Comprehensive Analysis Report on Commercial Espionage Trojans

The original report is in Chinese, and this version is an AI-translated edition.

1.Overview

Commercial espionage Trojan is a kind of commercial and market secret-stealing Trojan which is formed under the driving of interests. The Trojan will collect important data of the target system (including but not limited to password credentials, privacy information, important files and digital assets), and return the collected data to the attacker’s server. It causes serious consequences such as privacy leakage and economic loss to users. Hence, Antiy CERT comprehensively analyze that typical commercial espionage Trojan families, sum up the attack flow and common technical means in the attack activity, and expounds the activity status of it. It summarizes the effective protection suggestions to help users avoid the infringement of the Trojan.

At present, commercial secret-stealing Trojan has formed a complete chain of secret-stealing industry, mainly including production, confusion, sales, dissemination, profit-making and other links. Division of labor and cooperation in the industrial chain is clear: The stealthy Trojan writer is responsible for program design, development and testing; the obfuscation service provider is responsible for obfuscating the program to avoid testing; the seller is responsible for promotion and sales to obtain more benefits; The propagator is responsible for placing a secret Trojan to infect the user’s device. The theft attacker can realize a “one-stop” type of complete attack by buying the services of each attack stage in the theft industry chain, and finally sell the stolen data to the information buyer to make a profit.

The commercial espionage Trojan adopts the modularized load, the internal components are relatively independent, and the expandability is strong. it can be adjusted according to the change of the attack target, and the new function of secret theft is added, which will bring more threat to the data security. The Trojan usually have the function of delivering malicious code that attackers can use to spread backdoor programs, ransomware, mining Trojan horses, and so on, causing greater damage to victims. Take the double blackmail attack that appeared in recent years as an example: The attacker would steal the data before encrypting it, and then blackmail the victim from the risk of data leakage and the risk of data destruction in an attempt to gain more profits.

2.Recommendations for protection

It is suggested that enterprises and individuals take the following protective measures against commercial secret-stealing Trojan:

  1. Install terminal protection: Install anti-virus software, and it is recommended to install the Antiy IEP;
  2. Strengthen password strength: Avoid using weak passwords, recommend using 16-digit or longer passwords, including combinations of upper and lower case letters, numbers and symbols, and avoid using the same password for multiple servers;
  3. When receiving an email, confirm whether the sending source is reliable, and avoid opening the URL and attachment in the suspicious email;
  4. It is recommended to use the sandbox environment to execute the suspicious files, and then use the host to execute the files with security. Based on the combination of deep static analysis and dynamic loading of sandbox, the Antiy PTA can effectively detect, analyze and identify all kinds of known and unknown threats.
  5. Deployment of Intrusion Detection System (IDS): Deployment of traffic monitoring software or equipment to facilitate the discovery, tracing and tracing of malicious codes. Taking network traffic as the detection and analysis object, the Antiy PTD can accurately detect a mass of known malicious codes and network attack activities, and effectively detect suspicious behaviors, assets and various unknown threats on the network;
  6. Security service: In case of malware attack, it is recommended to isolate the attacked host in time, and protect the site and wait for the security engineer to check the computer; 7 * 24 service hotline of Antiy: 400-840-9234.

3.Typical commercial Trojan attack process

The attacker uses the topic that the user is interested in as the decoy, through the phishing mail, the phishing website, the public website and so on, launches the attack payload, induces the user to download. Most of the attack load is in the form of macro documents, Office vulnerabilities or malicious program compression packages. when the victim opens the documents and enables macro, when the Office software has corresponding vulnerabilities or inadvertently unzips and runs, the malicious program will execute. In general, a malicious program consist of an outer loader and an inn load of a secret Trojan, and that outer loader downloads and decrypts the load of the secret Trojan to provide it with the capability of defense, evasion and persistence. Finally, the internal secret Trojan horse steals the victim’s password credentials, privacy information, important documents, digital assets and other data back to the attacker.

Figure 3-1 Typical attack flow of commercial espionage Trojan 31

4.Analysis of the Current Situation of the Operation of Commercial Espionage Trojan

In recent years, with the increasing number of commercial secret-stealing Trojans, a complete chain of secret-stealing industrial chains has been formed, which mainly includes the production of commercial secret-stealing Trojans, sales, confusion, dissemination and profit-making. Even if the attacker does not have enough technical ability, he can also purchase the attack service of each attack stage in the stealthily industrial chain to realize the “one-stop” type complete attack. The attacker uses a variety of dissemination methods to launch commercial espionage Trojan on a large scale, stealing the data in the user host. The commercial espionage Trojan adopts the modularized load, the internal components are relatively independent, and the expandability is strong. it can be adjusted according to the change of the attack target, and the new function of secret theft is added, which will bring more threat to the data security. Commercial secret-stealing Trojan horses usually have the function of delivering malicious code that attackers can use to spread backdoor programs, ransomware, mining Trojan horses, and so on, causing greater damage to victims.

4.1 The division of labor in the industrial chain is clear, and the threshold for attack is continuously lowered

The roles of division of labor in the industrial chain of commercial secret-stealing Trojan horse mainly include the full-time stealer, the writer of secret-stealing Trojan horse, the seller of secret-stealing Trojan, the confusion service provider and the communication service provider. In the industrial chain, one person can take on multiple roles, and one role can also be undertaken by multiple people. On this basis, even if the attacker does not have relevant technical capability, he can also purchase the attack services of each attack stage in the industrial chain to realize a “one-stop” type of complete attack. The industrial chain diagram of commercial theft Trojan horse from the perspective of theft attacker is as follows.

Figure 4-1 Schematic diagram of industrial chain of commercial espionage Trojan  41

The creator of the Trojan is the producer of goods in the industrial chain by continuously focusing on the attack target, completing the design, development and testing of the secret Trojan horse program, and updating the secret Trojan program. The development of a secret-stealing Trojan passed to the seller for sales promotion. The seller of the Trojan publicizes Trojans through hacker forum, group and other channels, and completes Trojan pre-sale communication, transaction and after-sale support through anonymous channel.

The following is the page where the RedLine espionage Trojan is for sale on a hacker forum.

Figure 4-2 Page for Sale of RedLine  42

After the attacker buys the espionage Trojan, he can use the control panel to set the secret range, generate the self-defined Trojan, and view the return data.

Figure 4-3 C2 Control Panel of RedLine Trojan 43

The generated espionage Trojan programs usually require obfuscation/encryption processing to enhance their anti-detection capabilities. Many commercial espionage writers also offer obfuscation/encryption services, but purchasers can also choose other solutions on their own.

Figure 4-4 Charging obfuscation encryption service provided by RedLine Trojan writer 44

The attacker drops a secret Trojan horse, waiting for the information to be returned. The following is the control panel of the Agent Tesla Trojan horse, in which the statistical information of the victim is displayed and the function of exporting the information is provided.

Figure 4-5 Control Panel C2 of Agent Tesla Trojan45

Although the technology used by the Trojan has become more complex, it is less difficult for an attacker to launch an attack because of the encapsulation of its functions. The function of the malicious program is more universal, and the loader usually supports a variety of load deployment modes, It allows the attacker to configure the injection mode, self-start, download plug-in, and return mode through configuration files, web page panels and other methods, and self-generate customized attack loads.

4.2 Diversified modes of transmission

In addition to traditional methods such as sending phishing emails and building phishing websites, commercial secret-stealing Trojans have also added new communication channels: User-generated content (UGC). The public website of User-Generated Content disseminates in the guise of normal software.

4.2.1 Spread by phishing mail

The attacker uses the content that the user is interested in as bait, sends a large number of phishing emails with attachments such as macro documents, Office vulnerability utilization documents, and malicious program compression packages, and induces the user to execute malicious code. examples of phishing emails are as follows.

Figure 4-6 Example of Fishing Mail 46

4.2.2  Set up phishing website to spread

The attackers build phishing websites with the themes of pirated software and plug-in software, reduce the vigilance of users, induce them to close the security software on their own initiative, and deliver the attack payload through binding download or disguised download. In the report “Analysis of Espionage Samples Resulting from the Spread of Counterfeit and Pirated Software” [1], Antiy exposed the attacks spread by Vidar and other Trojan through phishing websites.[1]

Figure 4-7 A phishing website spreading commercial espionage Trojan 47

4.2.3  Use of public websites for dissemination

Attackers will also use UGC (User-Generated Content) public websites to spread as normal software, and Antiy has analyzed an attack that spread RedLine through video websites [2]. Such sites allow users to upload their own original content (e.g., videos, posts, etc.) to display to other users. Attackers upload a large number of content containing pirated software, operation tutorials, virtual currency, game cheating and other hot topics as bait to induce users to download and run malware.[2]

Figure 4-8 Example of Transmission through a Video Website 48

4.3 Fast updating of secret family, flexible iteration of component functions

The commercial espionage Trojan family quickly updates, adds new secret function, and carries on the adjustment according to the attack target’s change. For example, after the Chrome 80 version was updated, the encryption method used to store passwords was changed, causing old cryptographers to fail, and several popular commercial espionage Trojan to be updated in the short term to adapt to the change. The following is the updated information for the RedLine Trojan version.

Figure 4-9 RedLine Trojan Update Description 49

The commercial espionage Trojan tries to adopt the highly modular load, that is, the internal components are relatively independent, easy to update the iteration, and strong scalability. The Trojan writer can customize the function according to the intention of the buyer, and when upgrading the function of the component, there is no need to modify the Trojan horse itself greatly. The loader usually only has non-core functions such as collecting basic information and persisting, and focuses on strengthening the ability of defense and evasion, or evolving into a botnet with complex network structure, so as to ensure the continuous distribution and successful execution of subsequent components. Commonly used component functions include data stealing, intranet scanning, vulnerability attack, sending spam, intranet penetration and so on.

4.4 Bind and deliver more malware, and collude with each other to expand the interest chain

Commercial secret-stealing Trojans usually have the function of delivering malware, through which attackers can spread backdoor programs, ransomware, mining Trojans, and so on, causing greater losses to victims. Take the double blackmail attack that appeared in recent years as an example: The attacker would steal the data before encrypting it, and then blackmail the victim from the risk of data leakage and the risk of data destruction in an attempt to gain more profits.

5.The typical countermeasure technology of commercial espionage Trojan

In order to prevent core function codes and character strings from being detected by security software, espionage Trojan will adopt various countermeasures to hide its own characteristics and increase the probability of successful attack. The commonly used techniques include file -free technology, steganography, modified exception handling mechanism, and so on.

5.1 Use non-document technology to avoid detection

The code will be obfuscated by the Trojan, and use the loader to execute it indirectly. the load of each layer is not landed on the ground, but only loaded in the memory. the commonly used technique is as follows.

5.1.1 Encrypt the memory payload

The secret Trojan usually uses a complicated and confusing encryption and decryption algorithm to encrypt and store the attack payload in a resource segment of its own file or a remote server, and only acquires and decrypts the payload at run time, thus avoiding the load landing. Evading the Detection of Security Software. For example, the Vidar secret Trojan horse uses a loader to decrypt the payload in memory, and the decryption algorithm uses multiple shifts and XOR.

Figure 5-1 Decrypting PE Files 51

5.1.2 Multi-layer loads are used

Espionage Trojan uses multi-layer attack load to nest load, and each layer load in memory with different obfuscating means to avoid security software detection. For example, the Agent Tesla Trojan uses 4 layers of load [3], and the obfuscation means at each layer include load division, Base64 encoding, exclusive OR encryption, picture steganography, loading in memory, and injection execution. the execution flow is shown as follows:[3]

Figure 5-2 Agent Tesla Multi-tier Load Diagram 52

5.1.3  Hollowing out technology in use process

The espionage Trojan adopts process hollowing out technology, uses the API function of cross-process memory operation to replace the memory space of other normal process with malicious code, disguises itself as normal process to execute, and avoids the detection of security software.

Figure 5-3 Create a process and inject a load by a process hollowing out technique 53

5.2  Avoid detection using steganography

Steganography (the technology of information hiding) is used by the Trojan to hide the payload and configuration information in other information, or to store information in an unusual carrier. For example, the ReZer0 loader adopted by the Agent Tesla Trojan hides the attack load in PE format in the picture pixels, and the load is restored by analyzing the picture pixel data to avoid detection during running.

Figure 5-4 Hiding Load Using Steganography 54

5.3 Using Exception Handling Mechanism to Confronting Analysis

By registering custom exception handling functions, the secret Trojan horse disrupts the normal execution flow and destroys the debugger function, thus countering the analysis. For example, the Dridex Trojan registers VEH exception handling function, catches the exception triggered by int 3 instruction, and realizes the effect of indirectly calling API and anti-debugging.

Figure 5-5 Register the VEH function to capture an exception 5‑

6.Analysis and display of popular commercial espionage Trojan

6.1 Agent Tesla

The Agent Tesla Stealth Trojan was originally sold on its official website in 2014, with prices ranging from a few dollars to a few tens of dollars depending on the function users choose. The website claims to be selling “legitimate” keystroke logging tools, but the program contains all kinds of theft functions and uses more anti-analysis means. The website technical staff will also provide support for the illegal use of the software, after which the espionage Trojan is turned into a sale in the hacker forum.

Figure 6-1 The archived version of the Agent Tesla sales page from 2017 61

Agent Tesla’s control panel is written in PHP and protected by code to avoid being “pirated.”

Figure 6-2 Code Protection for Agent Tesla Control Panel 62

Data theft affects system data, browsers, e-mail, FTP, remote connection tools, VPN accounts, instant messaging software and server operation and maintenance tools, as shown in the table below:

Table 6-1 Scope of secret theft 6‑1

The supported return methods include email, FTP, HTTP and Tor anonymous network. the attacker can select any one of these methods and hard-code the relevant parameters into the sample to realize the return.

1. send back via the Tor Anonymous network

The espionage Trojan will automatically download the Tor client and carry out HTTP communication through the anonymous network, which makes the backhauling server more difficult to be traced back and destroyed, and increases the durability of the espionage Trojan.

Figure 6-3 Return over the Tor Anonymous Network 63

2. Return via email

Support email return via SMTP protocol.

Figure 6-4 Return via E-mail 64

3. Return via FTP

Upload files using hard-coded return addresses, user names and passwords.

Figure 6-5 Return via FTP 65

4. Return via HTTP

Group the data into a form and send it to the server.

Figure 6-6 Return via HTTP 66

6.2 Redline

Redline is a kind of espionage Trojan sold in hacker forums. The authors of it have posted messages on multiple forums, and offer buy-out or subscription-based options, traded through Telegram’s self-service robots. The Trojan was discovered in March 2020. although the Trojan horse has only appeared for nearly two years, it has powerful and perfect information stealing function and is one of the most popular Trojan families. For detailed analysis, see Antiy’s report “Analysis of the RedLine Spyware Malware Spread via Video Websites” [2].[2]

Connect to C2 to obtain configuration information, including country and region blacklist, IP blacklist, password-stealing function switch, and designated file collection rules.

Figure 6-7 Received Server Configuration Information 67

Network communication with C2 using the ChannelFactory class in the C # language.

Figure 6-8 Sample Network Communication Part Codes 68

6.3 Lokibot

The LokiBot secret Trojan horse is also known as Loki, LokiPWS, and is mainly spread through phishing emails. The LokiBot, which dates back to 2015, was sold by users called “lokistov” and “Carter” on a hacker forum for $400. The source code of the LokiBot server was leaked, and later there was a “pirated version” with a price of only $80 and a lot of modified configuration information, which indirectly led to the popularity of the LokiBot Trojan horse.

Construct an array of functions, each of which contains a stealthy function for a particular piece of software, and then execute the functions in turn.

Figure 6-9 Building a list of secret functions 69

The detailed scope of theft is shown in the table below:

Table 6-2 Scope of Secret Data2

BrowserBlack HawkChromeCyberfox 86Firefox
FlockIcedragonInternet ExplorerK-Meleon
Lunascape6OperaAle MoonQtweb
QupzillaSafariSeamonkeyWaterfox
Password manager1passwordEnpassKeepassMsecure
Roboform   
Remote management tools32bitftpAble FTPAlftpAutomize
BitkinexBlazeftpBvsshclientClassicftp
CyberduckDeluxe FTPEasyftpExpandrive
Far FTP PulginsFastream NETFileFilezillaFlashfxp
FlingFreshftpFtp NavigatorFtp Now
FtpboxFtpbetterFtpinfoFtpshell
FullsyncGoftpJasftpKitty
LinasftpMyftpNetdrive2Nexus File
NovaftpNppftpOdin Secure FTP ExpertSecurefx
SftpnetdriveSherrod FTPSmartftpStaff-FTP
SteedSuperputtySyncoveryTotal Commander
UltrafxpVncWcx _ ftpWinftp Client
WinscpWs _ FTPXftp 
E-mailCheckmailFossamailFoxmailGmail Notifier Pro
IncredimailMailboxMozilla ThunderbirdOpera Mail
OutlookPocomailPostboxSoftwaretz Mailing
TrojitáTrulymailYmail 
NotesMicrosoft StickyNoteflyNotezillaStickies
To-Do   
Others*. SpnFull Tilt PokerMikrotik WinnerPidgin
Poker StarsWinchips  

Further operation is performed according to the C2 instruction. Support functions include stealing data again, downloading and executing plug-ins, upgrading itself, and self-deleting.

Figure 6-10 Downloading and executing the plug-in 610

6.4  Formbook

Formbook is a very popular commercial theft Trojan that has been sold on hacking forums since 2016 as a MaaS (malware as a service) with versions constantly iteratively updated. Formbook is mainly used to steal personal information of the target, and can automatically collect sensitive information in the target system, with keylogger and screen capture functions. At the same time, it has the remote control ability and can control the target system for a long time.

Antiy has analyzed and reported the theft of FormBook Trojan by an organization [4].[4]

Circular search and hijacking the following list of the process, stealing process data, stealing content including keyboard record, account password and so on.

Table 6-3 List of target processes

Browser360browser.exeBrowser.exeCoolnovo.exeCyberfox.exeChrome.exe
Doobe.exeFirefox.exeUbrowser.exeYbrowser.exeOpera.exe
Safari.exeDeepnet.exeIcedragon .exeIridium .exeK-meleon. exe
Maxthon. exeMicrosoftedgecp.exeMidori.exeMustang.exeOrbitum.exe
Palemoon. exeQupzilla.exeSuperbird .exeVivaldi.exeWaterfox.exe
Mail clientFoxmail.exeGmailnotiferpro.exeIncmail.exeOperamail.exeOutlook.exe
Thunderbird.exe    
Instant messaging ClientWhatsapp.exeSkype.exeIcq.exePidgin.exeTrillian.exe
Yahoomessenger.exe    
Ftp client3dftp.exeAlftp.exeFilezilla.exeFlashfxp. exeNcftp.exe
Coreftp.exeScriptftp.exeLeechftp.exeSmartftp.exeWebdrive.exe
Winscp.exe    

Data packets are constructed and sent back through the HTTP protocol.

Figure 6-11 Construction of a Packet 611

Formbook supports accepting C2 instructions to implement further attacks. The function of instruction includes delivering module, upgrading, uninstalling, executing command, searching information, etc.

Figure 6-12 Executing C2 Commands 612

The detailed instruction functions are shown in the table below:

Table 6-4 Instruction function table 6‑3

InstructionsSpecific roles
1Decrypt PE file under% Temp%, call ShellExecuteA ()
2Updates the FormBook in the target system
3Unloads the FormBook in the target system
4Call ShellExecuteA () to execute the delivered command that decrypts from the packet
5Delete the files. sqlite and Cookies and search the three main user data paths
6Restart the target system
7Shut down the target system
8Add the FormBook self- startup item and send all the stolen data to the C2 server
9Decrypt the zip file from the data identified from the beginning of the packet to the end of the string, and save it to% Temp% with a random string, and extract it to the same folder.

6.5 Vidar

Vidar, which was first discovered in December 2018, is sold primarily through hacking forums and anonymous messaging software, with long-range prices ranging from $130 to $750. There are strong homology between Arkei and Arkei, the whole structure and the core code of communication protocol are basically the same, so it is presumed that Vidal is an updated version or a branch version of Arkei.

According to the C2 instruction, the main functions of the instruction are as shown in the figure below:

Figure 6-13 Steal according to C2 instruction 613

The stolen data is packed into zip format and sent to C2 via the HTTP protocol.

Figure 6-14 Packet data into zip format for sending 614

6.6 Raccoon

The Raccoon espionage Trojan was first discovered in 2019. In comparison with other secret-stealing Trojan, Raccoon only has that function of secret-stealing, and lack the defense and evasion ability of anti-sandbox, anti-virtual machine, etc. Therefore, the Raccoon development team has suggested in the forum that users should use third-party loaders or obfuscators to protect malicious code.

Obtain basic system information such as computer hardware.

Figure 6-15 System Information 615

Detect the browser installed in the system, and download sqlite3.dll for stealing browser cookies, saved passwords and other information.

Figure 6-16 Partial Target Browser 616

Obtain the mail address and account credentials in the mail client.

Figure 6-17 Stealing Information Related to Email Client 617

The collected data is compressed as a zip file and sent back to the C2 server, and finally the cmd instruction is used for self-deletion.

6.7 Azorult

Trojan Azorult was first discovered in July 2016 and has been upgraded several times so far. The Trojan steals account credentials, passwords and digital currency saved by the browser and sends them to the C2 server automatically. at the same time, it also has the function of loading other malicious codes.

Part of the scope of theft is as follows.

Table 6-5 Targets of the espionage 4

SystemSerial NumberProduct nameUser nameComputer name
Display screen resolutionRegional informationTime zone informationCpu
RamScreen Shot  
Crypto-currency clientElectrumElectrum-LTCEthereumExodus
MultibithdMoneroBitcoinJaxx
E-mail clientOutlook   
Other commonly used softwareSkypeTelegramSteamWinscp

Download the subsequent payload under% Temp% or% ProgramFiles%, check whether the file extension is exe, run with CreateProcessW if yes, run with ShellExcuteW if not.

Figure 6-18 Loading Other Malware 618

6.8  Pony

Trojan Pony, also known as Fareit, Siplog, was first discovered in 2011 and was able to steal information from victim hosts and load other malware. The Trojan supports a variety of customized functions to meet the needs of different buyers.

The scope of theft includes system information, FTP tools, browsers, email clients, cryptocurrency clients and other common software.

Table 6-6 Targets of the espionage  5

System informationOperating system versionCountry / RegionLanguageAuthority
Machine model   
Ftp toolFar ManagerCuteftp 6 / 7 / 8 / 9 / pro / liteFlashfxp 3 / 4Filezilla
BpftpSmartftpTurboftpFfftp
Coffeecup SoftwareCoreftpFtp ExplorerVandyke
UltrafxpFtprushWs _ FTPWebsitepublisher
ExpandriveClassicftpFlingLeapftp
Softx FTP32bitftpFtpvoyagerWinftp
FtpbetterAlftpDeluxe FTPFreshftp
BlazeftpGoftp3d-FTPEasyftp
Ftp NowRobo – FTP 3.7LinasftpCyberduck
PuttyFtpshellFtpinfoFtp Browser
My FTPNovaftpWindows CommanderTotal Commander
Ftp CommanderFtp NavigatorFtp ControlWiseftp
LeechftpFireftpSftpFtp Disk
BrowserOperaFirefoxSeamonkeyFlock
IeYandexChrome 
Mail clientWindows Live MailRimarts MailboxIncredimailBatmail
OutlookThunderbirdPocomail 
CryptocurrencyBitcoinElectrumMultibitLitecoin
NamecoinTerracoinArmoryCraftcoin
PpcoinPrimecoinFeathercoinNovacoin
FrecoinDevcoinFrankoProtoshare
MegacoinQuarkcoinWorldcoinInfinitecoin
IxcoinAnoncoinBbqcoinDigitalcoin
MincoinGoldcoinYacoinZetacoin
FastcoinI0coinTagcoinBytecoin
FlorincoinPhoenixcoinLuckycoinJunkcoin
OthersNotepad + +Nexus FileDirectory Opus 

The Trojan can perform advanced setting and parameter setting in the generator.

Table 6-7 Advanced Settings6

OptionsDescription
CompressionCompress the executable file and reduce the size of the program
EncryptionThe return data is encrypted using the RC4 algorithm
Encryption passwordSet the encryption password of RC4 algorithm
Debug modeFor commissioning
Only new reports are sentReturn data without repetition
From DeleteSelf-deletion is carried out after the theft is completed
Add an iconSet the icon for the program
Upx packageUse UPX to compress programs
Number of reports attempted to be sentSets the number of attempts made when a backpass fails
Build optionsChoose to build the Trojan horse as an EXE file or a DLL file

The parameter list supported by secret Trojan is as follows.

Table 6-8 Parameter List 7

ParametersDescription
-PACK_REPORTThe return data is compressed
-ENCRYPT_REPORTEncrypted reporting
-REPORT_PASSWORDEncrypted password, MesoAmerica by default
-SAVE_REPORTSave return data to disk (for debugging purposes)
-ENABLE_DEBUG_ONLYDebug mode
-SEND_MODIFIED_ONLYOnly the new data is returned
-SELF_DELETEEnable self-delete
-SEND_EMPTY_REPORTSReturn blank data
-ADD_ICONAdd an icon
-UPXPackaging with UPX
-DOMAIN_LISTList of domains
-LOADER_EXECUTE_NEW_FILES_ONLYThe same file is run only once
-DISABLE_MODULEDelete the specified theft module
-DLL_MODEBorn as a DLL file
-COLLECT_HTTPAdditional HTTP / HTTPS collection
-COLLECT_EMAILAdditional collection of email information
-UPLOAD_RETRIES=NThe number of times the data is returned, the default value is 2
-DISABLE_GRABBERDisable the theft function and only use it to load other programs

7.Horizontal contrast of popular espionage Trojan

For the above espionage Trojan families, the characteristics are summarized and compared according to the activity cycle of “prepare → sell → spread → steal → return,” as shown in the table below:

Table 7-1 Horizontal comparison of popular commercial secret-stealing Trojans (★ indicating that it has corresponding functions) 1

The espionage Trojan familyAgent TeslaRedlineLokibotFormbookVidarRaccoonAzorultPony
The earliest discovery timeJan-142020May 2015February 2016Dec-18February 2019Jul-16Jan-11
Coding languageC #C #C / C + +C / C + +C / C + +C / C + +DelphiCompilation
Secret Trojan horse salePromotion channelsSelf-built website, hacker forum, social platformHacker forums, social platformsHacker ForumHacker ForumHacker ForumHacker ForumHacker ForumHacker Forum
Selling price (USD)10 -120150-90050-40020-30080-40075 – 20020-35015-300
Scope of theftBasic information
Keylogger    
Screen capture 
Clipboard      
Browser
Password management   
Two-step verification       
Digital currency 
E-mail  
Ftp   
Vpn      
Game platform     
Document collection     
Remote connection      
Note-taking software      
Social software    
Return modeHttp 
Tcp       
Ftp       
Smtp      
Tor       

8.The Mapping Graph of ATT&CK Technology Features

The main technical characteristics involved in commercial espionage Trojan attack correspond to ATT&CK mapping graph as follows.

Figure 8-1 Mapping graph of technical features against ATT&CK 81

Specific ATT&CK technical behavior description table is as follows.

Table 8-1 ATT&CK Technical Behavior Description Table

ATT&CK stages / categoriesSpecific behaviorNotes
InvestigationGathering information from non-public sourcesCollect victim information from hacker forums
Resource developmentAccess to infrastructureGets the server infrastructure
Resource developmentIntrusion into infrastructureHacking into other web sites as an attacking resource
Resource developmentCapacity acquisitionDevelop and maintain malicious code
Resource developmentEnvironmental preparationDeploy the attack program on the attack facility
Initial accessPhishingThrough phishing emails, phishing websites induce victims to execute
ExecutionImplement by exploit host computer software vulnerabilityExploit vulnerabilities to execute
ExecutionInducing the user to executeInducing the user to execute
PersistenceUse automatic startup to perform booting or loggingSet the self-startup item
PersistenceUtilization of planned tasks / jobsSet scheduled tasks
Defensive evasionManipulating the access tokenManipulating permission tokens for other processes
Defensive evasionAnti-obfuscate / decode files or informationDecrypting the obfuscated payload, configuration information, etc
Defensive evasionConcealmentHidden and execute in that background
Defensive evasionExecute orders indirectlyExecute commands through powershell, etc
Defensive evasionModify the registryChange the system security settings by modifying the registry
Defensive evasionConfusion of documents or informationConfusion of load and configuration information
Defensive evasionProcess injectionInject into the system process
Defensive evasionVirtualization / Sandbox EscapeDetect the virtual machine / sandbox and change the behavior accordingly
Defensive evasionLoad with reflected codeLoad the decrypted payload using C # reflection mechanism
Credential AccessObtain credentials from the location where the password is storedObtain passwords from browsers, password management, etc
Credential AccessEnter captureCapture the keylogger
Credential AccessStealing an application access tokenGets the access token for the client software
Credential AccessStealing Web Session CookieStealing Cookie from Browser
FindingsFind files and directoriesFinding documents to be collected
FindingsDiscovery ProcessList of Discover System Processes
FindingsDiscovery SoftwareList of system software found
FindingsDiscovery of system informationIdentify the basic information of the system
FindingsDiscover the geographical location of the systemFind the system geographical location, language area and other information
FindingsDiscover the system owner / userDiscovery system user name
FindingsDiscovery of system servicesDiscovery of system services
FindingsVirtualization / Sandbox EscapeDetect a virtualized / sandbox environment
CollectionAutomatic collectionAutomatically collect the information you need
CollectionCollect clipboard dataCollect clipboard data
CollectionTemporary storage of dataCollect data to a temporary path
CollectionCollect e-mailCollect e-mail
CollectionEnter captureCapture the keylogger
CollectionGet a screenshotGet a screenshot
CollectionCapture videoCapture camera video
Command and controlThe application layer protocol is usedUse protocols such as HTTP, SMTP, etc
Command and controlEncoded dataEncode the traffic data
Command and controlConfusion of dataConfusion of flow data
Command and controlUse an encrypted channelUse SSL to encrypt traffic
Command and controlUse the alternate channelConfigure the alternate C2 address
Command and controlStandard non-application layer protocols are usedCommunicate directly using the TCP protocol
Command and controlTake advantage of legitimate Web servicesUse of public platforms
Data seeps outAutomatically seeps out dataAutomatically return the collected information
Data seeps outLimit the size of the transmitted dataLimit the size of the transmitted data
Data seeps outUse non-c2 protocol to send backA different channel is used for backhauling than the c2 communication
Data seeps outThe C2 channel is used for backtransmissionThe same channel back-up is used as the c2 communication
Data seeps outUsing Web Services to BackpassUsing an exposed Web service backpass

9.Summary

By tracing the attack process of commercial espionage Trojan, it is found that the current attackers use a number of transmission methods such as phishing email, phishing website and public website to invade the victim’s host. Collect important data of the target system (including but not limited to password credentials, privacy information, important files and digital assets) after successful invasion and send them back to the attacker. To bring users privacy leakage, economic losses and other serious consequences. Meanwhile, more malware such as backdoor programs, ransomware, and mining Trojans were bundled and distributed in an attempt to gain more revenue.

Through exploring the operation mode of the commercial espionage Trojan, we found that the Trojan has formed a complete chain of secret stealing. The theft attacker can purchase the services of each attack stage in the industrial chain to realize a “one-stop” type of complete attack, which lowers the attack threshold. And the commercial espionage Trojan uses the modularized load, can adjust according to the change of attack target, use the new countermeasure technology and add the new secret function. In that environment of market competition, the Trojan will accelerate the update iteration and bring more challenge to the security protection of the user end.

In this context, security products need to be constantly updated, iterative, enhanced product security capabilities, can help users from the infringement of commercial espionage Trojan. Antiy CERT has always paid attention to the technical changes and characteristics of commercial espionage Trojan, and put forward corresponding solutions. Not only provides basic functions such as virus detection and killing and active defense, but also provides enhanced capabilities such as terminal control and network control, which can effectively defend against such threats and protect user data security.

Appendix I: Reference

[1] Analysis on the Steal Samples of the Spreading of Forged Pirate Software

https://www.antiy.cn/research/notice&report/research_report/20210628.html

[2] Red Line Trojan Horse Analysis Spreading Through Video Websites

https://www.antiy.cn/research/notice&report/research_report/20211125.html

[3] Analysis of the New Type of Agent Tesla of the Commercial Steal Trojan Horse

https://www.antiy.cn/research/notice&report/research_report/20210812.html

[4] Analysis Report on a Unit Affected by FormBook Scrambling Trojan

https://www.antiy.cn/research/notice&report/research_report/20211021.html

Appendix II: About Antiy

Antiy is committed to enhancing the network security defense capabilities of its customers and effectively responding to security threats. Through more than 20 years of independent research and development, Antiy has developed technological leadership in areas such as threat detection engines, advanced threat countermeasures, and large-scale threat automation analysis.

Antiy has developed IEP (Intelligent Endpoint Protection System) security product family for PC, server and other system environments, as well as UWP (Unified Workload Protect) security products for cloud hosts, container and other system environments, providing system security capabilities including endpoint antivirus, endpoint protection (EPP), endpoint detection and response (EDR), and Cloud Workload Protection Platform (CWPP) , etc. Antiy has established a closed-loop product system of threat countermeasures based on its threat intelligence and threat detection capabilities, achieving perception, retardation, blocking and presentation of the advanced threats through products such as the Persistent Threat Detection System (PTD), Persistent Threat Analysis System (PTA), Attack Capture System (ACS), and TDS. For web and business security scenarios, Antiy has launched the PTF Next-generation Web Application and API Protection System (WAAP) and SCS Code Security Detection System to help customers shift their security capabilities to the left in the DevOps process. At the same time, it has developed four major kinds of security service: network attack and defense logic deduction, in-depth threat hunting, security threat inspection, and regular security operations. Through the Threat Confrontation Operation Platform (XDR), multiple security products and services are integrated to effectively support the upgrade of comprehensive threat confrontation capabilities.

Antiy provides comprehensive security solutions for clients with high security requirements, including network and information authorities, military forces, ministries, confidential industries, and critical information infrastructure. Antiy has participated in the security work of major national political and social events since 2005 and has won honors such as the Outstanding Contribution Award and Advanced Security Group. Since 2015, Antiy’s products and services have provided security support for major spaceflight missions including manned spaceflight, lunar exploration, and space station docking, as well as significant missions such as the maiden flight of large aircraft, escort of main force ships, and Antarctic scientific research. We have received several thank-you letters from relevant departments.

Antiy is a core enabler of the global fundamental security supply chain. Nearly a hundred of the world’s leading security and IT enterprises have chosen Antiy as their partner of detection capability. At present, Antiy’s threat detection engine provides security detection capabilities for over 1.3 million network devices and over 3 billion smart terminal devices worldwide, which has become a “national-level” engine. As of now, Antiy has filed 1,877 patents in the field of cybersecurity and obtained 936 patents. It has been awarded the title of National Intellectual Property Advantage Enterprise and the 17th (2015) China Patent Excellence Award.

Antiy is an important enterprise node in China emergency response system and has provided early warning and comprehensive emergency response in major security threats and virus outbreaks such as “Code Red”, “Dvldr”, “Heartbleed”, “Bash Shellcode” and “WannaCry”. Antiy conducts continuous monitoring and in-depth analysis against dozens of advanced cyberspce threat actors (APT groups) such as “Equation”, “White Elephant”, “Lotus” and “Greenspot” and their attack actions, assisting customers to form effective protection when the enemy situation is accurately predicted.