Starting in April this year, 360 Baize Lab intercepted a large number of attack samples from an unknown hacker organization. The hacker organization sent a phishing email to the victim by forging a police station investigation letter, COVID-19 detection notice, etc. , Through the backdoor virus to control the victim’s machine, steal valuable sensitive data related to the target.
The PDB path of the virus samples used by the organization points to a user named “Vendetta”, and we will later also name the hacker organization Vendetta:
“C:\Users\Vendetta\source\repos\{project name}\*\obj\Debug\{project name}.pdb”
In some samples, we have repeatedly detected the following tags, the virus author claims that he is from Italy:
However, we found in the naming of virus samples that virus authors like to use certain Turkish names to name variables, such as “RoboSki”, so we suspect that the organization originated in Europe:
Vendetta is a hacker organization that is very good at using social engineering. They forge phishing emails very realistically. They can easily gain users’ trust and guide users to open the malicious programs they carry.
The picture below is a Vendetta forgery of the investigation letter issued by the Austrian Federal Ministry of the Interior (BMI)
Forged investigation letter from the Romanian police station:
Forged the COVID-19 virus test email issued by the Australian Government Department of Health. The email stated that the victim had contact with a confirmed case within the past 14 days. It is recommended to read the test guide in the attachment and accept the test:
Forged a virus test email issued by the Mexican health department:
As well as the forged email quoted by the Egyptian Orascom Group:.
The compressed file in the email attachment contains the Trojan file, which is generally named after pdf.exe, Document.exe, etc. After running, it decrypts and loads the subsequent virus module in memory.
RoboSki
In all samples, we detected the same type of code obfuscator, and according to its PDB debugging path, we named it RoboSki:
RoboSki encrypts and stores the shellcode in the pixels of the picture. The following figure is the code logic to extract the available pixel data and decrypt the shellcode:
ReZer0
The execution logic of ReZer0 is controlled by hard-coded built-in instructions. According to different instructions, different malicious functions are executed. Its design logic resembles the design method of backdoor programs:
We have sorted out the hard-coded instructions and their corresponding meanings, most of which are not used:
Hardcode[x] | Description |
0 | [0] == 4 load the plugin from the resource into memory |
[0]! = 4 Inject the plugin in the resource into the system process to execute | |
1 | Whether to register scheduled tasks |
4 | Download and execute any file |
5 | Download file URL |
6 | The execution path of the downloaded file |
7 | Whether to detect the virtual machine |
8 | Whether to detect sandbox |
9 | ByPass antivirus software |
29 | Show file version |
34 | Sleep() |
35 | Sleep duration |
In the 360 massive data, we found that ReZer0 has an obvious version identification. In conjunction with the above-mentioned large number of instructions used, we speculate that the software is still in the development stage, and it will not be ruled out that the program will be controlled through network communication in the future:
In addition to the nature of the backdoor virus, ReZer0 also carries known remote control Trojans such as NanoCore and Remcos in the resources. We will not repeat the remote control functions such as NanoCore. We take some of the victims of Vendetta as an example to speculate the purpose of their actions.
Passion Fruit Company of Australia (PAI) is a representative institution and a non-profit membership organization that supports the passion fruit industry in Australia. PAI is an umbrella organization that represents and enhances the interests of everyone in the passion fruit industry, including growers, packers, wholesalers, exporters, researchers, and retail stores.
Of course, Vendetta’s attack target is not only the PAI family. We have roughly described the distribution of Vendetta’s attack target by statistically the distribution of related samples, and its attack purpose is to steal related commercial information.
Summary
Vendetta is an active hacking organization that started in April 2020. The organization may have originated in Europe. It is good at using social engineering to launch cyber attacks. The purpose of the attack is to steal targeted business intelligence.
C2:
172.111.188.199:8829
Md5:
e73d9b2eba5e818cd4699f1484af5bce
dabbfc6a7d939c4c41fb2c7cee295220
dd93825ca5bd3afda1c238ce2ded84e1
500dc2b3fbea8f13b29f494afb9465ec
2106b19ffb7bf327d64d4cd6bdb606b4
e73d9b2eba5e818cd4699f1484af5bce
Learn more about 360 Total Security