IMPORTANT ANNOUNCEMENT: On May 6, 2024, Carbon Black User eXchange (UeX) and Case Management will move to a new platform!
The Community will be in read-only mode starting April 19th, 7:00 AM PDT. Check out the blog post!
You will still be able to use the case portal to create and interact with your support cases until the transition, view more information here!

TAU-TIN - Spear Phishing targeting Italy

TAU-TIN - Spear Phishing targeting Italy

Summary

This campaign is targeting users in Italy with spear phishing email containing malicious attachments.

fig1.png
Figure 1: Emails with the malicious XLS attachment

The image above show one of the sample has attached in multiple email that has been sent to email address with Italy ccTLD.

The attached malicious XLS will first download an image from image sharing website using the powershell command which is shown in the image below.

fig2.pngFigure 2: embedded powershell code.

The downloaded image will be then being process by the powershell code in the XLS document to extract a secondary payload. The second stage payload is calculated based on a series of image pixels and color values.

fig3.pngFigure 3 : Python decoder script

The code snippet above is the decoder python script to decode the PNG into powershell script.

The image below highlights the secondary PowerShell script that is extracted from the downloaded PNG file.

fig4.pngFigure 4: Decode powershell code from PNG

After the calculation of the series of color pixel, it will then being translate to another powershell code. It will ultimately check if the user is from Italy and download a payload from the predefined C2 server.

fig5.png

Figure 5: Original image (left) and malicious image(right)

The image on the left is the original image that was found from a Google Image search and the image on the right is the image that was altered to contain the malicious powershell script.

fig6.pngFigure 6: Final powershell code

The code snippet above is the final powershell that will download the final payload. The first line of the code shown is to check the Windows GeoID home location setting for the current user account to confirm it is Italy. Unfortunately at the time of analysis the final URL was down. Thus the actual payload behavior is unknown.

Labels (1)
Tags (1)
0 Kudos
Article Information
Author:
Creation Date:
‎03-05-2019
Views:
1277