{"id":85501,"date":"2018-01-16T10:39:15","date_gmt":"2018-01-16T05:09:15","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=85501"},"modified":"2018-01-30T12:33:03","modified_gmt":"2018-01-30T07:03:03","slug":"quick-heal-thwarts-attempts-java-jrat-phishing-campaign-targeting-international-embassy-india","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/quick-heal-thwarts-attempts-java-jrat-phishing-campaign-targeting-international-embassy-india\/","title":{"rendered":"Quick Heal thwarts attempts of a JAVA jRAT phishing campaign targeting an international embassy in India"},"content":{"rendered":"<p>Earlier\u00a0we had blogged\u00a0about how JAVA based <a href=\"https:\/\/blogs.quickheal.com\/evolution-jrat-java-malware-analysis-quick-heal-security-labs\/\">jRAT<\/a>\u00a0malware were evolved in\u00a0the\u00a0recent times. At Quick Heal Security Labs, we are actively observing jRAT campaigns happening\u00a0in the wild. These JAVA malware\u00a0spread through phishing campaigns. While analyzing one such phishing campaign, we found that\u00a0an\u00a0International embassy in India\u00a0was\u00a0being\u00a0targeted\u00a0by\u00a0phishers.<\/p>\n<p>The malware used\u00a0in\u00a0the\u00a0phishing\u00a0campaign\u00a0was\u00a0the\u00a0infamous JAVA malware called jRAT.\u00a0 Phishers sent phishing emails\u00a0to\u00a0the official\u00a0email address of\u00a0the targeted embassy.<\/p>\n<p>This is how\u00a0the phishing email\u00a0looks like.<\/p>\n<figure id=\"attachment_85502\" aria-describedby=\"caption-attachment-85502\" style=\"width: 628px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85502 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/Fig1.png\" alt=\"Fig 1. Phishing email sent to the targeted embassy \" width=\"628\" height=\"597\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig1.png 628w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig1-300x285.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig1-410x390.png 410w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><figcaption id=\"caption-attachment-85502\" class=\"wp-caption-text\"><strong>Fig 1. Phishing email sent to the targeted embassy <\/strong><\/figcaption><\/figure>\n<p>As shown in the figure above, a fake shipment notification by\u00a0DHL is sent to\u00a0the targeted email address. This\u00a0is an example of a classic\u00a0phishing email\u00a0scam.\u00a0The overall content of the email looks neat and attractive\u00a0enough to trick the user into\u00a0opening\u00a0the attachment in order to know more about this shipment notification. The email attachment &#8220;<i>ORIGINAL SHIPPING\u00a0<\/i><i>DOCUMENT.zip<\/i>&#8221;\u00a0is a ZIP archive file containing\u00a0a\u00a0&#8220;<i>ORIGINAL SHIPPING DOCUMENT.jar<\/i>&#8221; file.\u00a0It\u2019s unusual\u00a0for\u00a0a shipment notification to have &#8220;<a href=\"https:\/\/en.wikipedia.org\/wiki\/JAR_(file_format)\">.jar<\/a>&#8221; file as an\u00a0attachment. Once the user double clicks on this jar file,\u00a0the malware is executed. Nowadays,\u00a0many applications require\u00a0JAVA\/JRE for their execution. So,\u00a0the chances of having\u00a0a\u00a0JAVA\/JRE installed on\u00a0the\u00a0end user systems are\u00a0extremely\u00a0high. This increases every possibility of the execution of\u00a0the Java-based malware on\u00a0the targeted system.<\/p>\n<p><b>Quick Heal detection<\/b><\/p>\n<p>This particular phishing attempt\u00a0carried out on the targeted embassy was successfully blocked by Quick Heal products with its JAVA detection &#8220;JAR.Suspicious.A&#8221;.<\/p>\n<p><b>Infection Chain<\/b><\/p>\n<p>A\u00a0typical infection chain found\u00a0in\u00a0this\u00a0JRAT phishing campaign\u00a0is as follows.<\/p>\n<figure id=\"attachment_85503\" aria-describedby=\"caption-attachment-85503\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85503 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/Fig2-650x363.png\" alt=\"Fig 2. Infection Chain - jRAT phishing campaign \" width=\"650\" height=\"363\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig2-650x363.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig2-300x168.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig2-768x429.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig2-789x441.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig2.png 872w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85503\" class=\"wp-caption-text\"><strong>Fig 2. Infection Chain &#8211; jRAT phishing campaign<\/strong><\/figcaption><\/figure>\n<p><b>Technical details<\/b><\/p>\n<p>As depicted in\u00a0fig 2, upon execution of\u00a0the\u00a0&#8216;Parent JAR&#8217; malware,\u00a0it drops 2 VB script files and jRAT malware at &#8216;%Temp%&#8217; location which are embedded\u00a0in\u00a0it. These VB scripts are responsible for identifying different antivirus products as well as firewall products installed\u00a0on a\u00a0system. It also checks for &#8216;Win32_PnpSignedDriver&#8217; pipe which is required\u00a0to identify\u00a0a virtual environment. And if this pipe\u00a0is\u00a0found to be open,\u00a0then\u00a0the malware\u00a0will stop its activity.<\/p>\n<p>Below are the images of VBS files.<\/p>\n<figure id=\"attachment_85504\" aria-describedby=\"caption-attachment-85504\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85504\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/Fig3-650x125.png\" alt=\"Fig 3. VBS file to identify installed antivirus products.\" width=\"650\" height=\"125\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig3-650x125.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig3-300x58.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig3-768x148.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig3-789x152.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig3.png 1191w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85504\" class=\"wp-caption-text\"><strong>Fig 3. VBS file to identify installed antivirus products.<\/strong><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_85505\" aria-describedby=\"caption-attachment-85505\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85505\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/Fig4-650x130.png\" alt=\"Fig 4. VBS file to identify installed firewall products.\" width=\"650\" height=\"130\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig4-650x130.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig4-300x60.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig4-768x154.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig4-789x158.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig4.png 1009w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85505\" class=\"wp-caption-text\"><strong>Fig 4. VBS file to identify installed firewall products.<\/strong><\/figcaption><\/figure>\n<p><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">The dropped JRAT file\u00a0<\/span><\/span><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">is\u00a0<\/span><\/span><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">connected to\u00a0<\/span><\/span><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">a\u00a0<\/span><\/span><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">CNC domain &#8216;<\/span><\/span><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">vvrhhhnaijyj6s2m.onion[.]top<\/span><\/span><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">&#8216;.\u00a0<\/span><\/span><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">This CNC domain is hosted on 46.246.120.179.<\/span><\/span><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">\u00a0<\/span><\/span><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">The reputation of\u00a0<\/span><\/span><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">this\u00a0<\/span><\/span><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">domain and\u00a0<\/span><\/span><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">the IP is malicious according to\u00a0<\/span><\/span><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">online scanners. The communication happens over\u00a0<\/span><\/span><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">an\u00a0<\/span><\/span><span class=\"TextRun SCXW50257392\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW50257392\">SSL channel.\u00a0<\/span><\/span><span class=\"EOP SCXW50257392\">\u00a0<\/span><\/p>\n<figure id=\"attachment_85506\" aria-describedby=\"caption-attachment-85506\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85506\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/Fig5-650x84.png\" alt=\"Fig 5. Connection with a CNC domain\" width=\"650\" height=\"84\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig5-650x84.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig5-300x39.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig5-768x99.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig5-789x102.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig5.png 1305w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85506\" class=\"wp-caption-text\"><strong>Fig 5. Connection with a CNC domain<\/strong><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_85507\" aria-describedby=\"caption-attachment-85507\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85507\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/Fig6-650x178.png\" alt=\"Fig 6. Decoded SSL certificate.\" width=\"650\" height=\"178\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig6-650x178.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig6-300x82.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig6-768x210.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig6-789x216.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig6-304x84.png 304w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Fig6.png 1303w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85507\" class=\"wp-caption-text\"><strong>Fig 6. Decoded SSL certificate.<\/strong><\/figcaption><\/figure>\n<p>At the time of\u00a0our\u00a0analysis,\u00a0the CNC server did not respond with\u00a0the\u00a0final payload. Generally,\u00a0we have observed\u00a0infostelaer malware being delivered in ongoing jRAT campaigns.<\/p>\n<p>Although phishing\u00a0is an\u00a0old technique to spread malware,\u00a0it is\u00a0still one of the simple and\u00a0most\u00a0effective techniques\u00a0used by phishers. Using this simple\u00a0technique\u00a0of malware distribution,\u00a0phishers are\u00a0going after\u00a0high profile targets such as\u00a0the internal embassy in\u00a0this case. We advise our users to stay protected by keeping their\u00a0<a href=\"https:\/\/bit.ly\/2ncPU26\">antivirus<\/a>\u00a0up-to-date with the latest security updates.<\/p>\n<p><b>Security m<\/b><b>easures<\/b><\/p>\n<p>Here\u2019s an\u00a0<a href=\"https:\/\/blogs.quickheal.com\/infographic-what-is-phishing\/\">infographic<\/a>\u00a0that explains phishing.\u00a0\u00a0And below are some useful tips to stay away from phishing attacks.<\/p>\n<ul>\n<li>Do not open emails that come from unknown, unwanted or unexpected sources.<\/li>\n<li>Do not click on links or download attachments in such emails.<\/li>\n<li>Do not open email attachment with extension such as .js,\u00a0.jar,\u00a0.exe., and .pdf.<\/li>\n<li>Disable VBA macro in Microsoft Office application.<\/li>\n<li>Apply all recommended updates\u00a0on\u00a0your Operating System, programs like Adobe, Java, Internet browsers,\u00a0etc.<\/li>\n<li>Make sure that your\u00a0<a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security\">antivirus<\/a>\u00a0software is up-to-date.<\/li>\n<li>Take regular backups of your files.<\/li>\n<\/ul>\n<p><b>Indicator<\/b><b>s of c<\/b><b>ompromise<\/b><\/p>\n<p>DHL Shipment Notification: 85482550044<br \/>\nORIGINAL SHIPPING DOCUMENT.zip<br \/>\nORIGINAL SHIPPING DOCUMENT.jar<br \/>\nF2727B26A75F9DF01E464B9144117AE1<br \/>\nB01F4758F4FD791B851D64FC16B56D08<br \/>\nvvrhhhnaijyj6s2m.onion[.]top<br \/>\n46.246.120.179<\/p>\n<p><b>Subject Matter Experts<\/b><br \/>\n<b>Pradeep Kulkarni, Prashant Kadam | Quick Heal Security Labs<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier\u00a0we had blogged\u00a0about how JAVA based jRAT\u00a0malware were evolved in\u00a0the\u00a0recent times. At Quick Heal Security Labs, we are actively observing jRAT campaigns happening\u00a0in the wild. These JAVA malware\u00a0spread through phishing campaigns. While analyzing one such phishing campaign, we found that\u00a0an\u00a0International embassy in India\u00a0was\u00a0being\u00a0targeted\u00a0by\u00a0phishers. The malware used\u00a0in\u00a0the\u00a0phishing\u00a0campaign\u00a0was\u00a0the\u00a0infamous JAVA malware called jRAT.\u00a0 Phishers sent phishing emails\u00a0to\u00a0the official\u00a0email [&hellip;]<\/p>\n","protected":false},"author":31,"featured_media":85508,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,303],"tags":[198,1502,25],"class_list":["post-85501","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","category-phishing","tag-java","tag-jrat","tag-phishing"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85501"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=85501"}],"version-history":[{"count":10,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85501\/revisions"}],"predecessor-version":[{"id":85597,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85501\/revisions\/85597"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/85508"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=85501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=85501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=85501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}