Tech

Fake BaWue website distributes malware in Ukraine context






With a fake website of the Baden-Württemberg state government, previously unknown actors are spreading a Trojan horse. They use interest in news about the current situation in Ukraine as bait.

A still active fake website distributes malware under the guise of the state government of Baden-Württemberg. As the security company Malwarebytes reports in its blog, the perpetrators use the interest in reports on the current situation in Ukraine and political decisions in this context. They have secured a DE domain that previously belonged to the state of Baden-Württemberg and whose registration had expired.

Under the adress

collaboration-bw[.]en

the state government operated a collaboration platform for innovation initiatives. With the reputable web address, the perpetrators created a website in the look of Baden-Württemberg’s “The Länd” campaign. While the start page only shows an unadorned construction site notice, a page in “The Länd” look that cannot be accessed directly from there purportedly contains information on the Ukraine crisis.

Fake website (screenshot)

On this page, a blue download button invites you to download a current document with tips for everyday work. If you download and unzip the ZIP file with the name “2022-Q2-Threat situation-Ukraine”, you will find a CHM file with the same name in it. CHM (Compiled HTML) is an older Windows Help system file format that can contain multiple HTML files. When this particular CHM file is opened, a fake error message appears in German while running Powershell commands in the background.

malware in action

The first powershell script retrieves and runs another script from the fake website. It installs a Trojan horse in the newly created “SecuriyHealthService” directory in the user directory. It consists of a batch file called “MonitorHealth.cmd” that just calls a 12 kB PowerShell script called “Status.txt”. The call of the CMD file is repeated daily at a fixed time by an entry in the Windows task scheduler.

The Powershell script Status.txt is a RAT (Remote Access Trojan/Tool) malware. It therefore enables remote access to infected computers. In this case, it collects data on the computer and, in order not to arouse suspicion, uploads it in JSON format to a server with another DE domain. He can also download additional files from the network and start scripts. To bypass Windows protections, the script includes an AES-encrypted function called “bypass” that it decrypts on-the-fly.

▶The best antivirus tools in the test

So far, it is unclear who is behind this malware campaign and what exactly it is intended to achieve. It seems obvious to suspect Russian actors, but without concrete information and connections that remains pure speculation. It could also be perpetrators of any other provenance who use a current topic as bait.

Detection by antivirus programs

So far, very few antivirus programs have recognized the malicious CHM file – the standard Windows Defender is not one of them. In the case of Status.txt, the actual malware, it looks even more meager. Even Malwarebytes’ own antivirus software does not seem to recognize either file. Scan results are from AV-Test and VirusTotal.

antivirus

Malware name (CHM file)

Malware Name (Status.txt)

Avast

Other:Malware-gen [Trj]

AVG

Other:Malware-gen [Trj]

Bitdefender

Exploit.CHM-Downloader.Gen

Emsisoft

Exploit.CHM-Downloader.Gen (B)

eScan

Exploit.CHM-Downloader.Gen

Eset Nod32

PowerShell/TrojanDownloader.Agent.FIR trojan

PowerShell/ReverseShell.R

GData

Exploit.CHM-Downloader.Gen

Kaspersky

HEUR:Trojan-Downloader.Script.Agent.gen

rising

Trojan.MouseJack/HTML!1.BE26

Symantec

downloaders

Trellix (FireEye)

Exploit.CHM-Downloader.Gen

TrendMicro

HEUR_CHM.E

Zone Alert

UDS:DangerousObject.Multi.Generic

Related Articles

Leave a Reply

Your email address will not be published.

Back to top button