Earth Hundun, a notable Asia-Pacific malware organization, uses Waterbear and Deuterbear.
We first encountered Deuterbear in Earth Hundun’s arsenal in October 2022, signaling its implementation.
This report describes the ultimate Remote Access Trojan (RAT) we recovered from a C&C server from an Earth Hundun campaign in 2024.
We examined the Waterbear downloader’s network actions at the beginning. A case study shows how the Waterbear RAT and its plugins were deployed in the second phase and how Waterbear downloaders spread across networks, complicating detection and monitoring.
Deuterbear now supports plugin shellcode formats and runs RAT sessions without handshakes.
Trendmicro analysis of Earth Hundun’s Waterbear and Deuterbear malware interactions with targets will demonstrate its sophisticated tactics.
Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers
A previous campaign’s flowchart shows Waterbear’s activity in a victim’s network and its proliferation of downloaders.
Initial Stage
In our previous report, Waterbear used three files for the initial download.
These include a modified legitimate executable, loader, and encrypted downloader.
The Second Stage
Waterbear RAT (A) downloaded the plugin via RAT command 1010 and activated its first export function, “Start,” to inject it into a process.
Depending on the target process architecture, the plugin includes unencrypted Waterbear downloaders 0.27 and 0.28.
Unlike 32-bit processes, 64-bit processes run 0.28, boosting downloads.
This hides their trails or connects to different C&C servers in the victim’s network, showing the threat actor’s communication flexibility.
Command Capabilities:
Victim Information Transmission:
Before executing backdoor commands, Waterbear sends detailed victim information to the C&C server, including admin status, system version, host and user names, window text, adapter info, process ID, and infection marks.
Installation Pathway:
Command Capabilities:
Victim Information Transmission:
Similar to Waterbear, Deuterbear sends victim information to the C&C server before executing backdoor commands, including admin status, user and host names, OS version, window text, adapter info, process ID, and infection marks.
Differences from Waterbear:
Deuterbear retains fewer commands (20 compared to over 60 for Waterbear) but supports more plugins to enhance flexibility.
It uses the same HTTPS channel and RC4 traffic key as the downloader, eliminating the need for a handshake with the C&C server to update communication protocols.
Waterbear evolved into Deuterbear, a new malware.
Interestingly, Waterbear and Deuterbear evolve separately rather than replacing each other.
Memory scans for downloads and the Waterbear and Deuterbear RATs can protect organizations from Earth Hundun attacks. Also, finding the registry used to decrypt the Deuterbear downloader can help find it in the system.
On-Demand Webinar to Secure the Top 3 SME Attack Vectors: Watch for Free
The U.S. Department of Justice unsealed federal charges Thursday against Russian national Rustam Rafailevich Gallyamov,…
A comprehensive security research demonstration has revealed how attackers can systematically undermine modern zero-trust security…
A cybersecurity threat has emerged targeting one of the world's largest fast-food chains, as a…
The cybersecurity landscape witnessed a significant milestone this February with the emergence of BypassERWDirectSyscallShellcodeLoader, a…
Cybercriminals are increasingly targeting cryptocurrency users through sophisticated malware campaigns that exploit the trust placed…
Cybersecurity researchers have uncovered a sophisticated new formjacking malware campaign targeting WooCommerce-powered e-commerce websites, representing…