
SonicWall Capture Labs Threat Research team spotted a new variant of adwind RAT, a cross-platform, multi-functional malware also known as JRAT that silently steals system information and credentials from the infected machines.
This phishing campaign targets commercial industries with a message crafted to look like a legitimate vendor and with an attachment "Remittance advice.pdf". But there is no real attachment, just a clickable image embedded at the top of the mail, made to look like a PDF file attachment. When user clicks on the image, it takes the user to the malicious website that drops the initial payload, "Remittance_Advice_HEAD0000I00231_pdf.jar". The payload is a malicious Java archive (.JAR) file but attacker has made it look like a PDF by hiding it's true extension.

It's just an image with an embedded hyperlink not an actual attachment
Based on the information from the Urlscan.io, this malicious jar payload is available on the below websites since September 25th.
Once executed, it connects with the Command & Control Server, downloads more payloads, installs dependencies and starts harvesting system information and user credential.

It tries to find the external IP address of the infected machine through "http://bot.whatismyipaddress.com"

JAR file executes the below shell command to change the default code page format to 1252 by calling CHCP (Change Code Page utility) and later executes the PowerShell command.


It drops the below executables into the temp directory:
It starts stealing user credential and configuration information by querying various applications path.


This variant must be from the same attacker group that targeted National grid utilities last month as there are similarities in the email message and the payload format. In the previous campaign, JAR file executes VB script but this campaign uses PowerShell script.
It seems very active in the last few days but not many security vendors detect this at the time of writing this article.
The Java archive has 212 class files and they are heavily obfuscated. It is then decompiled using Procyon decompiler, 177 class files are found to be obfuscated and the remaining files are encrypted using the AES encryption algorithm. We manually deobfuscated the code to retrieve the encryption details.

It uses the AES-128 symmetric encryption algorithm. We retrieved the code below that creates the cipher object with the AES key. This object shall be used to decrypt the encrypted JAR file contents.

VirusTotal Threat Graph:
SonicWALL Capture Labs Threat Research team provides protection against this threat with the following signatures:
This threat is also detected by SonicWALL Capture ATP w/RTDMI and the Capture Client endpoint solutions.
IP:
167.71.62.108:80
Share This Article

An Article By
An Article By
Security News
Security News