Verticals Targeted: Government
Key Takeaways
The Campaign
Initial Attack Vector
While the initial attack vector is uncertain, spearphishing and abuse of misconfigured Zabbix software are suspected.
LunarLoader
ESET discovered LunarWeb after detecting a loader decrypting and running a payload from an external file on a previously unknown server. The discovery of LunarWeb also led researchers to discover LunarMail. Both backdoors use the same loader, dubbed LunarLoader. LunarLoader has been observed as both a standalone loader and as part of trojanized software. LunarLoader uses three different persistence methods, which include use of a group policy extension, replacing a legitimate Windows DLL, and an Outlook add-in.
LunarWeb
LunarWeb is deployed only on servers and uses HTTPs for C2 communication. It mimics legitimate requests. LunarWeb collects a variety of information about the victim machine, including the operating system version and serial number, BIOS version and serial number, and domain name. It also gathers additional information via shell commands, including the output of systeminfo.exe, environment variables, network adapters, a list of running processes, a list of services, and a list of installed security products. It then sends the information to the C2. LunarWeb can also receive commands from the C2. These include file and process operations, running shell and PowerShell commands, and running Lua code. Both LunarWeb and LunarMail backdoors use steganography to hide commands in images in order to evade detection.
LunarMail
LunarMail is deployed only on workstations. It uses an Outlook add-in for persistence and uses email for C2 communications. It shares similarities with LunarWeb, despite using a different method to communicate with the C2. LunarMail collects environment variables and the email addresses of all email recipients. Running inside Outlook, it uses email to receive commands and exfiltrate data. LunarMail’s capabilities include writing files, creating new processes, and screenshotting and modifying the C2 email address. It also supports Lua scripts, but unlike LunarWeb, it does not have the ability to run shell or PowerShell commands.
Who is Venomous Bear?
Venomous Bear, also known as Snake, Turla, Oroburos, Waterbug, Krypton, Hippo Team, Iron Hunter, and Blue Python, is a Russia nexus threat actor group known to target Eastern Bloc nations, as well as other targets worldwide. The group has been active since at least 2004 and may have been active as early as the 1990s. Industry researchers assess Venomous Bear is affiliated with the FSB.
Venomous Bear is believed to be responsible for a 2008 attack on US Central Command. Venomous Bear was also previously observed targeting defense and cybersecurity entities in the Baltic region using malicious documents. In the midst of the ongoing Russia-Ukraine conflict, Venomous Bear used malicious Android apps to target entities in Ukraine.
IOCs
PolySwarm has a sample associated with this campaign.
d2fad779289732d1edf932b62278eb3090eb814d624f2e0a4fbbc613495c55e8
You can use the following CLI command to search for all Venomous Bear samples in our portal:
$ polyswarm link list -t VenomousBear
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.