Connect with us

Hi, what are you looking for?

Technology

New stealthy DarkWatchman malware hides in the Windows Registry


dark_hoodie

A new malware named ‘DarkWatchman’ has emerged in the cybercrime underground, and it’s a lightweight and highly-capable JavaScript RAT (Remote Access Trojan) paired with a C# keylogger.

According to a technical report by researchers at Prevailion, the novel RAT is employed by Russian-speaking actors who target mainly Russian organizations.

The first signs of DarkWatchman’s existence appeared in early November as the threat actor began distributing the malware through phishing emails with malicious ZIP attachments.

Sample of phishing email used in DarkWatchman distribution
Sample of phishing email used in DarkWatchman distribution
Source: Prevailion

These ZIP file attachments contain an executable using an icon to impersonate a text document. This executable is a self-installing WinRAR archive that will install the RAT and keylogger.

Downloaded attachment contents
Downloaded attachment contents
Source: Prevailion

If opened, the user is shown a decoy popup message that reads “Unknown Format,” but in reality, the payloads have been installed in the background.

A stealthy ‘file-less’ RAT

DarkWatchman is a very light malware, with the JavaScript RAT measuring just 32kb in size and the compiled only taking using 8.5kb of space.

It utilizes a large set of “living off the land” binaries, scripts, and libraries, and incorporates stealthy methods to transfer data between modules.

The fascinating aspect of DarkWatchman is its use of the Windows Registry fileless storage mechanism for the keylogger.

Instead of storing the keylogger on disk, a scheduled task is created to launch the DarkWatchman RAT every time the user logs into Windows.

Advertisement. Scroll to continue reading.
Scheduled task added for persistence
Scheduled task added for persistence
Source: Prevailion

Once launched, DarkWatchmen will execute a PowerShell script that compiles the keylogger using the .NET CSC.exe command and launches it into memory.

“The keylogger is distributed as obfuscated C# source code that is processed and stored in the registry as a Base64-encoded PowerShell command. When the RAT is launched, it executes this PowerShell script which, in turn, compiles the keylogger (using CSC) and executes it,” Prevailion researchers Matt Stafford and Sherman Smith explained in their report.

“The keylogger itself does not communicate with the C2 or write to disk. Instead, it writes its keylog to a registry key that it uses as a buffer. During its operation, the RAT scrapes and clears this buffer before transmitting the logged keystrokes to the C2 server.”

Base64 encoded PowerShell that compiles the keylogger
Base64 encoded PowerShell compiling the keylogger
Source: Prevailion

As such, the registry is not only used as a place to hide the encoded executable code, but also as a temporary location to hold stolen data until it’s exfiltrated to the C2.

In terms of the C2 communication and infrastructure, the DarkWatchman actors use DGA (domain generation algorithms) with a seeded list of 10 items to generate up to 500 domains daily.

This gives them excellent operational resilience, and at the same time, makes communication monitoring and analysis very challenging.

DarkWatchman’s functional capabilities are the following:

  • Execute EXE files (with or without the output returned)
  • Load DLL files
  • Execute commands on the command line
  • Execute WSH commands
  • Execute miscellaneous commands via WMI
  • Execute PowerShell commands
  • Evaluate JavaScript
  • Upload files to the C2 server from the victim machine
  • Remotely stop and uninstall the RAT and Keylogger
  • Remotely update the C2 server address or call-home timeout
  • Update the RAT and Keylogger remotely
  • Set an autostart JavaScript to run on RAT startup
  • A Domain Generation Algorithm (DGA) for C2 resiliency
  • If the user has admin permissions, it deletes shadow copies using vssadmin.exe

The ransomware hypothesis

Prevailion theorizes that DarkWatchman may be tailored by/for ransomware groups that need to empower their less capable affiliates with a potent and stealthy tool.

The malware can load additional payloads remotely, so it could be used as a stealthy first-stage infection for subsequent ransomware deployment.

Since DarkWatchman can communicate to actor-controlled domains after the initial foothold, the ransomware operator could take over and deploy the ransomware or handle the file exfiltration directly.

This approach would degrade the affiliate’s role to that of a network infiltrator and simultaneously make RaaS operations more clinical and efficient.



Source link

Advertisement. Scroll to continue reading.

Click to comment

Leave a Reply

Advertisement

Latest

Technology

A new malware named ‘DarkWatchman’ has emerged in the cybercrime underground, and it’s a lightweight and highly-capable JavaScript RAT (Remote Access Trojan) paired with...

Online Business Success

Businessman analyzing growth chart getty Generating awareness to bring in new customers or prompt existing ones to make additional purchases lies at the heart...

Top Stories

Overshadowing its glory in previous years, the crypto ecosystem managed to maintain a year-long spotlight throughout 2021. Key catalysts include mainstream adoption of Bitcoin...

Top Stories

Billion-dollar companies across the globe are betting big on Bitcoin (BTC). Recent analysis from European investment manager Nickel Digital Asset Management found that 20...

Loan And Finance

The Chartered Insurance Institute has confirmed it will reinstate its historic funding model for Local Institute funding for 2022. This model seeks to share...

Technology

Best third-party bands for Fitbit Alta iMore 2021 If you’ve got a Fitbit Alta or Fitbit Alta HR, you probably already know they’re compatible...

Top Stories

It is no secret that nonfungible tokens (NFTs) are still a niche subject. Despite their rapid surge in popularity during 2021, there is still...

Online Business Success

With all the news about more Environmental, Social and Governance (ESG) investing, an increased awareness of racial wealth inequities and stepped-up union organizing, you’d...

Advertisement

You May Also Like

SEO Guide

How to index website on Google? Do you want to drive more organic traffic to your new website? I am sure your answer is...

SEO Guide

There are all kinds of pictures of the world on the internet, but to find one of these specific pictures that you want to...

Blogging

In this post, I will discuss the top ten profitable blogging niches ideas for Adsense approval and high traffic. whether you use Blogger or...

SEO Guide

Want to rank in Google image search? Images that you use as a featured images when writing a post actually appear on Google Images...

Advertisement