Nitol Malware Being Distributed in Forum Archive

Nitol Malware Being Distributed in Forum Archive

The ASEC analysis team confirmed that malware is being distributed in a forum archive in Korea. The attacker uploaded 4 posts disguised as sharing utility programs that are used to distribute malware. These posts distribute Nitol malware disguised as certain utility programs. The related attacks have been happening since last June.

Each post has a description of a utility program with a torrent file attached. Upon opening the torrent file using the torrent client, files can be downloaded. When downloading the file uploaded by the attacker using the torrent file, the malware disguised as a utility program gets downloaded.

Figure 1. Post and the attachment file

The malware files downloaded from each post use utility program icons for disguising.

Figure 2-1. Torrent files attached to each post

Figure 2-2. Malware downloaded with torrent file

When the malware file is run, it performs self-replication in the %Appdata% folder and executes the registry autorun registration command.

C:\Windows\System32\reg.exe  ADD “HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run” /V “My App” /t REG_SZ /F /D “C:\Users\vmuser\AppData\Roaming\[random].exe”

Table 1. Command for autorun registration

It then attempts to connect to C2 and awaits commands from the attacker. Nitol malware can perform malicious behaviors such as downloading and running additional files with the attacker’s command or perform DDoS attacks to a particular URL.

Figure 3. C2 access code

The ASEC analysis team has been identifying the attack since last June. The attacker periodically uploaded posts that distribute Nitol malware on the same archive. The distributed Nitol malware all uses the identical C2. The uploader primarily creates 4 to 5 consecutive posts at once. Considering the attacker may upload malware on the same archive later on, users need to take caution.

For the last 2 weeks, Nitol malware has been distributed in the same forum, other webhards, etc. with the file names shown below.

  • startisback++ 2.9.13 (2.9.1 for 1607) startisback+ 1.7.6 startisback 2.1.2
  • Hancom Office For Educational Institution 2020
  • lumion v4.02 [64bit] incl crack – [mumbai-tpb]
  • labyrinc
  • rival stars horse racing desktop edition repack
  • HWP 2020
  • microsoft toolkit 2.6 beta 4 official
  • adobe illustrator 2020
  • sw_dvd5_office_professional_plus_2016_w32_korean_mlf_x20-41358
  • kmsauto net 2015 v1.4.5 portable
  • 2020 Activation Tool
  • microsoft office 2016
  • [Genuine Korean Version] Office 2007
  • w10 digital activation v1.4.1.exe

 

 

MD5

010db728be2d4ea9d315beec6377f35c
0f216a47308f72427107e4a7f5f88c24
6046e10c7361299301fb99013cc33ee1
7f0bd4234ba4799a6528eb47de6dde3a
FQDN

rlarnjsdud0502[.]kro[.]kr

Gain access to related IOCs and detailed analysis by subscribing to AhnLab TIP. For subscription details, click the banner below.