Press ESC to close

Malware Spotlight:  A Deep-Dive Analysis of WezRat

Key DetailInformation
Threat ActorsEmennet Pasargad (affiliated with IRGC), operating under aliases such as Aria Sepehr Ayandehsazan (ASA), Anzu Team, For-Humanity, and Regiment GUD.
Campaign OverviewIranian cyber group Emennet Pasargad has been using the WezRat backdoor for espionage and influence operations since mid-2023. Their operations target various countries, including the US, France, Israel, and Sweden. The group has conducted campaigns involving disinformation, hacking, and infostealer attacks.
Target Regions (Or Victims)United States, France, Israel, Sweden, and various entities with influence over Iran’s international or domestic narrative.
MethodologySpear-phishing emails impersonating official organizations (e.g., INCD), fake updates (e.g., fake Chrome update), deploying MSI files containing backdoors (e.g., Updater.exe) to infect victims. The malware is distributed via fake domains and phishing campaigns targeting Israeli organizations.
Product TargetedGoogle Chrome (via fake update), Israeli organizations, various international entities with political influence.
Malware ReferenceWezRat (custom infostealer), also observed with different obfuscation techniques (OLLV).
Tools UsedPhishing campaigns, fake update mechanisms, MSI installers, DLLs (SPITP.dll, TaskFlowUi.dll, JumpViewUi.dll, clp.dll, persist.dll), and custom malware backdoors.
Vulnerabilities ExploitedSocial engineering via phishing emails and fake update links, manipulation of C2 communications, and leveraging DLL injection for command execution and persistence.
TTPsPhishing, fake update campaign, DLL-based malware deployment, persistence through registry keys, data exfiltration (e.g., clipboard data, screenshots, keylogging), and C2 communication via HTTP(S) and raw socket communication in some versions.
AttributionEmennet Pasargad (Iranian APT group, linked to IRGC), targeting adversaries and groups influencing Iranian politics and narratives.
RecommendationsOrganizations should implement email filtering, user education, and behavioral detection to identify phishing attempts. Ensure endpoint protection (e.g., Check Point Threat Emulation, Harmony Endpoint) and keep software up to date to mitigate the risk of similar attacks. Ensure proper network segmentation.
SourceFBI, US Department of Treasury, Israeli National Cybersecurity Directorate (INCD), Check Point Research.

Read full article: Read More

Disclaimer: The above summary has been generated by an AI language model.

Source: Check Point Research

Published on: November 14, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *