什么是远视眼| 卡拉胶是什么| 十月七号什么星座| 佳字属于五行属什么| 龙根是什么| 阳历三月是什么星座| fila是什么品牌| 人血馒头是什么意思| 浑身乏力什么病的前兆| 左侧卵巢无回声是什么意思| 寅是什么意思| 盆腔积液是什么引起的| 湿疹涂什么| 胃不好适合吃什么食物| 上天是什么意思| aoc是什么牌子| 吃什么东西补血最快最有效| 死精是什么原因造成的| 姊妹是什么意思| 什么是腺样体面容| 什么叫自然拼读| 失温是什么意思| 晨尿浑浊是什么原因| 梦见磕头下跪什么意思| 犀利什么意思| 什么多腔| 肾虚吃什么补肾| 性功能减退吃什么药| 西太后手表什么档次| 肺部结节挂什么科| 含羞草为什么害羞| 什么的竹叶| 八婆是什么意思| 阴囊潮湿吃什么食物| 什么叫生酮| 亚人是什么意思| 5月30号是什么星座| 人乳头瘤病毒51型阳性是什么意思| fs是什么单位| 4月30号是什么星座| 吃什么能安神助睡眠| 五指毛桃长什么样| 悠悠是什么意思| 一个月一个屯念什么| 喝酒后胃疼吃什么药| 胎儿缺氧孕妇会有什么反应| cm和mm有什么区别| 什么时期最容易怀孕| 一带一路是指什么| 家政是干什么的| 月子中心是做什么的| 为什么一抽烟就想拉屎| 为什么天气热皮肤就痒| 亭亭净植是什么意思| 腺苷脱氨酶高什么意思| 飞蓬草有什么功效| 牙疼能吃什么食物| 是什么有什么| 宫颈管分离是什么意思| 什么是卤水| 神经性头痛吃什么药| 低密度脂蛋白偏高吃什么好| 什么泡水喝可以降血糖| 过年吃什么| 宝齐莱算什么档次的表| 猪脆肠是什么器官| 子宫后位是什么意思| 乙字五行属什么| 眼睛感染用什么眼药水| 血糖高的人应该吃什么食物最好| hh是什么品牌| 锡纸什么牌子的好| ip地址是什么意思| 怀孕做无创是查什么| 口臭应该挂什么科| 跳蚤长什么样子| 白带是什么味道| 产后吃什么水果好| 睡觉爱流口水是什么原因| 牛与什么生肖最配| 缱绻旖旎是什么意思| 启蒙是什么意思| 非洲说什么语言| 虫草治什么病| 什么叫生化| 什么是非甾体抗炎药| 什么叫感统训练| 梦见自己家被盗有什么预兆| 女人右眼跳是什么意思| 两个口是什么字| 澳大利亚人说什么语言| 脾大吃什么可以缩脾| 什么叫空调病| 芹菜炒什么配菜好吃| 吃了避孕药有什么副作用| 胸部里面有个圆圆的硬东西是什么| 75年属什么生肖| 鱿鱼不能和什么一起吃| 狗狗感冒了是什么症状| 束在什么情况下读su| 汉尼拔什么意思| 多种维生素什么时候吃效果最好| 灰指甲是什么样子| 兔肉不能和什么一起吃| 哪吒属什么生肖| 阴虚什么意思| 一般什么人会有美人尖| 爆单是什么意思| 心脏右束支传导阻滞是什么意思| 伤口止血用什么药| 作茧自缚是什么意思| 虫草适合什么人吃| 九宫是什么意思| 塔罗牌能算什么| 什么叫同人文| 梅花鹿吃什么食物| 中元节应该说什么| nfc果汁是什么意思| 顺利是什么意思| 塔塔粉是什么粉| 孩子咳嗽能吃什么水果| 事急从权是什么意思| 岗位等级是什么意思| 白芷泡水喝有什么功效| 己亥是什么意思| 0元购是什么意思| 夏天脚出汗是什么原因| 牙膏洗脸有什么好处| 秉承是什么意思| 拔节是什么意思| 在什么情况下最容易怀孕| 晚上喝红酒有什么好处和坏处| 笑点低是什么意思| 跖疣去医院挂什么科室| 鹅蛋有什么好处| 认知是什么意思| 河马吃什么食物| 附件炎是什么原因引起的| 牙龈溃烂是什么原因| 6月17日什么星座| 海蓝之谜适合什么年龄| 专员是什么级别| 冬天怕冷夏天怕热是什么体质| 睡觉一直做梦是什么原因| 正规医院减肥挂什么科| 为什么会打哈欠| 衣食父母什么意思| 脂肪肝有什么症状| 黄芪可以和什么一起泡水喝| 阴茎疱疹用什么药| 无创dna是检查什么的| 手指变形是什么原因| 大姨妈来了可以吃什么水果| 梦游的人为什么不能叫醒| 缺钠有什么症状和危害| 姗字五行属什么| 聪明的女人是什么样的| 觉得什么| 糖宝是什么意思| 什么分明| 拔智齿后吃什么消炎药| 受凉吃什么药| 男性全身皮肤瘙痒是什么原因| 就加鸟念什么| 脸上有癣用什么药膏好| 虚伪是什么意思| 一般细菌培养及鉴定是检查什么| uspa是什么牌子| 为什么会起鸡皮疙瘩| 领结婚证需要准备什么| 手脚浮肿是什么原因| 什么不宁| 什么能代替润滑油| 耄耋之年是什么意思| 阴沟肠杆菌是什么病| 催乳素是什么意思| 野生刺猬吃什么食物| 的确良是什么面料| 来加贝念什么| 关节炎用什么药| 冬枣什么时候成熟| 吃葡萄有什么好处| 家里出现蜈蚣是什么预兆| 苍茫的天涯是我的爱是什么歌| 白细胞多是什么原因| 力不从心的意思是什么| 婕妤是什么意思| 内痔有什么症状与感觉| 1948年是什么年| 喉咙痒吃什么药| 拿到offer是什么意思| 手指关节疼痛挂什么科| 五月是什么生肖| 吃什么| 杜鹃花什么时候开花| 歆五行属什么| 月亮是什么意思| 蜻蜓是什么动物| 支气管炎吃什么药最有效| belkin是什么牌子| 梦见自己杀人了是什么意思| 鼻子出血吃什么药| 天秤和什么星座最配| 吃什么利尿| 什么是反流性食管炎| 湿疹有什么特效药| 污秽是什么意思| 脑梗的前兆是什么| 为什么人要喝水| 小孩老是打嗝是什么原因| 夏天吃什么菜| 商是什么| 思钱想厚什么意思| 诺如病毒吃什么食物| 微笑是什么| c13呼气试验阳性是什么意思| 痰多咳嗽是什么原因| hbr是什么意思| gf什么意思| 脖子出汗多是什么原因女人| 牙疼吃什么菜降火最快| 潮热是什么意思| 51号元素是什么意思| 为什么会脑梗| 蛆长什么样子| 印是什么意思| 给朋友送什么礼物好| 痛风什么药止痛最快| 胆汁什么颜色| 产妇适合吃什么水果| 长期吸烟容易引起什么疾病| 中国的国树是什么树| 屁股出汗多是什么原因| 门口放什么植物好风水| 得寸进尺是什么生肖| 背部疼痛是什么原因引起的| 健胃消食片什么时候吃| 轮回是什么意思| 乾是什么生肖| 头晕是什么原因| 窦性心律逆钟向转位是什么意思| 你的美丽让你带走是什么歌| 化学阉割什么意思| 手指甲变薄是什么原因| 人力资源是做什么的| 腿上有白色条纹是什么| 音叉是什么| 经常吃土豆有什么好处| 吃什么增肥| 什么是基因突变| 中观是什么意思| 为什么拉屎是绿色的| 灶王爷叫什么名字| 素饺子什么馅儿的好吃| molly英文名什么意思| 刑妻克子是什么意思| 人参归脾丸适合什么人吃| 不寐病是什么意思| 哮喘吃什么药管用| 媒婆是什么意思| 早泄有什么办法| mpa是什么单位| 黄片是什么| 6周岁打什么疫苗| 百度

APT reports

国际车展炫技乘客至上,司机靠后

As the IT and OT environment becomes more complex, adversaries are quick to adapt their attack strategy. For example, as users’ work environments diversify, adversaries are busy acquiring the TTPs to infiltrate systems. Recently, we reported to our Threat Intelligence Portal customers a similar malware framework that internally we called MATA. The MATA malware framework possesses several components, such as loader, orchestrator and plugins. This comprehensive framework is able to target Windows, Linux and macOS operating systems.

The first artefacts we found relating to MATA were used around April 2018. After that, the actor behind this advanced malware framework used it aggressively to infiltrate corporate entities around the world. We identified several victims from our telemetry and figured out the purpose of this malware framework.

Windows version of MATA

The Windows version of MATA consists of several components. According to our telemetry, the actor used a loader malware to load the encrypted next-stage payload. We’re not sure that the loaded payload is the orchestrator malware, but almost all victims have the loader and orchestrator on the same machine.

Component of the Windows version of MATA

Loader

This loader takes a hardcoded hex-string, converts it to binary and AES-decrypts it in order to obtain the path to the payload file. Each loader has a hard-coded path to load the encrypted payload. The payload file is then AES-decrypted and loaded.

From the loader malware found on one of the compromised victims, we discovered that the parent process which executes the loader malware is the “C:\Windows\System32\wbem\WmiPrvSE.exe” process. The WmiPrvSE.exe process is “WMI Provider Host process”, and it usually means the actor has executed this loader malware from a remote host to move laterally. Therefore, we assess that the actor used this loader to compromise additional hosts in the same network.

Orchestrator and plugins

We discovered the orchestrator malware in the lsass.exe process on victims’ machines. This orchestrator malware loads encrypted configuration data from a registry key and decrypts it with the AES algorithm. Unless the registry value exists, the malware uses hard-coded configuration data. The following is a configuration value example from one orchestrator malware sample:

Victim ID Random 24-bit number
Internal version number 3.1.1 (0x030101)
Timeout 20 minutes
C2 addresses 108.170.31[.]81:443

192.210.239[.]122:443

111.90.146[.]105:443

Disk path or URL of plugin (up to 15) to be loaded on start Not used in this malware

The orchestrator can load 15 plugins at the same time. There are three ways to load them:

  • Download the plugin from the specified HTTP or HTTPS server
  • Load the AES-encrypted plugin file from a specified disk path
  • Download the plugin file from the current MataNet connection

The malware authors call their infrastructure MataNet. For covert communication, they employ TLS1.2 connections with the help of the “openssl-1.1.0f” open source library, which is statically linked inside this module. Additionally, the traffic between MataNet nodes is encrypted with a random RC4 session key. MataNet implements both client and server mode. In server mode the certificate file “c_2910.cls” and the private key file “k_3872.cls” are loaded for TLS encryption. However, this mode is never used.

The MataNet client establishes periodic connections with its C2. Every message has a 12-byte-long header, where the first DWORD is the message ID and the rest is the auxiliary data, as described in the table below:

Message ID Description
0x400 Complete the current MataNet session and delay the next session until the number of logical drives is changed or a new active user session is started.
0x500 Delete configuration registry key and stop MATA execution until next reboot.
0x601 Send configuration data to C2.
0x602 Download and set new configuration data.
0x700 Send the C2 the infected host basic information such as victim ID, internal version number, Windows version, computer name, user name, IP address and MAC address.
0x701 Send the C2 the configuration settings such as victim ID, internal version number and session timeout.

The main functionality of the orchestrator is loading each plugin file and executing them in memory. Each DLL file type plugin provides an interface for the orchestrator and provides rich functionality that can control infected machines.

Plugin name Description
MATA_Plug_Cmd.dll Run “cmd.exe /c” or “powershell.exe” with the specified parameters, and receive the output of the command execution.
MATA_Plug_Process.dll Manipulate process (listing process, killing process, creating process, creating process with logged-on user session ID).
MATA_Plug_TestConnect.dll Check TCP connection with given IP:port or IP range.

Ping given host or IP range.

MATA_Plug_WebProxy.dll Create a HTTP proxy server. The server listens for incoming TCP connections on the specified port, processing CONNECT requests from clients to the HTTP server and forwarding all traffic between client and server.
MATA_Plug_File.dll Manipulate files (write received data to given file, send given file after LZNT1 compression, compress given folder to %TEMP%\~DESKTOP[8random hex].ZIP and send, wipe given file, search file, list file and folder, timestomping file).
MATA_Plug_Load.dll Inject DLL file into the given process using PID and process name, or inject XORed DLL file into given process, optionally call export function with arguments.
MATA_Plug_P2PReverse.dll Connect between MataNet server on one side and an arbitrary TCP server on the other, then forward traffic between them. IPs and ports for both sides are specified on the call to this interface.

There is an interesting string inside the MATA_Plug_WebProxy plugin – “Proxy-agent: matt-dot-net” – which is a reference to Matt McKnight’s open source project. There are some differences though. Matt’s project is written in C# rather than C++. The MATA proxy is noticeably simpler, as there is no cache and no SSL support, for instance. It’s possible that MATA’s authors found and used the source code of an early version of Matt’s proxy server. It looks like the malware author rewrote the code from C# to C++ but left this footprint unchanged.

Proxy-agent of MATA_Plug_WebProxy.dll plugin

Non-Windows version of MATA

The MATA framework targets not only the Windows system but also Linux and macOS systems.

Linux version

During our research, we also found a package containing different MATA files together with a set of hacking tools. In this case, the package was found on a legitimate distribution site, which might indicate that this is the way the malware was distributed. It included a Windows MATA orchestrator, a Linux tool for listing folders, scripts for exploiting Atlassian Confluence Server (CVE-2019-3396), a legitimate socat tool and a Linux version of the MATA orchestrator bundled together with a set of plugins. China-based security vendor Netlab also published a highly detailed blog on this malware.

The module is designed to run as a daemon. Upon launch, the module checks if it is already running by reading the PID from “/var/run/init.pid” and checks if the “/proc/%pid%/cmdline” file content is equal to “/flash/bin/mountd”. Note that “/flash/bin/mountd” is an unusual path for standard Linux desktop or server installations. This path suggests that MATA’s Linux targets are diskless network devices such as routers, firewalls or IoT devices based on x86_64. The module can be run with the “/pro” switch to skip the “init.pid” check. The AES-encrypted configuration is stored in the “$HOME/.memcache” file. The behavior of this module is the same as the Windows MATA orchestrator previously described. The plugin names of Linux MATA and the corresponding Windows plugins are:

Linux plugin Corresponding Windows plugin
/bin/bash MATA_Plug_Cmd
plugin_file MATA_Plug_File
plugin_process MATA_Plug_Process
plugin_test MATA_Plug_TestConnect
plugin_reverse_p2p MATA_Plug_P2PReverse

Note that the Linux version of MATA has a logsend plugin. This plugin implements an interesting new feature, a “scan” command that tries to establish a TCP connection on ports 8291 (used for administration of MikroTik RouterOS devices) and 8292 (“Bloomberg Professional” software) and random IP addresses excluding addresses belonging to private networks. Any successful connection is logged and sent to the C2. These logs might be used by attackers for target selection.

macOS version

We discovered another MATA malware target for macOS uploaded to VirusTotal on April 8, 2020. The malicious Apple Disk Image file is a Trojanized macOS application based on an open-source two-factor authentication application named MinaOTP.

Trojanized macOS application

The Trojanized main TinkaOTP module is responsible for moving the malicious Mach-O file to the Library folder and executing it using the following command:
cp TinkaOTP.app/Contents/Resources/Base.lproj/SubMenu.nib ~/Library/.mina > /dev/null 2>&1 && chmod +x ~/Library/.mina > /dev/null 2>&1 && ~/Library/.mina > /dev/null 2>&1

Upon launch, this malicious Mach-o file loads the initial configuration file from “/Library/Caches/com.apple.appstotore.db”.

Like another strain running on a different platform, the macOS MATA malware also runs on a plugin basis. Its plugin list is almost identical to the Linux version, except that it also contains a plugin named “plugin_socks”. The “plugin_socks” plugin is similar to “plugin_reverse_p2p” and is responsible for configuring proxy servers.

Victims

Based on our telemetry, we have been able to identify several victims who were infected by the MATA framework. The infection is not restricted to a specific territory. Victims were recorded in Poland, Germany, Turkey, Korea, Japan and India. Moreover, the actor compromised systems in various industries, including a software development company, an e-commerce company and an internet service provider.

We assess that MATA was used by an APT actor, and from one victim we identified one of their intentions. After deploying MATA malware and its plugins, the actor attempted to find the victim’s databases and execute several database queries to acquire customer lists. We’re not sure if they completed the exfiltration of the customer database, but it’s certain that customer databases from victims are one of their interests. In addition, MATA was used to distribute VHD ransomware to one victim, something that will be described in detail in an upcoming blog post.

Victims of MATA

Attribution

We assess that the MATA framework is linked to the Lazarus APT group. The MATA orchestrator uses two unique filenames, c_2910.cls and k_3872.cls, which have only previously been seen in several Manuscrypt variants, including the samples (0137f688436c468d43b3e50878ec1a1f) mentioned in the US-CERT publication.

Unique file name

Moreover, MATA uses global configuration data including a randomly generated session ID, date-based version information, a sleep interval and multiple C2s and C2 server addresses. We’ve seen that one of the Manuscrypt variants (ab09f6a249ca88d1a036eee7a02cdd16) shares a similar configuration structure with the MATA framework. This old Manuscrypt variant is an active backdoor that has similar configuration data such as session ID, sleep interval, number of C2 addresses, infected date, and C2 addresses. They are not identical, but they have a similar structure.

Manuscrypt configuration structure

Conclusion

The MATA framework is significant in that it is able to target multiple platforms: Windows, Linux and macOS. In addition, the actor behind this advanced malware framework utilized it for a type of cybercrime attack that steals customer databases and distributes ransomware. We evaluate that this malware is going to evolve, so we will be monitoring its activity in order to protect our customers.

For more information please contact: intelreports@kaspersky.com

Indicators of compromise

File Hashes (malicious documents, Trojans, emails, decoys)

Windows Loader

f364b46d8aafff67271d350b8271505a
85dcea03016df4880cebee9a70de0c02
1060702fe4e670eda8c0433c5966feee
7b068dfbea310962361abf4723332b3a
8e665562b9e187585a3f32923cc1f889
6cd06403f36ad20a3492060c9dc14d80
71d8b4c4411f7ffa89919a3251e6e5cb
a7bda9b5c579254114fab05ec751918c
e58cfbc6e0602681ff1841afadad4cc6
7e4e49d74b59cc9cc1471e33e50475d3
a93d1d5c2cb9c728fda3a5beaf0a0ffc
455997E42E20C8256A494FA5556F7333
7ead1fbba01a76467d63c4a216cf2902
7d80175ea344b1c849ead7ca5a82ac94
bf2765175d6fce7069cdb164603bd7dc
b5d85cfaece7da5ed20d8eb2c9fa477c
6145fa69a6e42a0bf6a8f7c12005636b
2b8ff2a971555390b37f75cb07ae84bd
1e175231206cd7f80de4f6d86399c079
65632998063ff116417b04b65fdebdfb
ab2a98d3564c6bf656b8347681ecc2be
e3dee2d65512b99a362a1dbf6726ba9c
fea3a39f97c00a6c8a589ff48bcc5a8c
2cd1f7f17153880fd80eba65b827d344
582b9801698c0c1614dbbae73c409efb
a64b3278cc8f8b75e3c86b6a1faa6686
ca250f3c7a3098964a89d879333ac7c8
ed5458de272171feee479c355ab4a9f3
f0e87707fd0462162e1aecb6b4a53a89
f1ca9c730c8b5169fe095d385bac77e7
f50a0cd229b7bf57fcbd67ccfa8a5147

Windows MATA

bea49839390e4f1eb3cb38d0fcaf897e??? rdata.dat
8910bdaaa6d3d40e9f60523d3a34f914??? sdata.dat
6a066cf853fe51e3398ef773d016a4a8
228998f29864603fd4966cadd0be77fc
da50a7a05abffb806f4a60c461521f41
ec05817e19039c2f6cc2c021e2ea0016

Registry path

HKLM\Software\Microsoft\KxtNet
HKLM\Software\Microsoft\HlqNet
HKLM\Software\mthjk

Linux MATA

859e7e9a11b37d355955f85b9a305fec??? mdata.dat
80c0efb9e129f7f9b05a783df6959812??? ldata.dat, mdata.dat
d2f94e178c254669fb9656d5513356d2?? mdata.dat

Linux log collector

982bf527b9fe16205fea606d1beed7fa??? hdata.dat

Open-source Linux SoCat

e883bf5fd22eb6237eb84d80bbcf2ac9??? sdata.dat

Script for exploiting Atlassian Confluence Server

a99b7ef095f44cf35453465c64f0c70c??? check.vm, r.vm
199b4c116ac14964e9646b2f27595156??? r.vm

macOS MATA

81f8f0526740b55fe484c42126cd8396??? TinkaOTP.dmg
f05437d510287448325bac98a1378de1??? SubMenu.nib

C2 address

104.232.71.7:443
107.172.197.175:443
108.170.31.81:443
111.90.146.105:443
111.90.148.132:443
172.81.132.41:443
172.93.184.62:443
172.93.201.219:443
185.62.58.207:443
192.210.239.122:443
198.180.198.6:443
209.90.234.34:443
216.244.71.233:443
23.227.199.53:443
23.227.199.69:443
23.254.119.12:443
67.43.239.146:443
68.168.123.86:443

MATA: Multi-platform targeted malware framework

Your email address will not be published. Required fields are marked *

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  1. Jan20

    Poland? It’s really surprising as target. It’s pretty small country without anything special as targets…

Reports
有伤口吃什么消炎药 治前列腺炎吃什么药效果最好 什么就像什么造句 猪的耳朵像什么 九朵玫瑰花代表什么意思
疡是什么意思 4月出生是什么星座 10月16日出生的是什么星座 什么望外 吃什么可以增强免疫力
ab型血和b型血生的孩子是什么血型 术后吃什么刀口恢复得快 环状肉芽肿是什么皮肤病 泽泻是什么 没有什么
属羊的守护神是什么菩萨 正月初二是什么星座的 左侧头疼是什么原因引起的 临终关怀的目的是什么 药吃多了会有什么后果
四季春是什么茶hcv9jop6ns0r.cn 宫颈管短有什么症状hcv9jop1ns8r.cn 7月2日什么星座hcv7jop4ns8r.cn 不是省油的灯是什么意思hcv9jop2ns5r.cn 小拇指长痣代表什么hcv9jop6ns9r.cn
结肠炎吃什么食物好hcv9jop2ns4r.cn 小腹痛挂什么科hcv9jop2ns5r.cn 钾高了会出现什么症状wuhaiwuya.com 为什么额头反复长痘痘hebeidezhi.com 97年属什么今年多大hcv9jop3ns6r.cn
3月2日是什么星座hcv9jop3ns2r.cn 血痣是什么原因引起的hcv8jop1ns6r.cn rsp是什么意思hcv7jop9ns2r.cn crocs是什么牌子hcv8jop0ns5r.cn 腰痛吃什么好hcv9jop8ns2r.cn
朝阳是什么意思hcv9jop4ns3r.cn 肺寒吃什么药hcv7jop4ns8r.cn 白蛋白偏高是什么原因hcv8jop2ns4r.cn 人为什么没有尾巴hcv9jop5ns4r.cn 5点到7点是什么时辰hcv8jop7ns8r.cn
百度