OLD DOGS NEW TRICKS: ATTACKERS ADOPT EXOTIC PROGRAMMING LANGUAGES
Image Description
Common Information
Type Value
UUID db8e8c8f-2136-486a-99c8-fe3fcebaaf13
Fingerprint bd034f1858205893b134be4a349669ae4772a6461cc02e4f6c2a264f8343e13a
Analysis status DONE
Considered CTI value 2
Text language
Published July 23, 2021, 10:03 a.m.
Added to db April 14, 2024, 1:05 a.m.
Last updated Aug. 31, 2024, 6:18 a.m.
Headline OLD DOGS NEW TRICKS: ATTACKERS ADOPT EXOTIC PROGRAMMING LANGUAGES
Title OLD DOGS NEW TRICKS: ATTACKERS ADOPT EXOTIC PROGRAMMING LANGUAGES
Detected Hints/Tags/Attributes 250/3/128
Attributes
Details Type #Events CTI Value
Details CVE 21
cve-2021-3156
Details Domain 26
crates.io
Details Domain 32
golang.org
Details Domain 144
cock.li
Details Domain 675
www.linkedin.com
Details Domain 53
blogs.blackberry.com
Details Domain 622
en.wikipedia.org
Details Domain 251
www.bleepingcomputer.com
Details Domain 247
www.virusbulletin.com
Details Domain 184
www.fireeye.com
Details Domain 138
www.darkreading.com
Details Domain 38
blog.netlab.360.com
Details Domain 4127
github.com
Details Domain 13
www.binarydefense.com
Details Domain 14
gs.statcounter.com
Details Domain 71
blogs.jpcert.or.jp
Details Domain 23
www.intezer.com
Details Domain 1
1c7qp243xy9g1qeffp1k1nvo-wpengine.netdna-ssl.com
Details Domain 1
dlang.org
Details Domain 1
livebook.manning.com
Details Domain 105
web.archive.org
Details Domain 3
nim-lang.org
Details Domain 1
foundation.rust-lang.org
Details Domain 2
stackoverflow.blog
Details Domain 3
www.memorysafety.org
Details Domain 175
www.zdnet.com
Details Domain 2
doc.rust-lang.org
Details Domain 21
news.drweb.com
Details Domain 1
talks.golang.org
Details Domain 2
golangbot.com
Details Domain 3
wiki.debian.org
Details Domain 13
broadcom.com
Details Domain 8
www.kryptoslogic.com
Details Domain 1
www.goggleheadedhacker.com
Details Domain 41
www.cisecurity.org
Details Domain 172
www.crowdstrike.com
Details Domain 2
blog.golang.org
Details Domain 1373
twitter.com
Details Domain 29
blackberry.com
Details Email 2
vovanandlexus@cock.li
Details File 674
node.js
Details File 2
dirtytest.exe
Details File 1
vovalex.txt
Details File 1
use-of-delphi-packer-to-evade-malware-classification.html
Details File 85
www.bin
Details File 8
malware-wellmes-9b78.html
Details File 1
vs-malware-white-paper.pdf
Details File 1
areas-of-d-usage.html
Details File 1
details-of-recent-cyber-attack-actions-to-protect-community.html
Details File 6
news.html
Details File 1
version-0102-released.html
Details File 1
why-cargo-exists.html
Details Github username 2
burrowers
Details Github username 1
moloch--
Details Github username 1
casualx
Details Github username 1
graydon
Details Github username 48
microsoft
Details Github username 1
indygreg
Details Github username 1
darkarp
Details Github username 1
stratisiot
Details Github username 21
fireeye
Details Github username 3
epi052
Details md5 1
06f23da70e8da5f1231dae542708d4b9
Details md5 1
a584e0e9fb9f4fbc415a1ef3c40e8812
Details sha1 1
b0fd440798ab3cfb05c60a1a1bd2894e1618479e
Details Threat Actor Identifier - APT 665
APT29
Details Threat Actor Identifier - APT 783
APT28
Details Url 1
https://www.linkedin.com/in/eric-milam
Details Url 1
https://blogs.blackberry.com/en/author/the-blackberry-research-and-intelligence-team
Details Url 1
https://en.wikipedia.org/wiki/iloveyou
Details Url 1
https://www.bleepingcomputer.com/news/security/bazarloader-used-to-deploy-ryuk-ransomware-on-
Details Url 2
https://www.virusbulletin.com/virusbulletin/2014/07
Details Url 1
https://www.fireeye.com/blog/threat-research/2018/09/increased-
Details Url 1
https://en.wikipedia.org/wiki/yara
Details Url 2
https://www.darkreading.com/threat-intelligence
Details Url 1
https://blog.netlab.360.com/blackrota-a-heavily-obfuscated-backdoor-written-in-go
Details Url 1
https://blogs.blackberry.com/en/2021/06/pysa-loves-chachi-a-new-golang-rat
Details Url 2
https://github.com/burrowers/garble
Details Url 1
https://github.com/moloch--/denim
Details Url 1
https://github.com/casualx/obfstr
Details Url 1
https://www.binarydefense.com
Details Url 1
https://gs.statcounter.com/os-market-share
Details Url 7
https://www.bleepingcomputer.com/news/security
Details Url 1
https://blogs.blackberry.com/en/2019/08/mirai-botnet-spawns-echobot-malware
Details Url 8
https://blogs.jpcert.or.jp/en/2018/07/malware-wellmes-9b78.html
Details Url 3
https://en.wikipedia.org/wiki/cozy_bear
Details Url 1
https://www.intezer.com/blog/research
Details Url 1
https://1c7qp243xy9g1qeffp1k1nvo-wpengine.netdna-ssl.com/wp-content/uploads/2015/04/math-
Details Url 1
https://blogs.blackberry.com/en/2016/07/no-more-sacrificial-lambs
Details Url 1
https://dlang.org/areas-of-d-usage.html
Details Url 1
https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-
Details Url 1
https://blogs.blackberry.com/en/author
Details Url 1
https://livebook.manning.com/book/nim-in-action/chapter-1/5
Details Url 1
https://web.archive.org/web/20160626002904/http:/nim-lang.org/news.html
Details Url 1
https://nim-lang.org/blog/2014/12/29/version-0102-released.html
Details Url 1
https://blogs.blackberry.com/en/2019/09
Details Url 1
https://github.com/graydon/rust-prehistory/commit/b0fd440798ab3cfb05c60a1a1bd2894e1618479e
Details Url 1
https://foundation.rust-lang.org/members
Details Url 1
https://github.com/microsoft/windows-rs%20
Details Url 1
https://stackoverflow.blog/2020/05/27/2020-stack-overflow-developer-survey-results
Details Url 1
https://www.memorysafety.org/initiative/linux-kernel
Details Url 1
https://stackoverflow.blog/2020/01/20/what-is-rust-and-why-is-it-so-popular
Details Url 4
https://www.zdnet.com/article
Details Url 1
https://doc.rust-lang.org/cargo/guide/why-cargo-exists.html
Details Url 1
https://blogs.blackberry.com/en/2020/11/the-art-of-targeted-phishing-how-not-to-get-hooked
Details Url 1
https://news.drweb.com/show/?i=10193&lng=en&c=14
Details Url 1
https://github.com/indygreg/pyoxidizer
Details Url 1
https://github.com/darkarp/chromepass
Details Url 1
https://talks.golang.org/2012/splash.article46
Details Url 2
https://golangbot.com/goroutines
Details Url 1
https://wiki.debian.org/apt
Details Url 1
https://github.com/stratisiot/gobfuscator
Details Url 1
https://www.kryptoslogic.com/blog/2020/12/automated-string-de-gobfuscation
Details Url 1
https://www.goggleheadedhacker.com/blog/post/22
Details Url 1
https://www.cisecurity.org/solarwinds
Details Url 1
https://github.com/fireeye
Details Url 60
https://github.com
Details Url 1
https://github.com/epi052/feroxbuster
Details Url 2
https://www.crowdstrike.com/blog/guloader-malware-analysis
Details Url 1
https://blog.golang.org/survey2020-results
Details Url 1
https://www.linkedin.com/in/stevenumiller
Details Url 1
https://twitter.com/stvemillertime/status/1404532957604323329
Details Url 1
https://twitter.com/stevemk14ebr/status/1399777922743996417
Details Yara rule 1
import "pe"
import "math"
import "hash"

rule Mal_InfoStealer_RemcosRAT {
	meta:
		description = "Dlang wrapped RemcosRAT"
		author = "Blackberry Threat Research & Intelligence"
	strings:
		$f0 = { 48 3A 2F 50 72 75 65 62 61 73 2F 43 }
		$f1 = { 43 43 52 59 50 54 45 52 42 4C 41 55 }
		$DLang_Str1 = "C:\\D\\dmd2\\windows\\bin\\..\\..\\src\\phobos\\std\\utf.d" ascii wide
		$DLang_Str2 = "C:\\D\\dmd2\\windows\\bin\\..\\..\\src\\phobos\\std\\file.d" ascii wide
		$DLang_Str3 = "C:\\D\\dmd2\\windows\\bin\\..\\..\\src\\phobos\\std\\format.d" ascii wide
		$DLang_Str4 = "C:\\D\\dmd2\\windows\\bin\\..\\..\\src\\phobos\\std\\base64.d" ascii wide
		$DLang_Str5 = "C:\\D\\dmd2\\windows\\bin\\..\\..\\src\\phobos\\std\\stdio.d" ascii wide
	condition:
		uint16(0) == 0x5a4d and filesize < 700KB and pe.imphash() == "06f23da70e8da5f1231dae542708d4b9" and all of ($f*) and 3 of ($DLang_Str*)
}
Details Yara rule 1
import "pe"
import "math"
import "hash"

rule Mal_Ransom_OutCrypt {
	meta:
		description = "OutCrypt Ransomware"
		author = "Blackberry Threat Research & Intelligence"
	strings:
		$f0 = { B9 E0 79 46 00 B8 2A 00 00 00 }
		$f1 = { BB 20 7A 46 00 }
		$f2 = { B9 90 79 46 00 51 6A 13 FF 75 24 FF 75 20 BA 50 A7 46 00 52 E8 66 DA 00 00 83 C4 14 52 50 E8 68 19 00 00 8D 45 A8 E8 64 CD 00 00 8D 45 B4 E8 5C CD 00 00 C7 45 FC 01 00 00 00 8D 8D F4 FF FF FF 6A 01 51 68 90 70 46 00 E8 2A DA 00 00 83 C4 0C E8 02 00 00 00 EB 10 }
		$f3 = { BA D0 9B 46 00 }
		$f4 = "HESOYAMAEZAKMIRIPAZHAHESOYAMAEZAKMIRIPAZHA" ascii wide
	condition:
		uint16(0) == 0x5a4d and filesize < 700KB and pe.imphash() == "a584e0e9fb9f4fbc415a1ef3c40e8812" and all of ($f*)
}
Details Yara rule 1
import "pe"
import "math"
import "hash"

rule Mal_Ransom_Vovalex {
	meta:
		description = "Vovalex Ransomware"
		author = "Blackberry Threat Research & Intelligence"
	strings:
		$f0 = { 52 45 41 44 4D 45 2E 56 4F 56 41 4C }
		$f1 = { 6E 6F 74 65 70 61 64 00 }
		$rans_note1 = "Send us a mail with proofs of transaction: VovanAndLexus@cock.li"
		$rans_note2 = "README.VOVALEX.txt"
		$rans_note3 = "VovanAndLexus@cock.li"
		$rans_note4 = "Monero: 4B45W7V1sJAZBnPSnvcipa5k7BRyC4w8GCTfQCUL2XRx5CFzG3iJtEk2kqEvFbF7FagEafRYFfQ6FJnZmep5TsnrSfxpMkS"
		$rans_note5 = "Send 0.5 XMR to this Monero wallet: 4B45W7V1sJAZBnPSnvcipa5k7BRyC4w8GCTfQCUL2XRx5CFzG3iJtEk2kqEvFbF7FagEafRYFfQ6FJnZmep5TsnrSfxpMkS"
	condition:
		pe.is_64bit() and all of ($f*) and 4 of ($rans_note*)
}
Details Yara rule 1
rule Mal_ShellcodeLoader_Go {
	meta:
		author = "Blackberry Threat Research & Intelligence"
		description = "Tags Go Specific build tags and the presence of shell code headers"
	strings:
		$Go1 = "go.buildid" ascii wide
		$Go2 = "Go build ID:" ascii wide
		$shellcode_fiber_header_x86 = { FC E8 ( 89 | 82 ) 00 00 00 60 89 E5 31 D2 }
		$shellcode_fiber_header_x64 = { FC 48 83 E4 F0 E8 ( C0 | CC ) 00 00 00 }
	condition:
		uint16(0) == 0x5a4d and ($Go1 or $Go2) and ($shellcode_fiber_header_x86 or $shellcode_fiber_header_x64)
}
Details Yara rule 1
rule Mal_ShellcodeLoader_Nim {
	meta:
		author = "Blackberry Threat Research & Intelligence"
		description = "Tags Nim Specific function name and either shellcode headers or the presence of the string shellcode"
	strings:
		$nim_outOfMemHook = { 6F 75 74 4F 66 4D 65 6D 48 6F 6F 6B 5F 5F 6B 5A 4E 61 41 37 75 31 4D 66 53 57 35 5A 65 6F 47 76 77 38 78 67 00 }
		$shellcode_fiber_header_x86 = { FC E8 ( 89 | 82 ) 00 00 00 60 89 E5 31 D2 }
		$shellcode_fiber_header_x64 = { FC 48 83 E4 F0 E8 ( C0 | CC ) 00 00 00 }
		$shellcode = "shellcode" nocase
	condition:
		uint16(0) == 0x5a4d and $nim_outOfMemHook and (($shellcode_fiber_header_x86 or $shellcode_fiber_header_x64) or $shellcode)
}