Python-based malware targets Windows, linux, and macOS and is presumed to be used by dangerous password attack groups, also known as Crypto mimics.
This group has been active since June 2019 and employs various techniques to deliver malware to the victim’s machine.
JPCERT/CC released the latest article about attacks confirmed by the campaigns and shared their analysis report.
Since the attack vector of this campaign is unknown, the infection flow after the execution of the malware is similar to that of the Linkedin attack by this group.
Initially, the malware file builder.py of the Python module is delivered to the victim machine, which downloads additional malware once it gets executed by the user.
The malware downloads and runs additional MSI files externally using a Powershell script that is dropped after the execution.
The malware communicates with the C2 server every minute and is responsible for the download and execution of additional malware.
In addition, the secondary sample of the MSI file downloaded by the Powershell script encodes the user name, OS, process information, etc. of the infected device with BASE64 and sends it to the C2 server.
Also, it utilizes PythonHTTPBackdoor malware with simple commands to execute the attack, which has a function to detect the OS environment, and the commands executed are slightly different depending on the environment.
In macOS and Linux environments, the builder.py file is decoded and saved as a log. tmp, and executed as a Python file.
The user ID and OS environment information are sent to the C2 server every minute and decoded with BASE64, saving it as tmp.py.
PythonHTTPBackdoor has ROT13-encoded git-related strings in the request string and generated file name, just like a log. tmp, which indicates that Git is used. You can see that it is targeting developers.
For example, the command id 501 is used to retrieve the network and process information, and 502 is used to execute the commands in Windows, Linux, and macOS machines.
Similarly, Mach-O malware JokerSPYand node.js malware are being used by this attack group to target the victims.
In a resounding triumph for justice, U.S. District Judge Kathryn Kimball Mizelle has sentenced Vitalii…
Hackers are plotting to benefit from the generosity of Halloween, Thanksgiving, and Christmas shoppers using…
The LLMs (Large Language Models) are evolving rapidly with continuous advancements in their research and…
In the dynamic realm of mobile application security, cybercriminals employ ever more sophisticated forms of…
A recent campaign has been observed to be delivering DJvu ransomware through a loader that…
In a pivotal update to the Okta security incident divulged in October 2023, Okta Security…