Analysis of the Phishing Activity of the Dridex Banking Trojan Delivered by a Certain Institution in China by the TA575 Group

The original report is in Chinese, and this version is an AI-translated edition.

1.Overview

In early November 2021, Harbin Institute of Technology and Antiy Joint CERT Laboratory, discovered multiple phishing email delivery activities targeting a certain institution in China during network security monitoring. After correlation analysis, it was confirmed that the purpose of this attack activity was to deliver the Dridex banking trojan. Through the correlation and tracing of the relevant TTPs in the activity process, it was finally determined that this attack activity came from the TA575 group. In 2020, the organization was first disclosed by security vendors for its attack activities. It is one of the organizations that spread the Dridex banking trojan. Once the target (victim) attacked by it is implanted with the Dridex banking trojan, it may also be subjected to further ransomware attacks[1]. It belongs to the TA series of organizations. This series of organizations is a collection of cybercrime organizations for the purpose of illegal economic profit. Most of the members of the organization use the infrastructure they have built to spread banking trojans through phishing emails or other means, build a huge botnet, and steal information and send ransomware to the target.

In this phishing campaign, the TA575 group used documents containing Excel 4.0 macros as attachments to drop and execute HTA files, which then downloaded malicious samples stored on social and cloud file storage platforms such as Discord, Dropbox, and OneDrive. Furthermore, due to a domain control environment signature within the HTA file code, this phishing campaign only targeted endpoint systems within domain control environments. Throughout the attack, the attackers employed obfuscation, macro code hiding, encryption, and exception handling to thwart analysis and detection. Analysis revealed that the malicious samples downloaded to the target environment were essentially loader for the Dridex banking trojan, whose functions included obtaining basic information about the target system, connecting to and transmitting data back to the C2 command-and-control (C2) server, obtaining a list of P2P nodes, participating in botnet construction, obtaining subsequent modules, and carrying out secret theft or ransomware attacks. This indicates that once a user is infected with this banking trojan, they face security threats such as sensitive information leakage and system failures caused by ransomware.

According to correlation analysis, attackers have been spreading the Dridex banking Trojan via phishing emails since November 1, 2021. During this process, they abused relevant platforms to host the banking trojan and generate corresponding download links, resulting in a continuous increase in the number of malicious URLs generated. The phishing campaign monitored this time bears a high degree of similarity in relevant TTPs with attacks conducted by the TA575 group from February to October 2021. Based on this information, it can be inferred that this campaign is a new wave of phishing campaigns launched by the TA575 group to spread the Dridex banking trojan since November 2021.

It has been verified that Antiy Intelligent Endpoint Protection System (IEP) can effectively detect and kill the banking Trojan and provide practical protection for user terminals.

2.ATT&CK Mapping Diagram Corresponding to the Incident

This security monitoring found that attackers used phishing emails to drop malicious macro documents, which in turn spread the Dridex banking trojan. The ATT&CK mapping corresponding to this attack incident is shown in the figure below:

Figure 2-1

The following table lists the techniques used by the attackers in this incident:

Table 2‑1 The incident corresponds to the ATT&CK technical behavior description table

ATT&CK Stage/CategorySpecific BehaviorNotes
Initial accessPhishingDeliver phishing emails
ExecuteInduce users to executeTrick the user into opening the document and enabling macros
Defense evasionObfuscate files or informationUse obfuscated VBS code
Credential accessGet the credentials from where the password is storedSteal login credentials from web forms
DiscoverDiscover system informationGet the system machine name and domain name
Discover SoftwareGet the list of installed software on the system
CollectCollect local system dataReturn system information
Browser man-in-the-middle attack(MitB)Hijack browser session information
Command and ControlUse application layer protocolsTransmit control commands via HTTP
Use encrypted channelsTraffic encryption
Use a proxyThe target host is used to proxy C2 traffic
Use remote access softwareThe sample uses a V NC module
Data exfiltrationUse C2 channel for backhaulConnect to C2 server and send back system information

3.Protection Recommendations

In response to this banking Trojan, Antiy recommends that enterprises take the following protective measures:

3.1 Enterprise Protection

(1) Strengthen terminal protection: Install anti-virus software. It is recommended to install Antiy Intelligent Endpoint Protection System;

(2) Strengthen password strength: Avoid using weak passwords. It is recommended to use a password of 16 characters or longer, including a combination of uppercase and lowercase letters, numbers, and symbols. At the same time, avoid using the same password on multiple servers.

(3) Deploy an Intrusion Detection System (IDS): Deploy traffic monitoring software or equipment to facilitate timely detection of malicious code and its tracing back to its source. It is recommended to deploy the Antiy Persistent Threat Detection System (PTD), which uses network traffic as the detection and analysis object and can accurately detect a large amount of known malicious code and network attack activities, and effectively discover suspicious network behaviors, assets, and various unknown threats;

(4) Antiy Service: If you are attacked by malware, we recommend isolating the attacked host and securing the site while waiting for security engineers to investigate the computer. Antiy’s 24/7 service hotline is: 400-840-9234.

3.2  Daily Mailbox Security Protection

(1) When receiving emails, confirm whether the source is reliable and avoid opening URLs and attachments in suspicious emails;

(2) It is recommended to use a sandbox environment to execute suspicious files, and then use the host to execute them when safety is ensured. It is recommended to use the Antiy Persistent Threat Analysis System (PTA), which uses a combination of deep static analysis and sandbox dynamic loading and execution to effectively detect, analyze and identify various known and unknown threats;

(3) When setting the email login password, ensure that it has a certain degree of complexity (including three character elements), ensure that the password is not recorded in a conspicuous place in the office area, and modify the login password regularly.

(4) After binding your email account to your mobile phone, you can not only retrieve your password, but also receive SMS notifications of “abnormal login” and handle them immediately.

(5) Important documents should be well protected:

  • Empty the inbox, outbox and trash of important emails that are no longer used in a timely manner;
  • Back up important files to prevent file loss after an attack;
  • Important emails or attachments should be sent encrypted, and the decryption password should not be included in the body of the email.

(6) Do not post sensitive information on the Internet. Information and data posted by users on the Internet are at risk of being collected by attackers. Attackers can analyze this information and data and send targeted phishing emails to users.

3.3   Identifying Phishing Emails

Table 3-1

Identify objectsSpecific methods
View email senderBe wary of non-organized senders of “business mail”;
View recipient addressBe wary of mass emails and contact the sender to confirm;
Check the shipping timeBe wary of emails sent outside of working hours.
Look at the email titleBe wary of emails with titles containing keywords such as “order,” “invoice,” “wage subsidy,” and “purchase.”
Look at the wording of the textBe wary of emails that use general greetings such as “Dear,” “Dear User,” or “Dear Colleague.”
See the purpose of the textBe wary of emails requesting your email account password under the guise of “system upgrade,” “system maintenance,” or “security settings.”
Read the main textBe wary of any web links included, especially short links;
See the attached contentBefore viewing, you must use anti-virus software to scan the attachments for viruses.

It has been verified that Antiy Intelligent Endpoint Protection System (IEP ) can effectively detect and kill the banking Trojan and provide practical protection for user terminals.

Figure 3‑1 Antiy IEP test results

4.Phishing Email Analysis

The phishing emails involved in this phishing campaign primarily use content related to the attachment file name to trick users into clicking on the attachment, opening the malicious document, and triggering macro code. According to Antiy CERT’s correlation analysis, this type of phishing email has been extremely active since early November, primarily targeting countries such as the United States, Singapore, China, Mexico, South Korea, and Germany.

4.1  Email Information Case

Table 4‑1 2email information

Phishing emails delivered by attackers in early November 2021Use the invoice information as the subject of the email to deliver the macro document:
Phishing emails delivered by attackers in mid – November 2021Use bank card transaction information as the email subject to deliver macro documents:
Phishing emails delivered by attackers in early December 2021Use the invoice information as the subject of the email to deliver the macro document:

5.Malicious Macro Document Analysis

The malicious macro document captured in this phishing campaign primarily acts as a dropper and downloader, leveraging Excel 4.0 macros to drop an HTML file containing VBS code. This file then invokes the MSHTA command to execute the file, downloading and executing the Dridex banking trojan. This process utilizes code obfuscation to thwart analysis and evade detection.

5.1 Sample Tags

Table 5‑1 Sample tags

Virus nameTrojan/Win32.Generic
Original file nameInvoice-829691611_20211101.xlsb
MD5E89B443426FD6D13211C16658D09EB4E
File size198.07 KB (202,824 bytes)
File formatDocument/Microsoft.XLSX[:Excel 2007-2012]
File creatoruser​
File creation time2021-10-27 18:31:49
VT first upload time2021-11-01 17:00:32
VT test resultstwenty one / 62

5.2 Sample Analysis

After the malicious macro document is opened, clicking on the image triggers a pop-up message, which tricks the target into clicking the “Enable Macros” button. After enabling, clicking the document again triggers the macro code.

Figure 5‑1 Malicious macro document

This sample hides a worksheet named “Macro1”.

Figure 5‑2 Hidden worksheets

This worksheet contains code related to Excel 4.0 macro technology (an early version of macro code, different from existing VBA macro code). The multiple lines of code were written in separate cells, making it difficult to visually view. By using the characteristics of Excel 4.0 macro code, we searched for cells with “=” and found the following code:

Figure 5‑3 Excel 4.0 macro code

The above code does the following:

  1. Create the C:\ProgramData\excel.rtf and write the contents of CA157:CA6949 in the worksheet into the file.
  2. Call the MSHTA command to execute the created Excel .rtf file.
  3. Set a pop-up window prompt “WRONG OFFICE VERSION” to confuse the target.

The excel.rtf file is actually a malicious VBS code that has been obfuscated.

Figure 5‑4 Obfuscated vbs code

After deobfuscation, the code is as follows. Its specific functions are as follows: It initially checks whether the system login domain server name matches the current account domain. If not, it triggers the subsequent code. This determination clearly indicates the attacker’s intent to target only terminals under the domain controller. It then loops through the files corresponding to three URLs, checks the access status and retrieved file size. If the required conditions are met, it saves the file to the local path: C:\\ProgramData\Wlaninst.mp4 (actually a DLL file). It then calls rundll32.exe to execute the exported function named “KdSendPacket” within the DLL file, and then exits the loop.

Figure 5‑5 Deobfuscated vbs code

The relevant file paths are as follows:

File nameFile pathFile type
excel.rtfC:\ProgramData\HTML file with malicious obfuscated VBS code
Wlaninst.mp4C:\ProgramData\DLL file downloaded by vbs code

5.3 Malicious Documents from the Same Source

By correlating malicious documents created in the same way, we found that a large number of malicious documents have continued to appear since November 1, 2021. These malicious documents have the same creation time and similar embedded Excel 4.0 macro codes, all of which have the behavior of calling the MSHTA command to execute the HTA file.

Malicious document file names also have various naming characteristics, as follows:

Table 5‑2

Malicious document naming characteristicsEarly_Access.-*****_yyyymmdd.xlsb
Invoice-***** _yyyymmdd.xlsb
Threats Survey *****.xlsb
Holiday Survey Threats *****.xlsb
Scam Survey *****.xlsb
Holiday Survey Fraud *****.xlsb
Complaint details *****.xlsb
……

5.4 Dridex Banking Trojan Hosting Platform

URL that downloads the Dridex banking trojan from the malicious macro document. The URL belongs to a social software platform called “Discord”, which can store various files and generate corresponding sharing links.

According to monitoring data from a malicious URL platform[2] , from November 1 to November 4, 2021, the number of URLs spreading the Dridex banking Trojan continued to grow, and the corresponding number of samples also continued to rise.

Figure 5‑6 Dridex-related URL activity

Data source: urlhaus.abuse.ch

The corresponding number of samples also increased in early November 2021:

Figure 5‑7 Dridex sample size

In addition, the Dridex banking trojan also uses other platforms to spread:

Table 5‑4 Using other platforms for dissemination

Platform namePlatform usageURL storing the Dridex banking trojan (currently invalid)
DropboxProvides online storage services and realizes Internet file synchronization through cloud computing, allowing users to store and share files and folders.https://www.dropbox.com/s/wgboc0fhqj8qjon/dctGR.mp3?dl=1 https://www.dropbox.com/s/sf1agdykf5jo131/NDRVuq.mp3?dl=1
OneDriveA network drive and cloud service launched by Microsoft. Users can upload their files to a network server and browse those files through a web browser.https://onedrive.live.com/download?resid=F7F5D19FC93443B1%21139&authkey=!AA8JSY1RL5hVgfs https://onedrive.live.com/download?resid=359213FFBD695EC9%21163&authkey=!ABRTeRpsnkYNROQ

Based on the technical points such as the creation time, naming characteristics, document behavior, and propagation methods of the malicious documents used in the attacker’s phishing activities detected this time, after correlation analysis and judgment, it was found that there was a certain overlap with some technical points used by the TA575 group (a cybercrime organization) to spread the Dridex banking Trojan in early 2021. Based on this, it was preliminarily determined that the attacker behind this phishing activity was the TA 575 organization.

Table 5 TA575 group attack activity association

TimeAttack activitiesRelated points (same points as the samples found this time)
February 2021​The TA575 organization launched a Qakbot campaign targeting American medical and law firms and other institutionsUtilize phishing emails to deliver macro documents and download and execute Qak bot payloads via MSHTA
July – August 2021​TA575 organization launched Dridex campaign targeting relevant institutions in the United States and South KoreaThe malicious documents used during this period were mostly named “Invoice_*****.xls”, “* ***_Invoice_*****.xls”, etc.
October 2021​​TA575 uses “Squid Game” lure to distribute Dridex malwareThe creation time of the malicious document used is consistent with the creation time of the captured sample

6.Analysis of the Dridex Banking Trojan

The sample captured this time contained numerous anomalies and encrypted payloads, thwarting analysis and debugging. Analysis revealed that the sample is essentially a Dridex banking trojan loader. Its functions include collecting system information, connecting to a C2 and transmitting it back; issuing commands, obtaining a list of P2P nodes, and participating in the construction of a botnet; and obtaining subsequent modules for stealing secrets or extortion.

6.1 Sample Tags

Table 6‑1 Sample tags

Virus nameTrojan[Downloader]/Win32.Cridex       
Original file nameohma.dll
MD5A42ADC9E3E7E43479C020E1E0F44390C
Processor architectureIntel 386 or later, and compatibles
File size456.00 KB (466,944 bytes)
File formatBinExecute /Microsoft.DLL[:X86]
Timestamp2021-11-01 12:06:45
Digital signatureNone
Packer typeNone
Compiled languageMicrosoft C/C++ Visual Studio 2013
VT first upload time2021-11-01 16:19:12
VT test results42 / 66

6.2 Adversarial Analysis and Detection

After executing from the entry point, the sample sets up a nonfunctional SEH exception handler and cyclically triggers a large number of int 3 exceptions, causing the exception handler to execute for a long time and disrupting the debugging process, thereby achieving anti-sandbox and anti-analysis debugging. The sample is then decrypted in memory. The decrypted module registers a VEH exception handler and captures exceptions triggered by int 3, thereby achieving the effect of indirectly calling the API.

Figure 6‑1 Registering VEH function to capture exception

The APIs in the sample are dynamically obtained through CRC32 hash values after XOR, and are executed by the above VEH exception handling program by triggering an int 3 exception. This API call disrupts the execution flow, affects analysis tools, interferes with dynamic debugging, and increases the difficulty of analysis.

Figure 6‑2 Dynamically obtain API and call it using int 3

6.3        Information Collection

Use multiple functions including GetSystemInfo to read basic information such as system computer name, environment variables, system architecture, etc.

Figure 6‑3 Collecting system information

6.4 Connect to C2 to Obtain Subsequent Stealing or Ransomware Modules

Sends information to a hardcoded C2 server.

Figure 6‑4 Three hardcoded C2 addresses

Following C2 instructions, it retrieves a list of P2P nodes, participates in building a botnet, and downloads additional payloads for further theft or ransomware. Currently, all three C2 addresses are invalid, making it impossible to retrieve subsequent attack payloads for analysis.

Figure 6‑5 Read the C2 reply result

7.IoCs

Malicious documentsE89B443426FD6D13211C16658D09EB4E
Dridex banking Trojan sampleA42ADC9E3E7E43479C020E1E0F44390C
C2 address (expired)104.248.155.133:443 46.101.98.60:808 37.187.114.15:8172

Appendix 1: References

  • The First Step: Initial Access Leads to Ransomware

https://www.proofpoint.com/us/blog/threat-insight/first-step-initial-access-leads-ransomware

  • the Dridex banking trojan in the URLhaus Database

https://urlhaus.abuse.ch/browse/tag/Dridex/

Appendix 2: About Antiy

Antiy is committed to enhancing the network security defense capabilities of its customers and effectively responding to security threats. Through more than 20 years of independent research and development, Antiy has developed technological leadership in areas such as threat detection engines, advanced threat countermeasures, and large-scale threat automation analysis.

Antiy has developed IEP (Intelligent Endpoint Protection System) security product family for PC, server and other system environments, as well as UWP (Unified Workload Protect) security products for cloud hosts, container and other system environments, providing system security capabilities including endpoint antivirus, endpoint protection (EPP), endpoint detection and response (EDR), and Cloud Workload Protection Platform (CWPP) , etc. Antiy has established a closed-loop product system of threat countermeasures based on its threat intelligence and threat detection capabilities, achieving perception, retardation, blocking and presentation of the advanced threats through products such as the Persistent Threat Detection System (PTD), Persistent Threat Analysis System (PTA), Attack Capture System (ACS), and TDS. For web and business security scenarios, Antiy has launched the PTF Next-generation Web Application and API Protection System (WAAP) and SCS Code Security Detection System to help customers shift their security capabilities to the left in the DevOps process. At the same time, it has developed four major kinds of security service: network attack and defense logic deduction, in-depth threat hunting, security threat inspection, and regular security operations. Through the Threat Confrontation Operation Platform (XDR), multiple security products and services are integrated to effectively support the upgrade of comprehensive threat confrontation capabilities.

Antiy provides comprehensive security solutions for clients with high security requirements, including network and information authorities, military forces, ministries, confidential industries, and critical information infrastructure. Antiy has participated in the security work of major national political and social events since 2005 and has won honors such as the Outstanding Contribution Award and Advanced Security Group. Since 2015, Antiy’s products and services have provided security support for major spaceflight missions including manned spaceflight, lunar exploration, and space station docking, as well as significant missions such as the maiden flight of large aircraft, escort of main force ships, and Antarctic scientific research. We have received several thank-you letters from relevant departments.

Antiy is a core enabler of the global fundamental security supply chain. Nearly a hundred of the world’s leading security and IT enterprises have chosen Antiy as their partner of detection capability. At present, Antiy’s threat detection engine provides security detection capabilities for over 1.3 million network devices and over 3 billion smart terminal devices worldwide, which has become a “national-level” engine. As of now, Antiy has filed 1,877 patents in the field of cybersecurity and obtained 936 patents. It has been awarded the title of National Intellectual Property Advantage Enterprise and the 17th (2015) China Patent Excellence Award.

Antiy is an important enterprise node in China emergency response system and has provided early warning and comprehensive emergency response in major security threats and virus outbreaks such as “Code Red”, “Dvldr”, “Heartbleed”, “Bash Shellcode” and “WannaCry”. Antiy conducts continuous monitoring and in-depth analysis against dozens of advanced cyberspce threat actors (APT groups) such as “Equation”, “White Elephant”, “Lotus” and “Greenspot” and their attack actions, assisting customers to form effective protection when the enemy situation is accurately predicted.