The Separ infostealer is using what’s known as “Living off the Land” tactics to target businesses as part of an ongoing attack campaign.
Digital security company Deep Instinct detected the campaign and observed that an infection begins when an employee at a business organization receives a phishing email. The email comes with an attached PDF document that appears to pertain to shipment or equipment specifications. In actuality, the document is a self-extracting archive that contains a VB Script, two batch scripts and four executable files, with some of those masquerading as legitimate Adobe resources.
Clicking on the PDF document initiates a sequence that eventually runs adob02.bat. This file is responsible for performing Separ’s main malicious actions, including changing the firewall settings, executing SecurityXploded’s Email and Browser Password Dumps to steal credentials and saving ipconfig/all results into a file. It then uses FTP to upload the files to freehostia.com.
What makes Separ stand out is its use of legitimate executables within its ongoing attack campaign. For example, adob02.bat makes use of xcopy.exe, attrib.exe and sleep.exe (renamed Areada.exe) to complete its malicious actions. Additionally, the malware uses ancp.exe, legitimate FTP software developed by NcFTP, to complete its upload to freehostia.com, a legitimate service.
Although “Living off the Land” is considered a type of file-less attack, this is an inaccurate definition, as the attack does involve executable files. In many cases these files are already found on disk in the victim’s machine (hence the term “Living off (Read more...)
*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/separ-infostealer-using-living-off-the-land-tactics-to-target-businesses/