laitimes

Fake dnSpy - Poisoned in this chicken soup

author:Safety Aluanan

"dnSpy" is a popular one for debugging, modifying and decompiling. Tools for .NET programs. Cybersecurity researchers in analysis. Often used when net programs or malware.

On January 8, 2022, BLEEPING COMPUTER posted that an attacker used malicious dnSpy to launch an attack against cybersecurity researchers and developers.

@MalwareHunterTeam tweet revealing the address of Github's repository that distributes a maliciously compiled version of dnSpy that will subsequently install a clipboard hijacker, Quasar RAT, mining Trojan, etc.

Fake dnSpy - Poisoned in this chicken soup
Fake dnSpy - Poisoned in this chicken soup
Check out the official version of Git for dnSpy and find that the tool is in Archived, has stopped updating in 2020, and has no official site.
Fake dnSpy - Poisoned in this chicken soup
The attackers took advantage of this by registering dnspy[.] net domain name, designed a very beautiful website to distribute malicious dnSpy programs.
Fake dnSpy - Poisoned in this chicken soup
Buying Google Search Ads at the same time puts the site at the top of search engine results to deepen the reach.
Fake dnSpy - Poisoned in this chicken soup
As of January 9, 2022, the site was offline.

Sample analysis

dnspy[.] Net is a modified version of dnSpy 6.1.8, which is also the last version officially released.

The attacker completes the infection by modifying the dnSpy .dll entry code of one of the dnSpy core modules.

The normal entry function .dll dnSpy is as follows:

Fake dnSpy - Poisoned in this chicken soup

The modified entry adds a memory-loaded executable:

Fake dnSpy - Poisoned in this chicken soup

The program is named dnSpy Reader:

Fake dnSpy - Poisoned in this chicken soup

and after confusion:

Fake dnSpy - Poisoned in this chicken soup

Subsequently, some mining, shearboard hijackers, RAT, etc. will be issued through mshta:

Fake dnSpy - Poisoned in this chicken soup

The two githubs created by the attackers are:

https[:]//github[.] with/carbonblackz/dnSpy;

https[:]//github[.] with/isharpdev/dnSpy;

The usernames used are: isharpdev and carbonblackz. Remember the name, we'll see it later.

Asset line extension

By dnspy[.] From the analysis of net, we found some interesting traces that could be used to expand the assets of the attackers:

dnspy.net:

Domain name dnspy[.] Net registration is on April 14, 2021.

Fake dnSpy - Poisoned in this chicken soup

There are multiple resolution records for the domain name, most of which are cdn services provided by Cloudflare, but when we look at the specific historical resolution records, we find that from December 13 to January 03, the DOMAIN name used AN IP of 45.32.253 [.] 0, unlike several other IPs of the Cloudflare CDN service, this IP has only a small number of mapping records:

Fake dnSpy - Poisoned in this chicken soup

Querying the PDNS records of the IP, it can be found that most of the domain names mapped by the IP are suspected to be forged domain names, and most of the domain names have been offline.

Fake dnSpy - Poisoned in this chicken soup

These domain names are partly download sites such as hacking tools/office software, and are suspected to be fake domain names of some normal websites.

Fake dnSpy - Poisoned in this chicken soup

As well as the domain names dnspy.net disclosed in the incident, based on this behavior pattern, we suspect that these domain names are the assets of the attackers, so we further analyzed these domain names.

Take the database[.] Co, for example, the domain name history is a hacking tool download site, and the hacker tool on the home page of the website unzips the password as "CarbonBlackz", which is the same name as one of the Github users who uploaded malicious dnspy.

Fake dnSpy - Poisoned in this chicken soup

The site's subsequent update page is titled Combolist-Cloud, with 45.32.253[.] 0 The combolist.cloud domain name records that exist in the resolution record are the same, and some files are distributed using mediafire or gofile.

Fake dnSpy - Poisoned in this chicken soup

The domain name is suspected to be a combolist[.] top fake site, combolist[.] top is a forum that provides leaked data.

Fake dnSpy - Poisoned in this chicken soup

torfiles[.] net is also a software download station.

Fake dnSpy - Poisoned in this chicken soup

Windows-software[.] co and windows-softeware[.] net is a download station created by the same set of templates.

Fake dnSpy - Poisoned in this chicken soup
Fake dnSpy - Poisoned in this chicken soup

shortbase[.] net owns the same dnspy[.] net is the same as the CyberPanel installation page, and the date is December 19, 2021.

Fake dnSpy - Poisoned in this chicken soup

The following figure is dnspy[.] Net The historical installation page of CyberPanel in the WaybackMachine record.

Fake dnSpy - Poisoned in this chicken soup

coolmint[.] net is also a download site and is still accessible as of January 12, 2022, but the download link is only a redirect to mega[.] nz:

Fake dnSpy - Poisoned in this chicken soup

filesr[.] net and toolbase[.] co for the same set of templates:

Fake dnSpy - Poisoned in this chicken soup

The About us for this site has not been modified:

Fake dnSpy - Poisoned in this chicken soup

The content of this page is from FileCR[.] The about us page of com has been modified from:

Fake dnSpy - Poisoned in this chicken soup

filesr[.] net's software is distributed using dropbox, but the current links are invalid.

Finally, zippyfiles[.] net, the site is a hack tool download station:

Fake dnSpy - Poisoned in this chicken soup

We also found a user named tuki1986 on reddit who had been promoting toolbase two months ago[.] co and zippyfiles[.] net site.

Fake dnSpy - Poisoned in this chicken soup

The site that the user promoted a year ago was bigwarez[.] net:

Fake dnSpy - Poisoned in this chicken soup

Looking at the site's history reveals that it is also a tool download site with multiple social media accounts associated with it:

Fake dnSpy - Poisoned in this chicken soup

Twitter @Bigwarez2:

Fake dnSpy - Poisoned in this chicken soup

[email protected]

Fake dnSpy - Poisoned in this chicken soup

The account now promotes websites as itools[.] digital, is a browser plug-in download station.

Fake dnSpy - Poisoned in this chicken soup

Facebook group @free.software.bigwarez:

Fake dnSpy - Poisoned in this chicken soup

LinkedIn - Currently inaccessible: @free-software-1055261b9.

tumblr@bigwarez。

Fake dnSpy - Poisoned in this chicken soup

Continuing to analyze the records of tuki1986, another website blackos was discovered[.] net:

Fake dnSpy - Poisoned in this chicken soup

The site is also a hacking tool download site:

Fake dnSpy - Poisoned in this chicken soup

And the threat intelligence platform is marked with backdoor software:

Fake dnSpy - Poisoned in this chicken soup

Through the site, a user named Sadoutlook1992 was found to have been publishing hacking tools in various hacking forums since 18 years.

Fake dnSpy - Poisoned in this chicken soup
Fake dnSpy - Poisoned in this chicken soup
Fake dnSpy - Poisoned in this chicken soup

At its latest event, download the link for zippyfiles[.] net:

Fake dnSpy - Poisoned in this chicken soup

From the malicious Github repository and the unzipped password, it is known that there is a username called "CarbonBlackz", which is retrieved by a search engine and found that the data breach site Raidforums[.] Com has a user named "Carbonblackz".

Fake dnSpy - Poisoned in this chicken soup

Similarly, accounts are registered in the Russian-language Black and Gray Forum, neither of which has posted any posts or replies and is suspected to have not been put into use.

Fake dnSpy - Poisoned in this chicken soup

It also published software download links in Vietnam's largest forum:

Fake dnSpy - Poisoned in this chicken soup
Fake dnSpy - Poisoned in this chicken soup

By looking at the WHOIS information for these domains, it was found that filesr[.] The contact email address for net is [email protected]:

Fake dnSpy - Poisoned in this chicken soup

The information querying the mailbox was linked to a 35-year-old person suspected to be from Russia.

Fake dnSpy - Poisoned in this chicken soup

Judging from the two IDs of carbon 1986 and tuki 1986, 1986 is suspected to be its birth year, which also meets the age of 35.

Based on the relevance, behavior patterns and similar promotion methods of these domains, we believe that these domains are related to dnspy[.] Net's attackers belong to the same group of people.

Fake dnSpy - Poisoned in this chicken soup

This is a well-built malicious organization that has been operating since at least October 2018, by registering a large number of websites, providing hacking tools/cracking software downloads, and promoting it on multiple social media, thus infecting hackers, security researchers, software developers, etc., with malicious behavior such as mining, stealing cryptocurrencies or stealing data through RAT software.

conclusion

Cracking software is not uncommon, but it is easier for security researchers to attack, because some hacking tools, analysis tools' sensitive behavior is more likely to be killed by soft avira, so some security researchers may turn off antivirus software to avoid annoying warnings.

While most of the malicious websites, Github repositories, and links used to distribute malware are now obsolete, security researchers and developers remain vigilant.

For various cracked/leaked hacking tools, it is recommended to run in a virtual environment, develop software, office software to download from the official website or formal channels, and it is recommended to use the genuine version to avoid unnecessary losses.

- END -