbody><tr><td><strong>FILENAME<\/strong><\/td><td><strong>SHA1<\/strong><\/td><\/tr><tr><td>Ukraine Conflict Update 16_0.doc<\/td><td>6e7775277b18a481ca4ce24d5e13fd38ab1b5991<\/td><\/tr><tr><td>Ukraine Conflict Update 16_0.docm<\/td><td>079037f3abff65ce012af1c611f8135726ef0ad2<\/td><\/tr><tr><td>Ukraine Conflict Update 16_0.xlsm<\/td><td>35c6d3b40ba88f5da444083632c8e414a67db267<\/td><\/tr><tr><td>Ukraine Conflict Update 16_0.zip<\/td><td>296f26fb9b09a50f13bdf6389c05f88019bac13f<\/td><\/tr><tr><td>Leaked_Kremlin_emails_show_Minsk_protoco.doc<\/td><td>4476657d32a55ca0d89d21d2a828a8d8cbc5dbab<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>QUASAR RAT:<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\"><table><tbody><tr><td><strong>FILENAME<\/strong><\/td><td><strong>SHA1<\/strong><\/td><\/tr><tr><td>The increasingly complicated<br>Russia-Ukraine crisis<br>explained.zip<\/td><td>34dfdf16d13f974a06f46486ab4ad7034db8e9d5<\/td><\/tr><tr><td>The increasingly complicated<br>Russia-Ukraine crisis<br>explained.exe.pdf<\/td><td>bbb9bf63efc448706f974050bef23bb1edd13782<\/td><\/tr><tr><td>SoftwareUpdate.exe<\/td><td>bbb9bf63efc448706f974050bef23bb1edd13782<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>NETWORK:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Domain<\/strong> <strong>list<\/strong><\/td><\/tr><tr><td>taisunwin.]club<\/td><\/tr><tr><td>web.sunwinvn.]vip<\/td><\/tr><tr><td>sunvn.]vin<\/td><\/tr><tr><td>b29.]bet<\/td><\/tr><tr><td>play.go88vn.]vin<\/td><\/tr><tr><td>playgo88.]fun<\/td><\/tr><tr><td>choigo88.]us<\/td><\/tr><tr><td>go88c.]net<\/td><\/tr><tr><td>go88.]gold<\/td><\/tr><tr><td>go88vn.]vin<\/td><\/tr><tr><td>play.go88vn.]vin<\/td><\/tr><tr><td>go88code.]com<\/td><\/tr><tr><td>thesieutoc.]net<\/td><\/tr><tr><td>sun.]fun<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Customers with Lab52\u2019s APT intelligence private feed service already have more tools and means of detection for this campaign.<br>In case of having threat hunting service or being client of S2Grupo CERT, this intelligence has already been applied.<\/p>\n\n\n\n<p>If you need more information about Lab52\u2019s private APT intelligence feed service, you can contact us through the<a href=\"https:\/\/lab52.io\/contact\"> following link<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>From lab52, in connection to the latest events related to the Russia\u2019s ongoing cyberattacks in Ukraine, beyond destructive artifacts seen like Wipers and others, a new wave of malicious office documents (hereinafter maldocs) has been observed attempting to compromise systems leveraging a variant of well-know and open-source malware known as Quasar RAT. Recently, we identified [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":1540,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[21,3,18,16,1],"tags":[6,45,47,48,8,46],"class_list":{"0":"post-1486","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apt","8":"category-apts","9":"category-cyberattack","10":"category-ttp","11":"category-uncategorised","12":"tag-cyberthreat","13":"tag-cyberwar","14":"tag-maldocs","15":"tag-quasarrat","16":"tag-russia","17":"tag-ukraine","18":"entry"},"featured_image_src":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/portada_post4-600x400.png","featured_image_src_square":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/03\/portada_post4-600x506.png","author_info":{"display_name":"Dex","author_link":"https:\/\/lab52.io\/blog\/author\/dex\/"},"_links":{"self":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/1486"}],"collection":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/comments?post=1486"}],"version-history":[{"count":23,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/1486\/revisions"}],"predecessor-version":[{"id":1537,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/1486\/revisions\/1537"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media\/1540"}],"wp:attachment":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media?parent=1486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/categories?post=1486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/tags?post=1486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}