Related Families: Andromeda, Kopiluwak, QuietCanary
Mandiant recently reported on a Turla campaign targeting Ukraine. The threat actors used multiple malware families in this campaign, including Kopiluwak, QuietCanary, and Andromeda.
- Turla was recently observed targeting entities in Ukraine in a campaign that appears to be motivated by espionage.
- In the campaign, they leveraged Andromeda, Kopiluwak, and QuietCanary.
- The campaign appears to be semi-targeted, with the threat actors screening potential victims prior to infecting them with the intended payload.
Who is Turla?
Turla, also known as Venomous Bear, Snake, Oroburos, Waterbug, Krypton, Hippo Team, Iron Hunter, and Blue Python, is a Russia nexus threat actor group known to target Eastern Bloc nations, as well as other targets worldwide. Turla is believed to be responsible for a 2008 attack on US Central Command. Industry researchers assess Turla is affiliated with the FSB. Turla has seemingly played an active role in the computer network operations aspect of the Russia-Ukraine conflict. In 2022, Turla was observed targeting defense and cybersecurity entities in the Baltic region using malicious documents. Turla also conducted a campaign leveraging malicious Android apps in mid-2022. In the Android campaign, they used a domain spoofing the Ukrainian Azov Regiment. In the more recently reported campaign, Turla used multiple malware families to target entities in Ukraine. The campaign began in late 2021 and stretched until September 2022. Malware families used in the campaign included Kopiluwak, QuietCanary, and Andromeda.
What is Andromeda?
In December 2021, an infected USB device containing several strains of malware was inserted at a Ukrainian organization, leading to an Andromeda infection. Andromeda is a modular backdoor trojan active as early as 2011 and associated with the Andromeda botnet. Andromeda is also known as Gamarue and Wauchos. It is known to target Windows devices. The Andromeda botnet was dismantled in an international takedown operation in late 2017. At its peak, Andromeda was known to distribute at least 80 malware families. It was also used to steal credentials.
The version of Andromeda malware used in the Turla campaign has been around since at least 2013. When dropped, the initial Andromeda binary drops another Andromeda sample to a temp file and adds a Run Registry Key to ensure the malware runs on logon. A C2 previously used by the old Andromeda botnet had expired in the past but was re-registered in January 2022. Turla used the C2 to profile victims to determine which would receive the first-stage Kopiluwak dropper. Based on this information, the campaign appears to have been semi-targeted.
What is Kopiluwak?
What is QuietCanary?
Two days after Kopiluwak was used to perform recon, QuietCanary was downloaded to the victim's machine. QuietCanary, also known as Tunnus, is a .NET backdoor used to gather and exfiltrate victim data. QuietCanary can handle commands issued by the C2. It uses hard-coded variables for C2, user agent, and RC4. Turla used QuietCanary to steal data from the target, presumably for espionage purposes.
PolySwarm has multiple samples associated with this activity.
You can use the following CLI commands to search for all related samples in our portal:
$ polyswarm link list -f Kopiluwak
$ polyswarm link list -f Andromeda
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or to subscribe.
Contact us at email@example.com | Check out our blog | Subscribe to our reports