Nuevo ladrón de PowerShortShell

En noviembre 24, 2021 SafeBreach Labs publicó una investigación sobre un nuevo actor de amenazas iraní que utiliza una ejecución remota de código MSHTML de Microsoft (RCE) exploit para apuntar a las víctimas con un nuevo ladrón de PowerShell o PowerShortShell. ShadowChasing informó por primera vez el caso en su página de Twitter.. However specialists could not get the PowerShell Stealer hash/code as it was not available on public malware repositories or elsewhere.

In their research SafeBreach Labs described the analysis of the PowerShortShell full attack chain, and gave details of phishing attacks which started in July this year. Most importantly they managed to acquire the PowerShell Stealer code which researchers named PowerShortShell. In their own words the reason for such name lies in the structure of the script, it contained little more than 150 lines. But nevertheless researchers say the PowerShell script allowed an attacker to gain access to a wide range of information: telegram files, screen captures and the victim’s environment.

“Almost half of the victims are located in the United States. Based on the Microsoft Word document contentwhich blames Iran’s leader for the “Corona massacre” and the nature of the collected data, we assume that the victims might be Iranians who live abroad and might be seen as a threat to Iran’s Islamic regime,” SafeBreach Labs wrote in their research.

In their attacks, the threat actor exploited CVE-2021-40444 vulnerabilidad. It is a Microsoft Office MSHTML Remote Code Execution Vulnerability that allows no macros and requires only a single approval to “display content”. Researchers think that the campaign might be linked with Iran’s Islamic regime because of the Telegram surveillance usage. Rampant Kitten, Infy and Ferocious Kitten, Iran’s threat actors, also used it. Curiosamente, here threat actors applied quite exclusive usage of exploits because most of the Iranian threat actors generally do social engineering tricks.

The attack itself consisted of two steps

The attack itself consisted of two steps: first phishing and the subsequent spamming with malicious attachments. The two phishing attacks started in July 2021 when threat actors collected credentials for Instagram and Gmail. For this matter they used the same C2 server Deltaban[.]dedyn[.]yo. Attackers masqueraded this phishing HTML page as the legit travel agency. A click on which would transfer the victim to an Iranian short URL:https://yun[.]ir/jcccj. This URL would then direct you to signin[.]dedyn[.]io/Social/Google_Finish. One registered the domain in July 2021.

The threat actors dumped phished credentials to file out.txt which anyone could just browse. The second phishing campaign involved Instagram. Here the credentials also went to the same out.txt file. All the phishing and C2 and infection server originated from

El nuevo ladrón de PowerShortShell aprovecha la vulnerabilidad reciente de Microsoft MSHTML
An attacker`s phishing site

The exploit attack in its turn started on September 15, 2021. A victim received an email with a Winword document in Farsi. The first document titled Mozdor.docx. included images of Iranian soldiers. The second one with a title جنایات خامنه ای.docx (Khamenei Crimes.docx) dijo: “One week with Khamenei; Complain against the perpetrators of the Corona massacre, including the leader”. It also had attached links to the Iranian news site and Twitter account of an IranWire journalist.

El nuevo ladrón de PowerShortShell aprovecha la vulnerabilidad reciente de Microsoft MSHTML
This is what victims received in one of the documents

The Word files would connect to the malicious server, execute the malicious html, and then drop a dll to the %temp% directory. The mozdor.docx file included an exploit in the file document.xml.rels. It executed mshtml:HTTP://hr[.]dedyn[.]io/image.html, while the second docx executed mshtml:HTTP:// The exfiltration of the Telegram files was done to “”. Researchers could not find the victims of the attacks but they constructed the victims heat map based on the available data. Most cases specialists registered in the United States, Russian Federation and Netherlands.

Acerca de Andrew Nail

Periodista de ciberseguridad de Montreal, Canadá. Estudió ciencias de la comunicación en la Universite de Montreal.. No estaba seguro de si un trabajo de periodista es lo que quiero hacer en mi vida., pero en conjunto con las ciencias técnicas, es exactamente lo que me gusta hacer. Mi trabajo es captar las tendencias más actuales en el mundo de la ciberseguridad y ayudar a las personas a lidiar con el malware que tienen en sus PC..

también puedes ver

Que comience la búsqueda de píxeles de Facebook

Que comience la búsqueda de píxeles de Facebook

Mozilla, un fabricante de navegador, anunció recientemente su colaboración con una redacción sin fines de lucro Markup. El colectivo …

Arreglo para Microsoft Exchange 2022 error del año

Arreglo para Microsoft Exchange 2022 error del año

Microsoft lanzó una solución para el error de Exchange que perturbaba la entrega de correo electrónico en las instalaciones de Microsoft …

Deja una respuesta