CRIL has recently uncovered a sophisticated phishing campaign that specifically targets cryptocurrency users, with a notable emphasis on users of the Exodus platform. In this intricate scheme, threat actors (TAs) have employed a deceptive website meticulously designed to mimic legitimate cryptocurrency applications.
The deceptive site, resembling the interface of the Exodus crypto wallet, aims to lure unsuspecting users into divulging their sensitive information. Exodus offers users the ability to manage their cryptocurrency holdings and conduct transactions. Available as both a desktop application and a mobile app.
The image below shows the deceptive phishing site, mimicking the authentic application interface.
Figure 1 – Phishing site
Once unsuspecting users are lured into downloading the software disguised as genuine Exodus installers from the phishing site, they inadvertently install a Remote Access Trojan known as FatalRAT. Additionally, this installer also deploys other malicious components, such as Clipper and Keylogger, marking a new development compared to previous campaigns.
The TAs have executed a multi-staged attack incorporating multiple components packaged within a single installer file, culminating in the installation of the FatalRAT malware, a clipper, and a keylogger. Notably, the TAs have employed DLL side-loading techniques as part of their strategy to evade detection, a method that has been observed in previous campaigns as well. The image below shows the infection chain observed in the current campaign.
Figure 2 – Infection chain
Upon installation on a victim’s system, the Trojanized Exodus crypto-wallet installer application grants the attackers unauthorized access and control, enabling them to steal sensitive information from web browsers, capturing keystrokes, data manipulation—particularly concerning wallet addresses in the clipboard—and other malicious activities, all concealed from users in the background.
This operation is further enhanced by launching the Exodus installation in the foreground, tactically employing it as a diversion to mislead and distract users, as illustrated in the accompanying figure.
Figure 3 – Displaying the Exodus application in the victim’s machine
Upon execution of the downloaded malicious installer (.msi), it drops numerous files into two distinct directories within the C:\ProgramData folder, named MoCo and Mo. The image below displays all the files along with their respective folder names.
Figure 4 – Extracted files from the installer
All files listed are components of a multi-staged attack primarily utilizing the DLL side-loading method to execute the final payloads aimed at evading detection by security software. The attack chain unfolds as follows:
Figure 5 – Malicious files used for DLL Sideloading
Figure 6 – Loader file containing the Shellcode filenames
Similarly, other components such as Clipper and Keylogger are also observed being loaded into memory using similar methods.
FatalRAT is a Remote Access Trojan endowed with a broad spectrum of capabilities, allowing remote execution by an attacker. Initially detected in August 2021, the FatalRAT malware possesses capabilities including keystroke logging, screen resolution manipulation, downloading and executing files, as well as stealing data stored within web browsers.
Before commencing its infiltration procedures, the malware meticulously conducts a series of evaluations. These checks encompass assessments for virtual machine environments, processor types, and active processes, among other factors. Once successfully passing these checks, FatalRAT proceeds to decrypt configuration strings containing the Command and Control (C&C) server address as shown in the image below. Subsequently, any pilfered information is swiftly transmitted to the designated C&C server.
Figure 7 – FatalRAT Configuration strings
Based on our analysis, we’ve concluded that the version of FatalRAT employed in this campaign closely resembles the variant previously identified by AT&T and ESET. In this analysis, we will dive deeper into the Clipper and the keylogger modules.
When thelp.exe is executed, it concurrently initiates the execution of the “BMi.jpg” file directly into memory through the utilization of the DLL “mt.dll.”
The file “BMi.jpg” contains a shellcode along with an embedded DLL (like FatalRAT), which is identified as Clipper. This shellcode is designed to load and execute the embedded DLL in memory by invoking DllEntryPoint(), as shown in the figure below.
Figure 8 – Shellcode content with Clipper DLL
After the Clipper content is executed in memory, it utilizes API functions associated with the Windows Clipboard, as depicted in the figure below, to carry out its Clipper activities.
Figure 9 – Clipper functions
The table below shows the details of targeted cryptocurrencies and their regular expressions.
Crypto currencies | Regular Expression | TAs Crypto wallet address |
BTC (Bitcoin) | ^(1|3|bc1|tb1)[a-zA-Z0-9]{25,61}$ | 3CRsnPAe1NkhMDaxYNvm61s8DKh79WrwDL |
ETH (Ethereum) | ^0x[a-fA-F0-9]{40}$ | 0x5C4b06FcfA8c3417E6F6248c32101a8Abd7936eE |
The aforementioned Clipper malware performs the following activities:
The figure below shows the code snippet used to perform the malicious Clipper activity.
Figure 10 – Code snippet of Clipper’s functionalities
The figure below illustrates the presence of Clipper malware strings within the memory of the “thelp.exe” file.
Figure 11 – Presence of Clipper strings in the memory of thelp.exe
In this campaign, we have observed that TAs have placed the keylogger module in an additional directory (C:\ProgramData\Mo) intended to log all keystrokes and system events. Although the FatalRAT malware already encompasses the keylogging function, this module operates independently without requiring direct intervention from the attacker.
Upon execution of the Trys.exe file, it employs DLL sideloading to dynamically load the “ty.dll” file. Subsequently, this action starts the execution of the “M.jpg” shellcode, which in turn executes the embedded Keylogger module within the memory, as shown below.
Figure 12 – Presence of M.JPG shellcode filename in ty.dll
The following figure illustrates the presence of keylogger module strings within the memory of the “Trys.exe” process.
Figure 13 – Presence of Keylogger strings in the memory of Trys.exe
Prior to initiating the keylogger functions, the malware attempts to identify virtual environments by checking VMware-related processes, paths, and other indicators. If such a virtual environment is detected, the code exits without executing further actions, as shown in the figure below.
Figure 14 – Anti-Vm methods
After that, the malware proceeds to capture keystrokes and system events on the victim’s system. It then saves this information with the filename “sys.key” in the %programdata% folder. The following image depicts the data recorded by the keylogger malware.
Figure 15 – Saved Keylogger file
Within the keylogger, the remote server’s name is encoded in reverse, as shown in the figure below. During runtime, it retrieves the exact domain name from the reversed string and establishes a connection to it for data exfiltration.
Figure 16 – Hardcoded server name in reverse order
It’s plausible that the group responsible for the previous campaign may be behind this recent attack. This speculation is based on similarities such as the infection chain, file names, and an error observed in the scheduled tasks created. Additionally, the targeting of Chinese individuals, evident Chinese language versions of software used, and the C&C server pattern look similar.
The increasing popularity of cryptocurrency has attracted the interest of this group, leading them to transition from creating fake websites mimicking popular applications to targeting crypto users directly. Given the behavior of this campaign, we can safely conclude that the primary targets of this campaign are cryptocurrency users.
With the incorporation of a potent blend of the RAT (Remote Access Trojan) and a dedicated clipper module, the attackers can seamlessly extract sensitive information from their victims. Clipper malware poses a notable danger to individuals engaged in cryptocurrency activities, as it specifically focuses on intercepting their transactions and redirecting funds to the wallets of TAs. In light of these threats, crypto users must remain vigilant and proactive against such attacks.
Tactic | Technique ID | Technique Name |
Initial Access (TA0027) | Phishing (T1660) | Malware distribution via phishing site |
Execution (TA0002) | User Execution (T1204) | The user needs to manually execute the file downloaded from the phishing site. |
Defense Evasion (TA0005) | Masquerading (T1036.008) | Downloads file disguised as a legitimate application. |
Defense Evasion (TA0005) | Hijack Execution Flow: DLL Side-Loading (T1574.002) | Malware uses DLL sideloading for payload execution |
Defense Evasion (TA0005) | Disable or Modify Tools (T1562.001) | Uses taskkill to terminate processes |
Collection (TA0009) | Clipboard Data (T1115) | Monitors clipboard data and replaces crypto addresses with their address. |
Exfiltration (TA0036) | Exfiltration Over C2 Channel (T1646) | Sending exfiltrated data over C&C server |
Impact (TA0040) | Financial Theft (T1657) | Swaps crypto address to transfer funds to TA’s crypto address. |
Indicators | Indicator Type | Description |
hxxps://exodue[.]com | URL | Phishing Site |
f80f8a725028bcc09639f7b1ff9439436d974f0bf92871048092eaec5d7458f0 | SHA256 | Downloaded malicious installer |
d56471adbfd095d1be1d4b8288d14283efbf6414912064a97423751a69c1427f | SHA256 | BMi.jpg (Clipper) |
715138e6cb30bd18cc6afad6322e35f6f1a3d40ac135a1a9bc76cb884508c686 | SHA256 | M.jpg (Keylogger) |
8b0fde6e42ba17b0b475bb8dd54b8554cc6682d81b9e632f8890daa9ceefd48d | SHA256 | Mi.jpg (FatalRAT) |
a5ca7b8af70d6e483007c6c9c60b0a2002e150b0f479744989fdd58ad2fc62d3 | SHA256 | malicious installer |
03e8610b95753eee43179b1ccc3fb72c8595a7d76e9b0290ea765f8e6372d4f9 | SHA256 | malicious installer |
0555ba582ffdb07a3e93a4d936d2d0d2bd506040f12e5b55e042e82d4bc169ad | SHA256 | malicious installer |
fba1b353b063a068bd8a191ce699d335158028a6c94282a27f86b784cd4e94e5 | SHA256 | malicious installer |
b3c47e48facfb1d6e4f93b1e9b91c1a931f5e491c5ab4aa0fc5c10ed077674b4 | SHA256 | malicious installer |
149271557eec7f5b17cd046d1f9936dca1654be1edd7835f005fbba145d65b8c | SHA256 | malicious installer |
1b6ab4d69332a041109c9a8b7bc1d12dd28566a0614363f7887d9044e4345a2e | SHA256 | malicious installer |
e1368e893c44b29acfe7e9e190bbe448deda18d1847ed697b01c17a373207053 | SHA256 | malicious installer |
efc27a42e520918f83b041f81975e8dbca9916d159dfc41380112c20b43bcd39 | SHA256 | malicious installer |
c03a524b4e0561141012a6dc17f09bc8d0bf772cf2c94731971a50d67dccb2f4 | SHA256 | malicious installer |
47835bbb98d4660ffa225000797e22c3cfd48ae43af8ccf0999a760b8c3a92ba | SHA256 | malicious installer |
1-27[.]qq-weixin[.]org | Domain | C&C |
38[.]181[.]70[.]178 | IP | C&C |
1-31.qq-weixin[.]org | Domain | Sibling Domains |
1-8.qq-weixin[.]org | Domain | Sibling domains |
rule FatalRAT
{
meta:
author = “Cyble Research and Intelligence Labs”
description = “Detects FatalRAT dll files”
date = “2024-04-10”
os = “Windows”
hash = “69cbdb401d6c03f3d64b3bf48d527cb4bf507952f34b170a3d020707fc4ff7be”
strings:
$a1 = “SVP7” ascii nocase
$a2 = “SVP7-Thread running” ascii nocase
$a3 = “DisableLockWorkstation” ascii nocase
condition:
uint16(0) == 0x5a4d and all of them
}