Introduction Another day, another wave of malware. Although there's plenty to find, I've been focusing on BazarLoader as it comes through various distribution channels. One such channel is the "Stolen Images Evidence" campaign, which Microsoft describes here. This campaign was pushing IcedID as we entered 2021, but it switched to BazarLoader as early as July 2021. The "Stolen Images Evidence" campaign uses emails generated through contact forms on various websites. So these messages don't originate through normal spam methods. They appear through contact form submissions describing a copyright violation to the intended victim. These form-submitted messages include a Google firebase storage URL in the message text. This malicious link supposedly provides proof of stolen images that resulted in a copyright violation. However, Google's service is being abused in this case, and the zip archive named Stolen Images Evidence.zip contains a JavaScript file designed to infect a vulnerable Windows host with BazarLoader.
Downloaded zip archives The downloaded zip archives are always named Stolen Images Evidence.zip. They contain a JavaScript file named Stolen Images Evidence.js.
BazarLoader from the JS file If a victim double-clicks the extracted JavaScript file on a vulnerable Windows host, it retrieves and runs a DLL for BazarLoader malware. The DLL is saved to the infected user's AppData\Local\Temp directory with a .dat file extension.
Infection traffic Infection traffic is typical for what we normally see with BazarLoader.
Indicators of Compromise (IOCs) The following is malware retrieved from an infected Windows host. SHA256 hash: c1cc9ec32368165e6625b2e2623ac0c3ca69bfa63a5b11e82a09bf18f6bd6410
SHA256 hash: 5a22e9bde5aaed03b323e5c933c473e9ba3831f4473790a3d4394baefe809d8a
SHA256 hash: dcf67fd6bfb62bea66f5e45d871d6c15b0c61d85c5fa9e9ded03e57f83dfc814
Google Firebase URL used to deliver the malicious zip archive:
Malicious domain called when using the above Google Firebase URL:
Traffic generated by the extracted JavaScript file to retrieve BazarLoader DLL:
Bazar C2 traffic:
Final words The associated malware samples have been submitted to bazaar.abuse.ch, and they're available using links from the above SHA256 hashes. This campaign uses "Stolen Images Evidence" and copyright violation as its primary theme. However, it also used a "DDoS attack proof" theme last month. Either way, this campaign has been fairly active in 2021, and we expect it to continue throughout the rest of this year. It will probably continue into 2022 as well. --- Brad Duncan |
Brad 435 Posts ISC Handler Sep 8th 2021 |
Thread locked Subscribe |
Sep 8th 2021 9 months ago |
Sign Up for Free or Log In to start participating in the conversation!