News

Malware downloads Cobalt Strike using images from Imgur

Researchers have discovered an unnamed malware that downloads Cobalt Strike using images from Imgur.

The malware spreads under the guise of obsolete Word documents (.doc) with malicious macros. If the user opens such a file and the macro is triggered, the PowerShell script is downloaded from GitHub.

The malware then uses (at first glance) normal Imgur images to infect the victim’s machine with Cobalt Strike.

One of the first to report the problem was an information security specialist known as Arkbird. He writes that a one-line PowerShell script loads a regular-looking PNG file from Imgur.

“While this image itself may be benign, its pixel values are used by the PowerShell script in calculating the next stage payload”, — said an information security specialist known as Arkbird.

The technique of hiding code, secrets, or malicious payloads in regular files such as images is known as steganography. Tools like Invoke-PSImage make this possible by encoding a PowerShell script in PNG file pixels and generating a one-line command to execute the payload.

Malware downloads Cobalt Strike

Bleeping Computer reports that the payload calculation algorithm runs a foreach loop to iterate over a set of pixel values in a PNG file, and also performs certain arithmetic operations to produce ASCII functional commands.

The data decoded in this way is the Cobalt Strike payload. Let me remind you that this is a legitimate commercial tool, originally created for pentesters and the red team, has long been loved by hackers, from government APT groups to ransomware operators.

“The decoded shellcode contains the string EICAR, which means it is aimed at tricking security mechanisms and SOC commands into mistaking malware for a penetration test performed by experts”, – said Bleeping Computer journalists.

In fact, the payload communicates with the C&C server through the WinINet module for further instructions. Moreover, the domain associated with the control server (Mazzion1234-44451.portmap.host) was registered only on December 20, 2020, but is currently no longer available.

Researcher believes that all this activity is similar to the work of hackers from the MuddyWater group, known for their attacks on businesses in the Middle East.

Let me remind you that I also talked about new PyMICROPSIA malware for Windows that can also be used for attacks on Linux and macOS.

William Reddy

I am from Ireland. My parents bought me a computer when I was 11, and several month after I have got a virus on this PC. I decided to enter the INSA Centre Val de Loire university after being graduated from the school. This French educational institution was offering a brand-new cybersecurity course. After getting the master degree in cybersecurity, I've started working in as virus analyst in a little anti-malware vendor. In 2018, I've decided to start Virus Removal project. The main target of this site is to help people to deal with PC viruses of any kind.

Leave a Reply

Your email address will not be published. Required fields are marked *

Sending

Back to top button