Life Buzz News

New PXA Stealer targets government and education sectors for sensitive information


New PXA Stealer targets government and education sectors for sensitive information

We discovered the attacker selling credentials and tools in the Telegram channel "Mua Bán Scan MINI," which is where the CoralRaider adversary operates, but we are not sure if the attacker belongs to the CoralRaider threat group or another Vietnamese cybercrime group.

The attacker is targeting the education sector in India and government organizations in European countries, including Sweden and Denmark, based on Talos telemetry data.

The attacker's motive is to steal the victim's information, including credentials for various online accounts, browser login data, cookies, autofill information, credit card details, data from various cryptocurrency online and desktop wallets, data from installed VPN clients, gaming software accounts, chat messengers, password managers, and FTP clients.

Talos discovered that the attacker was hosting malicious scripts and the stealer program on a domain, tvdseo[.]com, in the directories "/file", "/file/PXA/", "/file/STC/", and "/file/Adonis/". The domain belongs to a Vietnamese professional search engine optimization (SEO) service provider; however, we are not certain whether the attacker has compromised the domain to host the malicious files or has subscribed to get legitimate access while still using it for their malicious purposes.

We found that the attacker is using the Telegram bot for exfiltrating victims' data. Our analysis of the payload, PXA Stealer, disclosed a few Telegram bot tokens and the chat IDs - controlled by the attacker.

We identified attacker's Telegram account "Lone None," which was hardcoded in the PXA Stealer program and analyzed various details of the account, including the icon of Vietnam's national flag and a picture of the emblem for Vietnam's Ministry of Public Security, which aligns with our assessment that the attacker is of Vietnamese origin. Also, we found Vietnamese comments in the PXA Stealer program, which further strengthen our assessment.

The attacker's Telegram account has biography data that includes a link to a private antivirus checker website that allows users or buyers to assess the detection rate of a malware program. This website provides a platform for potential threat actors to evaluate the effectiveness and stealth capabilities of the malware before purchasing it, indicating a sophisticated level of service and professionalism in the threat actor's operations.

We also discovered that the attacker is active in an underground Telegram channel, "Mua Bán Scan MINI," mainly selling Facebook accounts, Zalo accounts, SIM cards, credentials, and money laundry data. Talos observed that this Vietnamese actor is also seen in the Telegram group in which the CoralRaider actor operates. However, we are not certain whether the actor is a member of the CoralRaider gang or another Vietnamese cybercrime group.

Talos discovered that the attacker is also promoting another underground Telegram channel, "Cú Black Ads - Dropship," by sharing a few automation tools to manage large numbers of user accounts in their channel and conducting the exchanging or selling of information related to social media accounts, proxy services, and a batch account creator tool.

The tools shared by the attacker in the group are automated utilities designed to manage several user accounts. These tools include a Hotmail batch creation tool, an email mining tool, and a Hotmail cookie batch modification tool. The compressed packages provided by the threat actor often contain not only the executable files for these tools but also their source code, allowing users to modify them as needed.

We found that the attacker is not sharing all the tools for free, and some of them require users to send a unique key back to the Telegram channel administrator for software activation. This process ensures that only those who have been vetted or have paid for the tool can access its full functionality. We also discovered that these tools are distributed on other websites, such as aehack[.]com, highlighting that they are selling the tools. Additionally, a YouTube channel exists that provides tutorials on how to use these tools, further facilitating their widespread use and demonstrating the organized efforts to market and instruct potential users on their application.

The attacker gains initial access by sending a phishing email with a ZIP file attachment, according to our telemetry data. The ZIP file contains a malicious loader executable file compiled in Rust language and a hidden folder called Photos. The hidden folder has other recurring folders, such as Documents and Images, that contain obfuscated Windows batch scripts and a decoy PDF document.

When a victim extracts the attachment ZIP file, the hidden folder and the malicious Rust loader executable are dropped onto the victim machine. When the malicious Rust loader executable is run by the victim, it loads and executes multiple obfuscated batch scripts that are in the dropped hidden folders.

We deobfuscated the Windows batch scripts using CyberChef, with each step in the process being crucial and requiring precise execution to achieve accurate deobfuscation. First, we employed regular expressions (regex) to filter out random characters consisting of uppercase and lowercase letters (A to Z). These random strings ranged in length from six to nine characters and were enclosed within "%" symbols. Next, we filtered out the "^" symbols and removed any remaining uppercase and lowercase letters (A to Z) as well as special characters "_," /'(?)," "$," "#," and "[]." Finally, we eliminated the "%" symbols and we were able to successfully deobfuscate the scripts and reveal their PowerShell commands.

The batch scripts execute PowerShell commands simultaneously, performing the following activities on the victim machine:

PXA Stealer is a Python program that has extensive capabilities targeting a variety of data on the victim's machine.

When the PXA Stealer is executed, it kills a variety of processes from a hardcoded list, including endpoint detection software, network capture and analysis process, VPN software, cryptocurrency wallet applications, file transfer client applications, and web browser and instant messaging application processes by executing "task kill" commands.

The stealer has the capability of decrypting the browser master key, which is a cryptographic key used by web browsers like Google Chrome and other Chromium-based browsers to protect sensitive information, including stored passwords, cookies, and other data in an encrypted form on the local system. The stealer accesses the master key file "Local State" located in the browser folder of the user's profile directory, which contains the information of the encryption key used to encrypt the user data stored in the "Login Data" file, and decrypts it using the "CryptUnprotectData" function. This allows the attacker to gain access to the stored credentials and other sensitive browser information.

The stealer also attempts to decrypts the master key that is stored in the key4.db file. Key4.db is a database used by Firefox (and some other Mozilla-based browsers) to store encryption keys, particularly the master key that encrypts sensitive data, such as saved passwords. The "getKey" function of the stealer is designed to extract and decrypt keys from the key4.db file using either AES or 3DES encryption methods, depending on the encryption used in the stored key.

The stealer attempts to retrieve user profiles paths from the profiles.ini file of browser applications, including Mozilla Firefox, Pale Moon, SeaMonkey, Waterfox, Mercury, k-Melon, IceDragon, Cyberfox, and BlackHaw for further processing, such as extracting saved passwords or other user data.

The stealer collects the victim's login information from the browser's login data file. The function "get_ch_login_data" of the stealer extracts login data, including URLs, usernames, and passwords, from the database "login_db", which stores login information. The extracted login information is formatted into a string that includes the URL, username, decrypted password, browser, and profile.

For each login entry in the browser login database, the function checks if the URL contains any important keywords that are hardcoded in the stealer program, and if a match is found, the login information is saved in a separate file named "Important_Logins.txt" located in the "Browsers Data" folder within the user's profile temporary directory. The function saves all the results to "All_Passwords.txt" in the "Browsers Data" folder for other login data found in the database.

The stealer executes another function, "get_ch_cookies", to extract cookies from a specified browser's cookie database, decrypt them, and save the results to a file. First, it checks if the cookies database file exists in the specified profile directory and unlocks the cookies database file. The database file is then copied to the temporary folder and is processed by executing an SQL query to retrieve cookie information, including host key, name, path, encrypted value, expiration time, secure flag, and HTTP-only flag from the cookies database file.

If any Facebook cookies are found, they are concatenated to a single string called "fb_formatted", and it calls another function, "ADS_Checker()", to check for ads based on the Facebook cookies, and the results are written to a file called "Facebook_Cookies.txt". Any other cookie information is written to a text file named after the browser and the profile. Finally, the function removes the temporary cookie database file.

In another sample of the stealer, for the browsers Chrome, Chrome SxS, and Chrome(x86), it downloads and executes a cookie stealer JavaScript through the URL hxxps://tvdseo[.]com/file/PXA/Cookie_Ext.zip. The cookie stealer JavaScript connects to the Telegram bot with the token, and the chat ID hardcoded in the script collects the cookies and sends them to the attacker's Telegram bot through the POST method.

Next, the stealer targets the victim's credit card information stored in the browser database "webappsstore.sqlite". The function extracts and decrypts saved credit card information from a browser's web data database. It checks if the cards database file "cards_db" exists and copies them to the user's profile temporary folder. It executes a SQL query to retrieve credit card information including name on card, expiration month/year, encrypted card number, and date modified. Then it decrypts the encrypted card number using the function "decrypt_ch_value" with the help of the decrypted master key. It writes the cards' information to a text file and names it after the browser and the profile. Finally, it gets the count of credit card information that was found and deletes the temporary copy of the "cards_db" file.

The stealer extracts and saves the autofill form data from a browser's database to a text file with the file name format of "$browser_$profile.txt" in a folder called "AutoFills" in browser profile location.

The stealer also extracts and validates Discord tokens stored in various browsers or Discord applications. It checks for the stored encrypted Discord tokens in the different browser database files and also Discord-specific applications files of Discord, Discord Canary, Lightcord, and Discord PTB on the victim's machine by searching for strings using regular expression "r"dQw4w9WgXcQ:[^.*\['(.*)'\].*$][^\"]*")". Once the encrypted tokens are found, it decrypts them with the function "decrypt_dc_tokens()" using the extracted master key that was used to encrypt the tokens from the "Local State" file. Then, it validates the decrypted Discord tokens to check if it is a legitimate Discord token and stores it by associating it with the browser name. Besides searching for the encrypted tokens, the function also looks for unencrypted Discord tokens by searching strings that match the regular expression pattern "[\w-]{24}\.[\w-]{6}\.[\w-]{27}" for standard tokens and "mfa\.[\w-]{84}" for multi-factor authentication (MFA) tokens in ".log" and ".ldb" files in the levelDB directory of Discord applications or web browsers where the structured key-value data is stored in levelDB database format.

The stealer executes another function to extract the user information from the MinSoftware application database. It searches for the database file "db_maxcare.sqlite" file on the victim machine folders, including Desktop, Documents, Downloads, OneDrive and in the logical partitions with the drive letters "D:\" and "E:\". Once found, it executes a SQL query to search in the accounts table of the database file and extracts the following data:

The stealer also has the functionalities for interacting with Facebook Ads Manager and Graph API using a session authenticated via cookies.

After collecting the targeted victim's data, including the login data, browser cookies, autofill information, credit card details, Facebook ads account data, cryptocurrency wallet data, Discord token details, and MinSoft application data, the stealer creates a ZIP archive of all the files in the user profile's temporary folder with the file name format "CountryCode_Victim's public IP Computername.zip", with a high compression level of value nine.

While creating the archive and navigating the targeted folders, the stealer excludes some of the directories, including user_data, emoji, tdummy, dumps, webview, update-cache, GPUCache, DawnCache, temp, Code Cache, and Cache. It also attempts to rename each file while adding them to the archive. The archive is exfiltrated to the actor's Telegram bot. After exfiltrating the victim's data, the stealer deletes the folders that contained the collected user data.

Cisco Secure Endpoint (formerly AMP for Endpoints) is ideally suited to prevent the execution of the malware detailed in this post. Try Secure Endpoint for free here.

Cisco Secure Web Appliance web scanning prevents access to malicious websites and detects malware used in these attacks.

Cisco Secure Email (formerly Cisco Email Security) can block malicious emails sent by threat actors as part of their campaign. You can try Secure Email for free here.

Cisco Secure Firewall (formerly Next-Generation Firewall and Firepower NGFW) appliances such as Threat Defense Virtual, Adaptive Security Appliance and Meraki MX can detect malicious activity associated with this threat.

Cisco Secure Malware Analytics (Threat Grid) identifies malicious binaries and builds protection into all Cisco Secure products.

Umbrella, Cisco's secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs and URLs, whether users are on or off the corporate network. Sign up for a free trial of Umbrella here.

Cisco Secure Web Appliance (formerly Web Security Appliance) automatically blocks potentially dangerous sites and tests suspicious sites before users access them.

Additional protection with context to your specific environment and threat data are available from the Firewall Management Center.

Cisco Duo provides multi-factor authentication for users to ensure only those authorized are accessing your network.

Open-source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org. Snort SIDs for this threat are listed below:

ClamAV detections are also available for this threat:

Previous articleNext article

POPULAR CATEGORY

corporate

9205

tech

10331

entertainment

11200

research

5143

misc

12002

wellness

8813

athletics

11837