Micropsia Malware

64
331

Since June 2018, the Radware Threat Research team has monitored an ongoing APT against the Palestinian authority, featuring an updated version of the Micropsia malware with an advanced surveillance toolkit. This advanced persistent threat began in March 2017 and was reported by Cisco Talos and Check Point Software Technologies, infecting hundreds of machines thus far.

The latest Micropsia malware version analyzed in Radware’s research lab is the most sophisticated tool used by this APT group. It includes advanced surveillance features such as microphone recording, keylogging and document stealing from USB flash drives. It also resembles the old versions’ C2 communication behavior by including references to famous TV shows and characters. While the campaign and victims were selectively targeted, some instances contaminated machines in other countries as well (see below).

Infection Process

Attackers gathered intelligence and used social engineering to select their victims. They have sent spear phishing emails to email addresses of selected personas. The email contains an attached file that looked like a report from a known news agency with a malicious executable downloaded and activated in the background.

Malware Capabilities

Micropsia comes with an impressive arsenal of advanced surveillance features, allowing it to closely track the victim’s activity and control the victim’s operating system. Currently, the following capabilities exist in the analyzed binary:

  • Microphone recording
  • Document stealing from connected USB flash drives
  • Screen capturing
  • Keylogging
  • Document stealing from hard drive
  • Scanning all drives – full directory listing without filters
  • Get files by specific path
  • Download and execute an arbitrary executable
  • Update malware executable

Microphone Recording

The microphone recording capability is considered an advanced surveillance feature, which is a rare occurrence among widespread malware. That said, it might become common when initiating an APT attack. While the malware’s screen capturing and keylogging capabilities are set to ‘on’ by default, the recording feature requires an activation command from the C&C at intervals defined by the operator. Once activated, Micropsia begins recording using Win32 MCI (Media Control Interface), which provides a generic interface to nearly every kind of multimedia device.

Initiating a new recording or stopping a running one is accomplished by calling Winmm.mciSendString API. That controls the multimedia device. Micropsia operators control the recording duration via Delphi timers that allow it to perform a periodic recording. A new recording is initiated by executing the above API using the following string commands.

In the same way, stopping the recording and saving it to a file is achieved by executing the following.

USB Flash Drives for Document Stealing

Controlled by Micropsia operators, the malware is able to register to an event of USB volume insertion to detect new connected USB flash drives. This functionality is detailed in an old blog post. Once an event is triggered, Micropsia executes an RAR tool to recursively archive files based on a predefined list of file extensions (*.xls, *.xlsx, *.csv, *.odt, *.doc, *.docx, *.ppt, *.pptx, *.pdf, *.mdb, *.accdb, *.accde, *.txt).

[You might also like: Stresspaint Malware Campaign Targeting Facebook Credentials]

Screen Capturing and Keylogging

Upon execution, the Micropsia malware takes screenshots every 90 seconds by calling to Gdi32.BitBlt API. This functionality is implemented by a Delphi timer which runs infinitely. Screenshots are saved as unencrypted files in JPEG format with a specific file name that contains the current timestamp (yyyy-mm-dd hh-nn-ss) with the hardcoded extension .his.

The screen capturing function contains incriminating strings which lead us to assume that this code was copied from a snippet published in delphimaster.ru forum. The keylogging module also starts automatically by recording every keystroke using the user32.GetKeyState API. It also deals with clipboard data when malware detects a key press combination of Ctrl+C. This module writes its output to a log file that also contains the current timestamp (yyyy-mm-dd hh-nn-ss) with the extension .slog.

Scan Drive and Fetch Files

Micropsia is able to perform a recursive directory listing on-demand for all volume drives available on the victim’s machine. It checks whether a volume drive exists by simply iterating all possible letters (from A to Z) and testing whether this directory exists. Malware operators are also able to fetch specific files from victim file system by their path.

Storage Management

Most of the malware capabilities mentioned above have outputs written to the file system which are later uploaded to the C2 server. Each module writes its own output in a different format, but surprisingly in a non-compressed and non-encrypted fashion. Micropsia’s developers decided to solve these issues by implementing an archiver component that executes the WinRAR tool. The malware first looks for an already installed WinRAR tool on the victim’s machine, searching in specific locations.

In the event a WinRAR tool is not found, Micropsia drops the RAR tool found in its Windows Portable Executable (PE) resource section to the file system.

Later, implemented as an infinite Delphi-based timer, every 15 minutes it creates RAR archives for each output type using the following command line:

RAR archives are encrypted using a hardcoded password (-hp switch) calculated during the malware initialization stage which is the result of MD5 on a hardcoded string (‘q5e9lqp’) which may be different in each malware campaign. In addition, the program uses a -df command line switch that deletes files after they are moved to the archive. Later, RAR archives are uploaded to the C2 server and afterwards they are deleted from the disk.

Next, the malware creates a new hidden directory with a hardcoded name “Recovery” under the Common AppData shell folder (C:\ProgramData\Recovery in Windows Vista and above). This directory is used to store all components’ outputs in a dedicated sub folder for each.

[You might also like: The Mikrotik RouterOS-Based Botnet]

C2 Communication
Malware C2 servers are stored hardcoded in binary and cannot be changed by operators dynamically, unless the malware’s executable binary is updated. In our binary, there are three hardcoded HTTPS URLs used for C2 communication. These C2 servers’ addresses were not seen in previous versions.

  • https//max-mayfield.com/api/white_walkers/
  • https//young-spencer.com/api/white_walkers/
  • https//192.169.6.59/api/white_walkers/

Besides encryption supplied by SSL, the hackers did not add an extra layer of encryption. Modern malware tends to encrypt its data to evade detection and make the binary research harder. Thus, communication can be monitored easily in a research environment using SSL termination proxy. Malware sets the User Agent string (hard-coded) for all of its communication to mimic Googlebot.

Bot Registration

As mentioned by the Cisco Talos Intelligence Group, after executing the Micropsia registers itself against the C2 server. As part of the bot registration phase, the malware creates a POST request that contains information of the bot ID (encoded in base64 contains OS hostname and username), OS version string, malware version (v4.0.0 in our case) and installed anti-virus information extracted using WMI queries. The C2 server responds with a JSON that confirms the bot registration and may instruct the malware to take additional steps. The JSON response contains the following keys:

Supported C2 Commands

Micropsia performs periodic GET requests to /api/white_walkers//requests. The C2 server responds with a JSON that contains keys instructing the malware to execute the next steps.

Not all key names that appear in the JSON response have a corresponding logic in the analyzed binary. The analyzed binary lists the supported C2 command names and their meaning.

Upload Stolen Information

Every two minutes the malware collects all RAR files of stolen information and uploads them to the C2 server using the POST method to the relevant URL based on the storage type.

Malware Protection

Attacking groups continuously create new malware and mutations with additional capabilities. Radware’s Malware Research Group will keep monitoring and analyzing new threats to provide protection to Radware customers.

Read “Five Ways Modern Malware Defeats Your Defenses And What You Can Do About It” to learn more.

Download Now

64 COMMENTS

  1. Dell Printer Support is a team of experts who takes care of your dell printer issue. Our support is capable of dealing with any dell printer glitches. In case you’re having issue with you dell printer contact dell Printer Support and get instant help.

  2. Dell Support is a team of experts who take care of your dell device issue. If face any problem with your device like your device is crashed, a device is not working properly or others then contact Dell Tech Support and get instant help.

  3. HP Support is a group of experts who deals with every issue with your HP devices. These experts are proficient enough to give you the best of services. HP Support experts are quite efficient in giving repair services.

  4. A small grouping of execs can handle you manually as a result of they’re absolute to offer the standard services. So, in the event that you face any issue along with your package you don’t need to go anywhere except us.

  5. QuickBooks Enterprise Support 1888-557-6950 offers industry-specific solutions, notably for contractors, manufacturing and wholesale, nonprofits, and retailers. Quickbooks Enterprise support stands unique in the market as it has got the best tool which can help us to fix our any kind of Quickbooks related issues. They help to resolve our problem quite instantly and easily.

  6. QuickBooks Enterprise Support 1888-557-6950 offers industry-particular arrangements, strikingly for temporary workers, assembling and discount, philanthropies, and retailers. Quickbooks endeavor bolster stands special in the market as it has the best instrument which can help us to settle our any sort of Quickbooks related issues. They help to determine our concern in a split second and effortlessly.

  7. Will you be facing the issue with decision making? The amount of is it possible to earn in a month? You ought to predict this before. Many people are not used to this. We shall help most of the folks. What business are you having? Can it be raw material business? Would you cope with retail trade? Craftsmen also cope with your selection of revenue. Sometimes you do not forecast the specific budget. We now have experienced individuals to provide you with the figure. We’re going to also supply you with the figure of your respective budget which you yourself can get in the future from now. This will be only possible with QuickBooks support.

  8. Numerous sorts of questions or QuickBooks related issue, at that point you are route the correct way. You simply give single ring at our without toll QuickBooks Payroll Support.we will enable you to right arrangement as indicated by your issue. We work on the web and can expel the specialized issues by means of remote access and when the issue happens we will settle the same.

  9. At QuickBooks Support contact number, you will find solution each and every issue that bothers your projects and creates hindrance in running your company smoothly. Our team is oftentimes willing to allow you to while using the best support services you could possibly ever experience.

  10. Dial HP Printer Support Phone Number our qualified and experienced technical professional expert will connect to you who understand and identify the particular real cause and help you to get it fix at a really affordable price to make sure you wouldn’t normally face similar problems in forseeable future. We provide an exact, satisfactory and tangible solution.So why are you waiting? Call HP printer support number to get benefit of our extremely advanced and qualified skills of your specialists along with their instant support for all issues of HP Pinter for making sure a fast and continuous printing experience.

  11. QuickBooks has given its utmost support to entrepreneurs in decreasing the price otherwise we’ve seen earlier, however, an accountant wont to help keep completely different accounting record files. Utilising the assistance of QuickBooks, users will maintain records like examining, recording and reviewing the complicated accounting procedures.

  12. If you still face the error again, proceed to the next phase.
    See Install QuickBooks in Selective Startup for detailed instructions.
    In the event that you continue to get the 1935 error, see repair or reinstall Microsoft .NET Framework and start the installation again.

  13. QuickBooks is an efficient software for many types of businesses. The various versions can focus on the particular needs of one’s business. QuickBooks Enterprise could be the version available for the large-scale businesses with several of its wonderful features such as ëmulti-monitor support,í the payroll liability payment reminder, the last because of stamps on the invoices, merging the seller records, etc.

  14. While downloading a payroll update, the procedure is interrupted with a message that the update cannot progress as a result of QuickBooks error 15215. This implies that the machine failed to verify the digital signature. In many cases, all updates except the maintenance release updates are installed. QuickBooks errors like error 15215, allow it to be burdensome for users to execute routine tasks and as a consequence disrupt regular workflow activities.

  15. Intuit has managed to make it compulsory to save all important QuickBooks data into the hard drive. Just in case you upgrade the body or trying to install QuickBooks in a unique system or trying change the hard drive, it’s possible that your particular license file got damaged or missing.

  16. Damaged MSXML component: MSXML is an essential component provided by Microsoft. It really is needed by QB desktop to run on your own system. If this gets damaged, it can cause difficulties in accessing this accounting software.

  17. QuickBooks Error code 12 0 often takes place when system settings are wrongly configured or irregularities into the Windows registry. QuickBooks Error code 12 0 can easily be fixed with a unique software configured to resolve common system registry issues.

  18. QuickBooks error code 6189 is basically a run-time error which you find when you’re looking to run QuickBooks or trying to open an organization file in your system. This means that the file, which one tries to open, is certainly not accessible. Although the message that appears with this specific error contains a couple of details, it is usually problematic for a person to find its exact cause and correct it.

  19. QuickBooks is made to satisfy your every accounting needs and requirement with an excellent ease. This software grows with your business and perfectly adapts with changing business environment. Everbody knows you will find always two sides to a coin and QuickBooks isn’t any different. This software also throws some errors in the long run. Sometimes it becomes quite difficult to know that is using this error code or message. If that’s the case you should call our QuickBooks Support telephone number your can purchase in contact with our technical specialists in order to look for the fix of error instantly.

  20. Are you currently scratching the head and stuck along with your QuickBooks related issues, you will end up only one click definately not our expert tech support team for your QuickBooks related issues. We site name, are leading tech support team provider for your entire QuickBooks related issues. Either it is day or night, we offer hassle-free tech support team for QuickBooks and its associated software in minimum possible time.

  21. Our Professionals have designed services in a competent means so they will offer the required ways to the shoppers. we’ve got a tendency to at QuickBooks client Service are accessible 24*7 you simply need certainly to call our QuickBooks Support toll-free number that you can get in the marketplace on our website.

  22. With respect to the measurements of a particular business this is certainly owned by a person or entrepreneur, you can find three editions of this QuickBooks Payroll software product which delivers many automated functionalities so as to make your organization productive and efficient. Generally, the QuickBooks Payroll software product is available in listed here three variations: QuickBooks Basic Payroll, QuickBooks Enhanced Payroll, and QuickBooks Premium Payroll. You can easily choose from the three editions that may best suit your business and also make managing your online business and employees easier along with convenient.

  23. Can be executed every user task with QuickBooks Payroll Accounting software. Therefore you only need to install QuickBooks Payroll software and fetch the details, rest most of the essential calculation will undoubtedly be done automatically as a result of software.

  24. Having employees in your company also signifies the growth of your business, which will be considered essential by many people business owners. Thus, when you’ve got employees in your company, another component that becomes equally essential can be your employees’ payroll. If you’re hiring an employee to operate for your needs, it’s also important to pay wages for them. In the event that business which you own has a great deal many employees, every one of them being given a certain task, you will need something more than just a mere book of accounts.

  25. The article appears as an extremely attractive topic to explain. Your post is extremely helpful to me. Thanks for your great post. I am especially happy to take a look at your post.

LEAVE A REPLY

Please enter your comment!
Please enter your name here