Posted on Leave a comment

The China-Linked BlackTech APT Employs New Flagpro Malware.

NTT Security’s analysis reported that ,” The attackers examine the target’s environment to see if it is suitable for running the second stage malware. If they decide to attack the target, they will download and execute another malware sample.” “Flagpro communicates with a command and control server and receives commands to execute from the server, or Flagpro downloads and executes second stage malware.”

The attackers send an email with a password-protected archived file (ZIP or RAR) attached, and they include the password in the message. The archived file contains an xlsm format file with a malicious macro. When a user activates the macro, malware is dropped. They also adapt the xlsm file’s contents to the target. As a result, it is difficult to disagree with the file sent by the attacker.

When the macro is run, it creates an EXE file in the startup directory. The name of this EXE file is “Flagpro.” In most cases, the EXE files created are named “dwm.exe.” Flagpro, which was placed in the startup directory as “dwm.exe,” will be executed the next time the system boots.

In October 2020, a sample related to Flagpro was submitted to an online service. Therefore, Flagpro may have already been used for attacking cases at that point.

In July 2021, our SOC discovered a new Flagpro that was built with the MFC (Microsoft Foundation Class) library. For old Flagpro, the MFC library was not used. This Flagpro included classes like “CV20 LoaderApp” and “CV20 LoaderDlg.” We assume that Flagpro’s role is that of a downloader, and that the sample version was 2.0 based on the class names.

Following list indicates Flagpro’s main functions:

  • Download and execute a tool
  • Execute OS commands and send the results
  • Collect and send Windows authentication information.

“In the v1.0 implementation, if a dialogue titled “Windows” appears when Flagpro accesses an external site, Flagpro automatically clicks the OK button to close the dialogue. This method also works when the dialogue is written in both Chinese and English. It may indicate that the targets are Japan, Taiwan, and English-speaking countries. As an added feature, Flagpro v2.0 checks whether both the username and password are entered in a dialogue before clicking the OK button.”

Finally concluded that ,” Since October 2020, we have observed Flagpro-based attacks against Japan. The attack techniques haven’t changed much, but BlackTech now employs more evasion techniques. For example, they adapt decoy files and file names to their target’s environment and carefully examine the target’s environment. They have recently begun to use new malwares known as “SelfMake Loader” and “Spider RAT.” This indicates that they are actively creating new malware. As a result, you must be aware of BlackTech’s attacks”.

–-For more Cyber security news in crisp content . Please follow our site via twitter handle @cyberworkx1, Linkedin handle @linkedin

Indicator of Compromise

  • 54e6ea47eb04634d3e87fd7787e2136ccfbcc80ade34f246a12cf93bab527f6b
  • e197c583f57e6c560b576278233e3ab050e38aa9424a5d95b172de66f9cfe970
  • 655ca39beb2413803af099879401e6d634942a169d2f57eb30f96154a78b2ad5
  • 840ce62f92fc519cd1a33b62f4b9f92a962b7fb28c12d2f607dec0b520e6a4b2
  • ba27ae12e6f3c2c87fd2478072dfa2747d368a507c69cd90b653c9e707254a1d
  • 77680fb906476f0d84e15d5032f09108fdef8933bcad0b941c9f375fedd0b2c9
  • e81255ff6e0ed937603748c1442ce9d6588decf6922537037cf3f1a7369a8876
  • 45[.]76.184.227
  • 45[.]32.23.140
  • 139[.]162.87.180
  • 107[.]191.61.40
  • 172[.]104.109.217
  • org.misecure[.]com
  • update.centosupdates[.]com

Leave a Reply