Micropsia Malware

63
2344

Since June 2018, the Radware Threat Research team has monitored an ongoing APT against the Palestinian authority, featuring an updated version of the Micropsia malware with an advanced surveillance toolkit. This advanced persistent threat began in March 2017 and was reported by Cisco Talos and Check Point Software Technologies, infecting hundreds of machines thus far.

The latest Micropsia malware version analyzed in Radware’s research lab is the most sophisticated tool used by this APT group. It includes advanced surveillance features such as microphone recording, keylogging and document stealing from USB flash drives. It also resembles the old versions’ C2 communication behavior by including references to famous TV shows and characters. While the campaign and victims were selectively targeted, some instances contaminated machines in other countries as well (see below).

Infection Process

Attackers gathered intelligence and used social engineering to select their victims. They have sent spear phishing emails to email addresses of selected personas. The email contains an attached file that looked like a report from a known news agency with a malicious executable downloaded and activated in the background.

Malware Capabilities

Micropsia comes with an impressive arsenal of advanced surveillance features, allowing it to closely track the victim’s activity and control the victim’s operating system. Currently, the following capabilities exist in the analyzed binary:

  • Microphone recording
  • Document stealing from connected USB flash drives
  • Screen capturing
  • Keylogging
  • Document stealing from hard drive
  • Scanning all drives – full directory listing without filters
  • Get files by specific path
  • Download and execute an arbitrary executable
  • Update malware executable

Microphone Recording

The microphone recording capability is considered an advanced surveillance feature, which is a rare occurrence among widespread malware. That said, it might become common when initiating an APT attack. While the malware’s screen capturing and keylogging capabilities are set to ‘on’ by default, the recording feature requires an activation command from the C&C at intervals defined by the operator. Once activated, Micropsia begins recording using Win32 MCI (Media Control Interface), which provides a generic interface to nearly every kind of multimedia device.

Initiating a new recording or stopping a running one is accomplished by calling Winmm.mciSendString API. That controls the multimedia device. Micropsia operators control the recording duration via Delphi timers that allow it to perform a periodic recording. A new recording is initiated by executing the above API using the following string commands.

In the same way, stopping the recording and saving it to a file is achieved by executing the following.

USB Flash Drives for Document Stealing

Controlled by Micropsia operators, the malware is able to register to an event of USB volume insertion to detect new connected USB flash drives. This functionality is detailed in an old blog post. Once an event is triggered, Micropsia executes an RAR tool to recursively archive files based on a predefined list of file extensions (*.xls, *.xlsx, *.csv, *.odt, *.doc, *.docx, *.ppt, *.pptx, *.pdf, *.mdb, *.accdb, *.accde, *.txt).

[You might also like: Stresspaint Malware Campaign Targeting Facebook Credentials]

Screen Capturing and Keylogging

Upon execution, the Micropsia malware takes screenshots every 90 seconds by calling to Gdi32.BitBlt API. This functionality is implemented by a Delphi timer which runs infinitely. Screenshots are saved as unencrypted files in JPEG format with a specific file name that contains the current timestamp (yyyy-mm-dd hh-nn-ss) with the hardcoded extension .his.

The screen capturing function contains incriminating strings which lead us to assume that this code was copied from a snippet published in delphimaster.ru forum. The keylogging module also starts automatically by recording every keystroke using the user32.GetKeyState API. It also deals with clipboard data when malware detects a key press combination of Ctrl+C. This module writes its output to a log file that also contains the current timestamp (yyyy-mm-dd hh-nn-ss) with the extension .slog.

Scan Drive and Fetch Files

Micropsia is able to perform a recursive directory listing on-demand for all volume drives available on the victim’s machine. It checks whether a volume drive exists by simply iterating all possible letters (from A to Z) and testing whether this directory exists. Malware operators are also able to fetch specific files from victim file system by their path.

Storage Management

Most of the malware capabilities mentioned above have outputs written to the file system which are later uploaded to the C2 server. Each module writes its own output in a different format, but surprisingly in a non-compressed and non-encrypted fashion. Micropsia’s developers decided to solve these issues by implementing an archiver component that executes the WinRAR tool. The malware first looks for an already installed WinRAR tool on the victim’s machine, searching in specific locations.

In the event a WinRAR tool is not found, Micropsia drops the RAR tool found in its Windows Portable Executable (PE) resource section to the file system.

Later, implemented as an infinite Delphi-based timer, every 15 minutes it creates RAR archives for each output type using the following command line:

RAR archives are encrypted using a hardcoded password (-hp switch) calculated during the malware initialization stage which is the result of MD5 on a hardcoded string (‘q5e9lqp’) which may be different in each malware campaign. In addition, the program uses a -df command line switch that deletes files after they are moved to the archive. Later, RAR archives are uploaded to the C2 server and afterwards they are deleted from the disk.

Next, the malware creates a new hidden directory with a hardcoded name “Recovery” under the Common AppData shell folder (C:\ProgramData\Recovery in Windows Vista and above). This directory is used to store all components’ outputs in a dedicated sub folder for each.

[You might also like: The Mikrotik RouterOS-Based Botnet]

C2 Communication
Malware C2 servers are stored hardcoded in binary and cannot be changed by operators dynamically, unless the malware’s executable binary is updated. In our binary, there are three hardcoded HTTPS URLs used for C2 communication. These C2 servers’ addresses were not seen in previous versions.

  • https//max-mayfield.com/api/white_walkers/
  • https//young-spencer.com/api/white_walkers/
  • https//192.169.6.59/api/white_walkers/

Besides encryption supplied by SSL, the hackers did not add an extra layer of encryption. Modern malware tends to encrypt its data to evade detection and make the binary research harder. Thus, communication can be monitored easily in a research environment using SSL termination proxy. Malware sets the User Agent string (hard-coded) for all of its communication to mimic Googlebot.

Bot Registration

As mentioned by the Cisco Talos Intelligence Group, after executing the Micropsia registers itself against the C2 server. As part of the bot registration phase, the malware creates a POST request that contains information of the bot ID (encoded in base64 contains OS hostname and username), OS version string, malware version (v4.0.0 in our case) and installed anti-virus information extracted using WMI queries. The C2 server responds with a JSON that confirms the bot registration and may instruct the malware to take additional steps. The JSON response contains the following keys:

Supported C2 Commands

Micropsia performs periodic GET requests to /api/white_walkers//requests. The C2 server responds with a JSON that contains keys instructing the malware to execute the next steps.

Not all key names that appear in the JSON response have a corresponding logic in the analyzed binary. The analyzed binary lists the supported C2 command names and their meaning.

Upload Stolen Information

Every two minutes the malware collects all RAR files of stolen information and uploads them to the C2 server using the POST method to the relevant URL based on the storage type.

Malware Protection

Attacking groups continuously create new malware and mutations with additional capabilities. Radware’s Malware Research Group will keep monitoring and analyzing new threats to provide protection to Radware customers.

Read “Five Ways Modern Malware Defeats Your Defenses And What You Can Do About It” to learn more.

Download Now

63 COMMENTS

  1. Dell Printer Support is a team of experts who takes care of your dell printer issue. Our support is capable of dealing with any dell printer glitches. In case you’re having issue with you dell printer contact dell Printer Support and get instant help.

  2. Dell Support is a team of experts who take care of your dell device issue. If face any problem with your device like your device is crashed, a device is not working properly or others then contact Dell Tech Support and get instant help.

  3. HP Support is a group of experts who deals with every issue with your HP devices. These experts are proficient enough to give you the best of services. HP Support experts are quite efficient in giving repair services.

  4. A small grouping of execs can handle you manually as a result of they’re absolute to offer the standard services. So, in the event that you face any issue along with your package you don’t need to go anywhere except us.

  5. QuickBooks Enterprise Support 1888-557-6950 offers industry-specific solutions, notably for contractors, manufacturing and wholesale, nonprofits, and retailers. Quickbooks Enterprise support stands unique in the market as it has got the best tool which can help us to fix our any kind of Quickbooks related issues. They help to resolve our problem quite instantly and easily.

  6. QuickBooks Enterprise Support 1888-557-6950 offers industry-particular arrangements, strikingly for temporary workers, assembling and discount, philanthropies, and retailers. Quickbooks endeavor bolster stands special in the market as it has the best instrument which can help us to settle our any sort of Quickbooks related issues. They help to determine our concern in a split second and effortlessly.

  7. Will you be facing the issue with decision making? The amount of is it possible to earn in a month? You ought to predict this before. Many people are not used to this. We shall help most of the folks. What business are you having? Can it be raw material business? Would you cope with retail trade? Craftsmen also cope with your selection of revenue. Sometimes you do not forecast the specific budget. We now have experienced individuals to provide you with the figure. We’re going to also supply you with the figure of your respective budget which you yourself can get in the future from now. This will be only possible with QuickBooks support.

  8. Numerous sorts of questions or QuickBooks related issue, at that point you are route the correct way. You simply give single ring at our without toll QuickBooks Payroll Support.we will enable you to right arrangement as indicated by your issue. We work on the web and can expel the specialized issues by means of remote access and when the issue happens we will settle the same.

  9. At QuickBooks Support contact number, you will find solution each and every issue that bothers your projects and creates hindrance in running your company smoothly. Our team is oftentimes willing to allow you to while using the best support services you could possibly ever experience.

  10. Dial HP Printer Support Phone Number our qualified and experienced technical professional expert will connect to you who understand and identify the particular real cause and help you to get it fix at a really affordable price to make sure you wouldn’t normally face similar problems in forseeable future. We provide an exact, satisfactory and tangible solution.So why are you waiting? Call HP printer support number to get benefit of our extremely advanced and qualified skills of your specialists along with their instant support for all issues of HP Pinter for making sure a fast and continuous printing experience.

  11. QuickBooks has given its utmost support to entrepreneurs in decreasing the price otherwise we’ve seen earlier, however, an accountant wont to help keep completely different accounting record files. Utilising the assistance of QuickBooks, users will maintain records like examining, recording and reviewing the complicated accounting procedures.

  12. If you still face the error again, proceed to the next phase.
    See Install QuickBooks in Selective Startup for detailed instructions.
    In the event that you continue to get the 1935 error, see repair or reinstall Microsoft .NET Framework and start the installation again.

  13. QuickBooks Error code 12 0 often takes place when system settings are wrongly configured or irregularities into the Windows registry. QuickBooks Error code 12 0 can easily be fixed with a unique software configured to resolve common system registry issues.

  14. QuickBooks error code 6189 is basically a run-time error which you find when you’re looking to run QuickBooks or trying to open an organization file in your system. This means that the file, which one tries to open, is certainly not accessible. Although the message that appears with this specific error contains a couple of details, it is usually problematic for a person to find its exact cause and correct it.

  15. QuickBooks is made to satisfy your every accounting needs and requirement with an excellent ease. This software grows with your business and perfectly adapts with changing business environment. Everbody knows you will find always two sides to a coin and QuickBooks isn’t any different. This software also throws some errors in the long run. Sometimes it becomes quite difficult to know that is using this error code or message. If that’s the case you should call our QuickBooks Support telephone number your can purchase in contact with our technical specialists in order to look for the fix of error instantly.

  16. Can be executed every user task with QuickBooks Payroll Accounting software. Therefore you only need to install QuickBooks Payroll software and fetch the details, rest most of the essential calculation will undoubtedly be done automatically as a result of software.

  17. Having employees in your company also signifies the growth of your business, which will be considered essential by many people business owners. Thus, when you’ve got employees in your company, another component that becomes equally essential can be your employees’ payroll. If you’re hiring an employee to operate for your needs, it’s also important to pay wages for them. In the event that business which you own has a great deal many employees, every one of them being given a certain task, you will need something more than just a mere book of accounts.

  18. Mcafee.com setup total protection spoke to and gift wizard, use after the instructions as you concur your degree of affirmation. Diverse preventive frameworks you want to determine earlier than you communicate to McAfee Total Safety program. Attempt to preserve insubordinate systems from in look of errors to your gadgets. McAfee total security as your well being programming utilized.

  19. QuickBooks online login service gives an industry trendy approach to combine statistics from multiple business enterprise documents right into a single employer file with guaranteed results. The merged record is then audited to ensure all transactions are merged correctly.

  20. In this text, we will talk the quality four approaches to change gmail password. Password changing system in gmail significantly varies as Google offers interactive answers to trade or get better the password. Read those top four methods, and you will realize the perfect way to Change your gmail password just like the tech genius.

  21. If you want to take full advantages of power washing services in Fayetteville then visit fast and clean power washing. We offered to unmatched assistance utilizing the highest caliber of business industry-standard hardware and eco-accommodating cleaners. We have many years of experienced staff who are completely safeguarded and prepared experts in the most recent procedures in the power washing industry. For knowing more about the company in detail visit at cleaning services in Fayetteville.

    We especially provide our Cleaning Services in Cumberland, Harnett, Fayetteville, Hoke, Lee, and Moore. Our services are house power washing, patio furniture cleaning, brick paver cleaning, Stain Removal, and driveways & sidewalks. Reasons to Choose Us such as Top-Rated Company, Superior Quality, and Eco-Friendly Products. Visit at Pressure Washing in Moore for more details about us.

  22. Are you finding any software that could help you file your tax returns? If yes, TurboTax is the answer. The TurboTax is a tax preparation software that plays a significant role in preparing and filing your tax returns. It is available for both state and federal income tax returns and has been designed in a way to guide users step by step whenever they go for filing their returns. For getting all of its benefits, ring up the TurboTax technical support to know the proper installation steps.

  23. Mcafee.com/activate – The web-based application and websites attract numerous malicious content to the device, and they affect the whole of your data and the smooth functioning of the system. It is due to harmful or inferior elements that come in the shape of viruses, spyware, malware, and some other harmful data. To protect these malicious and dangerous things, people need something that prevents these dangerous elements. Then comes the antiviruses, and among them, the most powerful is McAfee that helps the user to scan their device and removes all the malicious contents from the system.

LEAVE A REPLY

Please enter your comment!
Please enter your name here