Press ESC to close

BellaCPP: Discovering a new BellaCiao variant written in C++

CategoryDetails
Threat Actors– Charming Kitten
Campaign Overview– BellaCiao malware family first surfaced in April 2023
– Combines stealthy persistence (webshell) with covert tunnel creation
– New variant, BellaCPP, observed in Asia in 2023
Target Regions– Asia (specific computer infected)
– Entities identified via PDB paths indicating target entity and country
Methodology– Use of descriptive PDB paths for versioning and targeting
– XOR decryption for DLL loading
– Domain generation for covert tunneling
– Exploiting Windows services (e.g., running malware as a service)
Products Targeted– Windows systems (e.g., DLLs in C:\Windows\System32)
Malware Reference– BellaCiao (.NET-based malware family)
– BellaCPP (C++ variant)
Tools Used– PDB path analysis for tracking
– Encrypted DLLs (e.g., D3D12_1core.dll)
– Domain generation: <5 random letters><target identifier>.<country code>.systemupdate[.]info
Vulnerabilities Exploited– Leveraging persistence through Windows services
– SSH tunneling for covert communication
TTPs– Iterative malware development with versioning (MicrosoftAgentServices versions)
– Covert tunneling via DNS and SSH
– Usage of descriptive PDB paths for operational insights
Attribution– High confidence attributed to Charming Kitten
– Links to previous domains and infection behavior from older BellaCiao samples
Recommendations– Monitor for unusual domain activity and service behavior
– Conduct deep investigations to identify undetected samples
– Update detection rules to cover evolving malware family
SourceSecurelist by Kaspersky

Read full article: https://securelist.com/bellacpp-cpp-version-of-bellaciao/115087/

The above summary has been generated by an AI language model

Source: Securelist by Kaspersky

Published on: December 20, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *