Malspam activity was observed on February 11th delivering a Keybase variant. The keylogger was first reported by security researchers at Palo Alto Networks in 2015. FirstWatch previously blogged about how to detect it using RSA NetWitness.
The delivery document is crafted to exploit CVE-2017-8759 in Microsoft Office. CVE-2017-8759 is a SOAP WSDL parser code injection vulnerability. FirstWatch dug deeper into that vulnerability in a previous threat advisory.
Upon opening the RTF document with an un-patched Microsoft Word, the user is presented with an empty page:
In the background there is an HTTP request over SSL to a[.]pomfe[.]co :
Next comes the request to retrieve an HTA script from bahyt-krim[.]ru :
Then an executable ziraat_bobby.exe; a Keybase variant; is downloaded from the same domain:
Once the download is complete, the binary executes and it starts to exfiltrate data in the query strings of successive HTTP GET requests to ziraat-helpdesk[.]com:
Post infection HTTP sessions were tagged with keybase malware in NetWitness Packets:
Here is the analysis report from hybrid-analysis.com
It is worth mentioning that the delivery domain bahyt-krim[.]ru has been active over the past couple of days:
Delivery document (SHA256):
ziraat_bobby.exe (SHA256):
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.