Malware Disguised as Browser Update

Malware Disguised as  Browser Update

Recently, AhnLab SEcurity intelligence Center (ASEC) identified the distribution of malware disguised as a browser update targeting a wide range of users. This malware is distributed through infected websites, and when users visit these sites, malicious scripts are loaded. The scripts create fake update windows for browsers like Chrome or Firefox, tricking users into downloading the malicious files. 

 


Figure 1. Overall operation flow 

 

The files being downloaded come in various formats such as EXE, ZIP, APPX, and recently, VHD files. VHD files are disk image files that mount as virtual drives and operate when executed. Inside the VHD, there is a malicious LNK file that performs malicious activities in a fileless manner via PowerShell commands. Ultimately, an executable file created with .NET is loaded into the memory. Upon execution, it communicates with the threat actor’s C&C server.

 


Figure 2. Files inside the VHD file 

 

The threat actor is using external repositories in the attack process, and there has recently been an increase in cases where legitimate services like external repositories are used for malware distribution. 

This report explains the execution process of the malware disguised as a browser update. 
 

 

Overview
Malware Analysis
  1. Operation Process
  2. Analysis by File
     2.1. VHD
     2.2. LNK
     2.3. MOC.hta (Fileless)
     2.4. Cloud.bat
     2.5. EXE (Fileless) 
     2.6. DLL (Fileless)
AhnLab Response Overview
Conclusion
Indicators of Compromise (IoCs)
  File Hashes (MD5s) 
  Related Domains, URLs, and IP Addresses

 

MD5

1369fd10f66d0ab867aab559253b01e4
5714c27e55d82b9ff9d92c04eee9570e
7ed0b7e22f568d2eedaf956ba831d0a6
URL

https[:]//bitbucket[.]org/shakespeare1/center/downloads/BrowserUpdater[.]vhd
https[:]//bitbucket[.]org/shakespeare1/gna/downloads/Lwrctogck[.]dat
https[:]//github[.]com/BrowserCompanyLLC/-12/releases/download/semtag/Cloud[.]bat
https[:]//github[.]com/BrowserCompanyLLC/-12/releases/download/semtag/MOC[.]hta
https[:]//redr[.]me/g3boil/