Analysis Report on TargetCompany Threat Actor’s Attack Against MS-SQL Servers Using Remcos RAT

Analysis Report on TargetCompany Threat Actor’s  Attack Against MS-SQL Servers Using Remcos RAT

Overview

 

AhnLab SEcurity intelligence Center (ASEC) monitors attacks against poorly managed MS-SQL servers. TargetCompany is one of the threat actors who target account credentials that are exposed to the Internet and are vulnerable to brute force and dictionary attacks. 

TargetCompany has been installing ransomware constantly for years on MS-SQL servers and mainly uses Mallox and BlueSky ransomware. ASEC had covered recently identified ransomware attack cases by Target Company through the blog post “Analysis of TargetCompany’s Attacks Against MS-SQL Servers (Mallox, BlueSky Ransomware)”.

 TargetCompany sometimes installs ransomware after breaching MS-SQL servers without installing additional malware but other times installs a backdoor like Remcos RAT first. During the past year of monitoring, most of the malware installed on MS-SQL servers initially was Remcos RAT. 

This report will provide the IoCs of the malware of TargetCompany identified during the past year.

 

Analysis of Attack Cases

 

1. Attacks Targeting MS-SQL Servers

 

MS-SQL servers with simple passwords and are open publicly to the external Internet are one of the main attack vectors used when targeting Windows systems. Threat actors find poorly managed MS-SQL servers and scan them before carrying out brute force or dictionary attacks to log in with admin privileges. Once the threat actors have reached this point, they then utilize various means to install malware and gain control over the infected systems. 

After a threat actor logs in to an MS-SQL server with an admin account, the most common method used to install malware involves the xp_cmdshell command. Malicious commands that can even function in a Windows environment can be executed through this command. There are other various methods such as OLE Store Procedure, MS-SQL Agent Jobs, Extended Stored Procedure, and CLR Stored Procedure. 

Generally, threat actors abuse PowerShell which provides various features by default upon command execution; PowerShell can download and execute malware from external sources with a simple command. TargetCompany also used PowerShell in the early days to install malware.

 

 


Figure 1. Malware installed using a PowerShell command

 

MD5

0210074fc9d15680815e69d22089f17f
025dab77f57b094b8a3b72a3542255dd
06adda1301ab1f22b2df49bfe89447b9
26998d3ce2bff28543b0601466d925d1
26dd01e58aff375f0455e3ab54049324
URL

http[:]//103[.]249[.]155[.]226/GMbdaRJ[.]exe
http[:]//103[.]61[.]224[.]49/waswas[.]exe
http[:]//113[.]250[.]160[.]126/Dscntrhmo[.]exe
http[:]//114[.]55[.]35[.]63/KqmtyxD[.]exe
http[:]//114[.]67[.]111[.]144/sg_getsystemtime[.]exe
IP

141[.]98[.]83[.]219
141[.]98[.]83[.]220
194[.]26[.]135[.]44
80[.]66[.]75[.]100
80[.]66[.]75[.]172