11
mins read

How Threat Actors Exploit Brand Collaborations to Target Popular YouTube Channels

Cybercriminals are increasingly targeting YouTube creators by exploiting fake brand collaboration offers to distribute malware. These sophisticated phishing campaigns involve carefully crafted emails that impersonate trusted brands, presenting enticing partnership deals. The malware, disguised as legitimate documents like contracts or promotional materials, is often delivered through password-protected files hosted on platforms such as OneDrive to evade detection. Once downloaded, the malware can steal sensitive information, including login credentials and financial data, while also granting attackers remote access to the victim’s systems. With content creators and marketers as primary targets, this global campaign underscores the importance of verifying collaboration requests and adopting robust cybersecurity measures to protect against such threats.

Mayank Sahariya
December 16, 2024
Green Alert
Last Update posted on
December 16, 2024
Table of Contents
Author(s)
No items found.

Executive Summary

This report highlights a sophisticated malware campaign targeting businesses through email phishing. The attackers are leveraging trusted brand names and professional collaboration offers as a cover to distribute malicious attachments. The email subject lines and contents are carefully crafted to appear as legitimate business opportunities, including promotions, partnership proposals, and marketing collaborations.

Key characteristics of the campaign include:

  • Email Payload: The malware is hidden within attachments such as Word documents, PDFs, or Excel files, often masquerading as promotional materials, contracts, or business proposals.
  • Delivery Method: The phishing emails are sent from spoofed or compromised email addresses, making them seem credible. Recipients are lured into downloading the attached files, believing they are legitimate business offers.
  • Malware Behavior: Once the attachment is opened, the malware installs itself on the victim's system. This malware is typically designed to steal sensitive data, including login credentials, financial information, and intellectual property, or to provide remote access to the attacker.
  • Target Audience: Businesses and individuals in marketing, sales, and executive positions are the primary targets, given their propensity to engage in brand promotions and partnerships.

Mindmap of malware campaign

Overview:

Cloudsek's threat researcher team has uncovered a malware campaign in which threat actors impersonate popular brands and their professional collaboration offers as a disguise to distribute malicious attachments. In the email below, the threat actor presents a brand collaboration proposal from, including a compensation structure based on subscriber count.

Brand Collaboration Email

At the end of the email, the threat actor includes instructions and a OneDrive link to access a zip file containing the agreement and promotional materials, secured with the password.

Brand Collaboration Email

When the YouTube victim clicked the URL in the email, they were directed to a Drive page. Further inspection revealed the Drive owner’s email, “[email protected],” and a creation date of 08/15/2024 for the OneDrive account. 

Snapshot of Onedrive containing rar file

Malicious payload is embedded within two compressed files. This tactic is used to evade detection by common security filters and antivirus solutions. Once the archive is extracted, the malware is deployed, potentially compromising the recipient’s system. i.e.  Media Assets Complete Collection.rar >  Contracts and Agreement Archive Collection.rar (password protected”). On extracting we could see four files, wherein Digital Agreement Terms and Payments  Comprehensive  Evaluation.exe is a malicious payload.

Snapshot of extracted element of Contracts and Agreement Archive Collection.rar

Modus Operandi:

Attack Initialization:

  • YouTube Parser: Attackers use a parser to collect bulk email addresses from YouTube channels, targeting creators and organizations.
  • Automation: Tools like Browser Automation are employed to send bulk phishing emails using SMTP servers (e.g., Murena/Onet.eu).

Phishing Stage:

  • Spoofed Emails: Emails are crafted to appear as brand collaboration requests. 
  • Malicious Attachment: Victims are sent a password-protected zip file, hosted on cloud services like OneDrive.

Malware Delivery:

  • Download: Victims download the zip file, believing it to be legitimate.
  • Execution: Once extracted, the file deploys a malicious script (webcams.pif) using AutoIt3 automation to execute malware.

System Infection:

  • Malware Execution: The payload (e.g., an EXE file) infects the victim’s machine.
  • Data Exfiltration: Stolen data like browser credentials, cookies, clip board data is transmitted to a Command and Control (C2) server.

Analysis and Attribution:

Our investigation began by analysing a sample, where it was flagged as malicious by 15 antivirus vendors on VirusTotal. Further analysis revealed that the sample drops a file named webcam.pif (AutoIt3.exe). The hash of this file, d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd, matched prior research conducted by the Qualys team, linking it to a campaign associated with the Lumma Stealer.

Virustotal result of Digital Agreement Terms and Payments Comprehensive Evaluation.exe

Key Imports and Their Potential Malicious Use

  1. Clipboard-related Functions (Suspicious - T1115 | Clipboard Data)some text
    • CloseClipboard / OpenClipboard / EmptyClipboard / SetClipboardDatasome text
      • These functions are used to manipulate the clipboard.
      • Malicious Use: Malware often uses clipboard functions to steal or replace data that users copy/paste (e.g., passwords, cryptocurrency wallet addresses).
      • MITRE ATT&CK T1115: Clipboard data is often a target for information-stealing malware that can access and alter clipboard contents.
  2. File and Process Functions (Potentially Malicious)some text
    • WriteFilesome text
      • Used to write data to a file.
      • Malicious Use: Could be used by malware to write malicious payloads, drop files onto the system, or log stolen data.
    • GetCurrentProcess / OpenProcesssome text
      • These functions are related to retrieving and interacting with processes.
      • Malicious Use: Common in malware for process injection, where the malicious code is injected into a legitimate process to evade detection.
      • MITRE ATT&CK T1055: Process Injection is a technique used by malware to run its code in the address space of another process, allowing it to hide and evade security mechanisms.
  3. File System Functionsome text
    • SHGetSpecialFolderLocationsome text
      • This function is used to retrieve the path of special folders like Desktop or Documents.
      • Malicious Use: Malware could use this to locate user-specific directories to either drop malicious files or steal user data.

Command & Control:

The malware communicates with Command and Control (C2) servers to exfiltrate stolen data. Initially, it attempts to make a DNS request to "ukCmCsVdaZGZaOh.ukCmCsVdaZGZaOh," though these servers are currently unreachable. Subsequently, the malware connects to the IP address 89.105.223.80 on port 27105 and resolves the URL http://vm95039.vps.client-server.site:27105/.

DNS: ukCmCsVdaZGZaOh.ukCmCsVdaZGZaOh

Snapshot of malware connecting with ukCmCsVdaZGZaOh.ukCmCsVdaZGZaOh

TCP: 89.105.223.80:27105

Snapshot of malware connecting with 89.105.223.80 on port 27105

Resolve: http://vm95039.vps.client-server.site:27105/

malware connecting with 89.105.223.80 on port 27105 resolves http://vm95039.vps.client-server.site:27105/

Process Tree: 

The Digital Agreement Terms and Payments comprehensive Evaluation.exe initiates the execution directly in temp directory and copies “Larger.bat” and “Webcamps.pif” into the directory. This could be an attempt to create a batch script for automated execution of additional commands, often used by malware for persistence or to trigger further malicious activity. 

The obfuscated Larger.bat file checks for antivirus processes, including wrsa.exe (Webroot), opssvc.exe (Quick Heal), and bdservicehost.exe (Bitdefender), among others, by using the tasklist and findstr commands. Malware often performs these checks to identify and potentially disable antivirus programs.

Obfuscated code of Larger.bat

De-Obfuscated code of Larger.bat

After execution, a legitimate AutoIt scripting interpreter (disguised as "webcams.pif") is downloaded to run a heavily obfuscated script (referred to as “V” in the analyzed sample). This script is assembled by concatenating various "chunks" of data from several other files, which are created through a series of copy-and-merge operations executed from the command prompt.

series of copy-and-merge operations executed from the command prompt script

The purpose of the AutoIt script is to deploy the legitimate RegAsm.exe binary, which serves as a container for injecting malicious .NET code. AutoIt is a development language frequently utilized by malware authors to create and obfuscate malicious software.

Process tree

The malware drops two files webcams.pif and RegAsm.exe into the folder named "10183” of temp directory.

Malware created a folder “10183” and dropped RegAsm.exe and Wabcams.pif

https://www.virustotal.com/gui/file/d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd/relations

Virustotal result of webcams.pif (Autoit3.exe)

Malware dropped larger.bat and other chucks of file in temp directory.

Hunting Threat Actor Infrastructure: 

We conducted a deeper investigation into the threat actor's infrastructure and discovered a malicious compressed RAR file uploaded to OneDrive. Further analysis revealed the owner’s email, “[email protected],” and noted that the RAR file was last updated on 8/15/2024.

Snapshot containing One drive creator’s details

Stealer Log Analysis: 

Interestingly, we also discovered a stealer log from the threat actor’s email account, exposing details of the entire campaign. This included SMTP email accounts (such as onet.eu and Murena.io), SOCKS5 proxies, Google Cloud APIs, victim emails and cookies, as well as phishing templates.

It appears that a multi-parser tool was used to collect data from YouTube, allowing the threat actor to obtain a large number of email addresses associated with YouTube channels as part of their initial reconnaissance efforts.

Snapshot shows stealer logs of threat actors containing automation tools, script, templates.

Here is a template from the stealer log used to impersonate brands for sending malicious spam emails to users.

 Templates used by threat actor to target brand

Templates used by threat actor to target brand

Threat actors create templates for fake SMTP or temporary email accounts to send emails with malicious attachments. These templates are designed to impersonate legitimate brands, using familiar logos, formatting, and language to deceive recipients and increase the likelihood that they’ll open the harmful attachment.

Templates used by threat actor to create SMTP/spear phishing email

Numerous SMTP accounts impersonating public relations and media entities have been created to target YouTube audiences.

Snapshot shows multiple SMTP accounts impersonating public relations and media entities 

From information.txt, we found that the threat actor is using automation tools for sending spear phishing emails and other automation tasks.

Automation tools for sending spear phishing emails and other automation tasks.

We were able to log into the Murena.io SMTP account and found evidence of a large-scale campaign, with the threat actor sending around 500-1,000 spam emails from a single email address, impersonating the Popular Brand. Below is a screenshot of one of the phishing emails sent to victims.

Access to one of the SMTP accounts revealed a large-scale spear-phishing campaign targeting Popular brand

Snapshot shows large-scale spear-phishing campaign targeting popular brand

We also discovered a history of previous login sessions, which included details such as session IP, region, login time, and device type. 

Previous login sessions revealed session IP, region, login time, and device type. 

Detailed information for one of the IP addresses indicates that it belongs to an ISP and may be a compromised user machine frequently exploited by threat actors. 91.94.88.209

Snapshot shows IP address details 

The phone number registered on the SMTP mail account is +48537977468, which has a Poland country code. However, it might be a temporary mobile number.

Snapshot shows SMTP mail registered with Phone number +48537977468

Our researchers noted a username "raez228” in Threat actor’s stealer log.

Username "raez228” in Threat actor’s stealer log

We found a match for the username "raez228" on a gaming platform called Twitch.tv, which is used for streaming live gaming sessions. 

Twitch Profile: https://www.twitch.tv/raez228/about 

Twitch profile found with user name “raez228”

Diamond Model of Intrusion Analysis:  

This diamond model highlights a well-coordinated and resourceful threat actor leveraging advanced tools and techniques to compromise social media accounts and organizations globally.

Diamond Model of Adversary’ infrastructure

Adversary

The adversary leverages malware and sophisticated techniques for targeted attacks. Their actions suggest a well-organized group with access to diverse tools and resources.

Infrastructure

The adversary uses a robust infrastructure to support its campaigns, including:

  • 340+ SMTP servers (e.g., Murena/Onet.eu) for email-based phishing or spam campaigns.
  • 46+ Remote Desktop Protocols (RDPs), likely used for accessing compromised systems or deploying malware.
  • 26+ SOCKS5 Proxies, which help anonymize traffic and facilitate stealthy communication with Command and Control (C2) servers.
  • Automation tools like Youparser, Browser Automation Studio, and Zennobox to streamline operations such as spear phishing, credential harvesting and scaling attacks.

Capability

The adversary exhibits the following key capabilities:

  • Malware deployment: Leveraging malicious software to infiltrate and control target systems.
  • Social engineering: Manipulating individuals to gain unauthorized access to accounts or systems.
  • Account takeovers: Gaining unauthorized access to victim accounts for exploitation.
  • Credential and cookie harvesting: Stealing login information and session cookies for unauthorized account access or lateral movement.

Victims

  • Industry: Focus on social media platforms and associated organizations.
  • Platforms: YouTube is a primary target, indicating an intent to exploit its user base or platform features.
  • Organizations: Entities have been targeted, likely for phishing, fraud, or impersonation purposes.

Geography: The campaign has a global impact, with no specific regional focus.

MITRE ATT&CK Tactics and Techniques:

MITRE Tactics and Techniques

MITRE ATT&CK Framework: Tactics and Techniques

Tactic Techniques
Reconnaissance Gather Victim Identity Information (T1589.002), Gather Victim Network Information (T1590)
Resource Development Valid Accounts (T1078), Default Accounts (T1078.001), Email Addresses (T1589.001), Employee Names (T1589.003), DNS Server (T1589.004)
Initial Access Drive-by Compromise (T1189), Spearphishing Link (T1566.002)
Execution Windows Management Instrumentation (T1047), Scripting (T1059), Process Injection (T1055)
Persistence Scheduled Task/Job (T1053), DLL Side-Loading (T1574.002)
Privilege Escalation DLL Side-Loading (T1574.002), Process Injection (T1055), Logon Script (Windows) (T1037.001), Security Account Manager (T1003.003), NTDS (T1003.006)
Defense Evasion Process Injection (T1055), Masquerading (T1036), Virtualization/Sandbox Evasion (T1497), Disable or Modify Tools (T1562), Deobfuscate/Decode Files or Information (T1140)
Credential Access OS Credential Dumping (T1003), Security Account Manager (T1003.003)
Discovery Process Discovery (T1057), System Information Discovery (T1082), Internet Connection Discovery (T1016), File and Directory Discovery (T1083), Browser Information Discovery (T1217)
Lateral Movement Remote Services (T1021), SMB/Windows Admin Shares (T1021.002), Distributed Component Object Model (T1021.003)
Collection Data from Local System (T1005), Data from Removable Media (T1025), Input Capture (T1056), Keylogging (T1056.001), Data from Network Shared Drive (T1039)
Command and Control Application Layer Protocol (T1071)
Exfiltration Exfiltration Over C2 Channel (T1041)

Indicators of Compromise (IoCs):

Hashes, URLs, and IPv4 Table

Hashes, URLs, and IPv4 Data

Hash's
564de0f055afa822add5e46761cba0c422f6a5e060ab7d2133599d8759598d50 Sha256
C49ef71c9ac46cbb859d171985a5bf69565517b6 Sha1
1cdd0761807ae68a8090e67a63529e07 MD5
d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd Sha256
URL
ukCmCsVdaZGZaOh.ukCmCsVdaZGZaOh http://vm95039.vps.client-server.site:27105/
IPv4
89.105.223.80:27105 34.149.100.209:443
142.251.184.94:443 218.85.157.99:53
20.99.186.246:443 152.195.19.97:443

References

Predict Cyber threats against your organization

Related Posts
No items found.

Join 10,000+ subscribers

Keep up with the latest news about strains of Malware, Phishing Lures,
Indicators of Compromise, and Data Leaks.

Take action now

Secure your organisation with our Award winning Products

CloudSEK Platform is a no-code platform that powers our products with predictive threat analytic capabilities.

Scam

11

min read

How Threat Actors Exploit Brand Collaborations to Target Popular YouTube Channels

Cybercriminals are increasingly targeting YouTube creators by exploiting fake brand collaboration offers to distribute malware. These sophisticated phishing campaigns involve carefully crafted emails that impersonate trusted brands, presenting enticing partnership deals. The malware, disguised as legitimate documents like contracts or promotional materials, is often delivered through password-protected files hosted on platforms such as OneDrive to evade detection. Once downloaded, the malware can steal sensitive information, including login credentials and financial data, while also granting attackers remote access to the victim’s systems. With content creators and marketers as primary targets, this global campaign underscores the importance of verifying collaboration requests and adopting robust cybersecurity measures to protect against such threats.

Authors
Mayank Sahariya
Co-Authors
No items found.

Executive Summary

This report highlights a sophisticated malware campaign targeting businesses through email phishing. The attackers are leveraging trusted brand names and professional collaboration offers as a cover to distribute malicious attachments. The email subject lines and contents are carefully crafted to appear as legitimate business opportunities, including promotions, partnership proposals, and marketing collaborations.

Key characteristics of the campaign include:

  • Email Payload: The malware is hidden within attachments such as Word documents, PDFs, or Excel files, often masquerading as promotional materials, contracts, or business proposals.
  • Delivery Method: The phishing emails are sent from spoofed or compromised email addresses, making them seem credible. Recipients are lured into downloading the attached files, believing they are legitimate business offers.
  • Malware Behavior: Once the attachment is opened, the malware installs itself on the victim's system. This malware is typically designed to steal sensitive data, including login credentials, financial information, and intellectual property, or to provide remote access to the attacker.
  • Target Audience: Businesses and individuals in marketing, sales, and executive positions are the primary targets, given their propensity to engage in brand promotions and partnerships.

Mindmap of malware campaign

Overview:

Cloudsek's threat researcher team has uncovered a malware campaign in which threat actors impersonate popular brands and their professional collaboration offers as a disguise to distribute malicious attachments. In the email below, the threat actor presents a brand collaboration proposal from, including a compensation structure based on subscriber count.

Brand Collaboration Email

At the end of the email, the threat actor includes instructions and a OneDrive link to access a zip file containing the agreement and promotional materials, secured with the password.

Brand Collaboration Email

When the YouTube victim clicked the URL in the email, they were directed to a Drive page. Further inspection revealed the Drive owner’s email, “[email protected],” and a creation date of 08/15/2024 for the OneDrive account. 

Snapshot of Onedrive containing rar file

Malicious payload is embedded within two compressed files. This tactic is used to evade detection by common security filters and antivirus solutions. Once the archive is extracted, the malware is deployed, potentially compromising the recipient’s system. i.e.  Media Assets Complete Collection.rar >  Contracts and Agreement Archive Collection.rar (password protected”). On extracting we could see four files, wherein Digital Agreement Terms and Payments  Comprehensive  Evaluation.exe is a malicious payload.

Snapshot of extracted element of Contracts and Agreement Archive Collection.rar

Modus Operandi:

Attack Initialization:

  • YouTube Parser: Attackers use a parser to collect bulk email addresses from YouTube channels, targeting creators and organizations.
  • Automation: Tools like Browser Automation are employed to send bulk phishing emails using SMTP servers (e.g., Murena/Onet.eu).

Phishing Stage:

  • Spoofed Emails: Emails are crafted to appear as brand collaboration requests. 
  • Malicious Attachment: Victims are sent a password-protected zip file, hosted on cloud services like OneDrive.

Malware Delivery:

  • Download: Victims download the zip file, believing it to be legitimate.
  • Execution: Once extracted, the file deploys a malicious script (webcams.pif) using AutoIt3 automation to execute malware.

System Infection:

  • Malware Execution: The payload (e.g., an EXE file) infects the victim’s machine.
  • Data Exfiltration: Stolen data like browser credentials, cookies, clip board data is transmitted to a Command and Control (C2) server.

Analysis and Attribution:

Our investigation began by analysing a sample, where it was flagged as malicious by 15 antivirus vendors on VirusTotal. Further analysis revealed that the sample drops a file named webcam.pif (AutoIt3.exe). The hash of this file, d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd, matched prior research conducted by the Qualys team, linking it to a campaign associated with the Lumma Stealer.

Virustotal result of Digital Agreement Terms and Payments Comprehensive Evaluation.exe

Key Imports and Their Potential Malicious Use

  1. Clipboard-related Functions (Suspicious - T1115 | Clipboard Data)some text
    • CloseClipboard / OpenClipboard / EmptyClipboard / SetClipboardDatasome text
      • These functions are used to manipulate the clipboard.
      • Malicious Use: Malware often uses clipboard functions to steal or replace data that users copy/paste (e.g., passwords, cryptocurrency wallet addresses).
      • MITRE ATT&CK T1115: Clipboard data is often a target for information-stealing malware that can access and alter clipboard contents.
  2. File and Process Functions (Potentially Malicious)some text
    • WriteFilesome text
      • Used to write data to a file.
      • Malicious Use: Could be used by malware to write malicious payloads, drop files onto the system, or log stolen data.
    • GetCurrentProcess / OpenProcesssome text
      • These functions are related to retrieving and interacting with processes.
      • Malicious Use: Common in malware for process injection, where the malicious code is injected into a legitimate process to evade detection.
      • MITRE ATT&CK T1055: Process Injection is a technique used by malware to run its code in the address space of another process, allowing it to hide and evade security mechanisms.
  3. File System Functionsome text
    • SHGetSpecialFolderLocationsome text
      • This function is used to retrieve the path of special folders like Desktop or Documents.
      • Malicious Use: Malware could use this to locate user-specific directories to either drop malicious files or steal user data.

Command & Control:

The malware communicates with Command and Control (C2) servers to exfiltrate stolen data. Initially, it attempts to make a DNS request to "ukCmCsVdaZGZaOh.ukCmCsVdaZGZaOh," though these servers are currently unreachable. Subsequently, the malware connects to the IP address 89.105.223.80 on port 27105 and resolves the URL http://vm95039.vps.client-server.site:27105/.

DNS: ukCmCsVdaZGZaOh.ukCmCsVdaZGZaOh

Snapshot of malware connecting with ukCmCsVdaZGZaOh.ukCmCsVdaZGZaOh

TCP: 89.105.223.80:27105

Snapshot of malware connecting with 89.105.223.80 on port 27105

Resolve: http://vm95039.vps.client-server.site:27105/

malware connecting with 89.105.223.80 on port 27105 resolves http://vm95039.vps.client-server.site:27105/

Process Tree: 

The Digital Agreement Terms and Payments comprehensive Evaluation.exe initiates the execution directly in temp directory and copies “Larger.bat” and “Webcamps.pif” into the directory. This could be an attempt to create a batch script for automated execution of additional commands, often used by malware for persistence or to trigger further malicious activity. 

The obfuscated Larger.bat file checks for antivirus processes, including wrsa.exe (Webroot), opssvc.exe (Quick Heal), and bdservicehost.exe (Bitdefender), among others, by using the tasklist and findstr commands. Malware often performs these checks to identify and potentially disable antivirus programs.

Obfuscated code of Larger.bat

De-Obfuscated code of Larger.bat

After execution, a legitimate AutoIt scripting interpreter (disguised as "webcams.pif") is downloaded to run a heavily obfuscated script (referred to as “V” in the analyzed sample). This script is assembled by concatenating various "chunks" of data from several other files, which are created through a series of copy-and-merge operations executed from the command prompt.

series of copy-and-merge operations executed from the command prompt script

The purpose of the AutoIt script is to deploy the legitimate RegAsm.exe binary, which serves as a container for injecting malicious .NET code. AutoIt is a development language frequently utilized by malware authors to create and obfuscate malicious software.

Process tree

The malware drops two files webcams.pif and RegAsm.exe into the folder named "10183” of temp directory.

Malware created a folder “10183” and dropped RegAsm.exe and Wabcams.pif

https://www.virustotal.com/gui/file/d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd/relations

Virustotal result of webcams.pif (Autoit3.exe)

Malware dropped larger.bat and other chucks of file in temp directory.

Hunting Threat Actor Infrastructure: 

We conducted a deeper investigation into the threat actor's infrastructure and discovered a malicious compressed RAR file uploaded to OneDrive. Further analysis revealed the owner’s email, “[email protected],” and noted that the RAR file was last updated on 8/15/2024.

Snapshot containing One drive creator’s details

Stealer Log Analysis: 

Interestingly, we also discovered a stealer log from the threat actor’s email account, exposing details of the entire campaign. This included SMTP email accounts (such as onet.eu and Murena.io), SOCKS5 proxies, Google Cloud APIs, victim emails and cookies, as well as phishing templates.

It appears that a multi-parser tool was used to collect data from YouTube, allowing the threat actor to obtain a large number of email addresses associated with YouTube channels as part of their initial reconnaissance efforts.

Snapshot shows stealer logs of threat actors containing automation tools, script, templates.

Here is a template from the stealer log used to impersonate brands for sending malicious spam emails to users.

 Templates used by threat actor to target brand

Templates used by threat actor to target brand

Threat actors create templates for fake SMTP or temporary email accounts to send emails with malicious attachments. These templates are designed to impersonate legitimate brands, using familiar logos, formatting, and language to deceive recipients and increase the likelihood that they’ll open the harmful attachment.

Templates used by threat actor to create SMTP/spear phishing email

Numerous SMTP accounts impersonating public relations and media entities have been created to target YouTube audiences.

Snapshot shows multiple SMTP accounts impersonating public relations and media entities 

From information.txt, we found that the threat actor is using automation tools for sending spear phishing emails and other automation tasks.

Automation tools for sending spear phishing emails and other automation tasks.

We were able to log into the Murena.io SMTP account and found evidence of a large-scale campaign, with the threat actor sending around 500-1,000 spam emails from a single email address, impersonating the Popular Brand. Below is a screenshot of one of the phishing emails sent to victims.

Access to one of the SMTP accounts revealed a large-scale spear-phishing campaign targeting Popular brand

Snapshot shows large-scale spear-phishing campaign targeting popular brand

We also discovered a history of previous login sessions, which included details such as session IP, region, login time, and device type. 

Previous login sessions revealed session IP, region, login time, and device type. 

Detailed information for one of the IP addresses indicates that it belongs to an ISP and may be a compromised user machine frequently exploited by threat actors. 91.94.88.209

Snapshot shows IP address details 

The phone number registered on the SMTP mail account is +48537977468, which has a Poland country code. However, it might be a temporary mobile number.

Snapshot shows SMTP mail registered with Phone number +48537977468

Our researchers noted a username "raez228” in Threat actor’s stealer log.

Username "raez228” in Threat actor’s stealer log

We found a match for the username "raez228" on a gaming platform called Twitch.tv, which is used for streaming live gaming sessions. 

Twitch Profile: https://www.twitch.tv/raez228/about 

Twitch profile found with user name “raez228”

Diamond Model of Intrusion Analysis:  

This diamond model highlights a well-coordinated and resourceful threat actor leveraging advanced tools and techniques to compromise social media accounts and organizations globally.

Diamond Model of Adversary’ infrastructure

Adversary

The adversary leverages malware and sophisticated techniques for targeted attacks. Their actions suggest a well-organized group with access to diverse tools and resources.

Infrastructure

The adversary uses a robust infrastructure to support its campaigns, including:

  • 340+ SMTP servers (e.g., Murena/Onet.eu) for email-based phishing or spam campaigns.
  • 46+ Remote Desktop Protocols (RDPs), likely used for accessing compromised systems or deploying malware.
  • 26+ SOCKS5 Proxies, which help anonymize traffic and facilitate stealthy communication with Command and Control (C2) servers.
  • Automation tools like Youparser, Browser Automation Studio, and Zennobox to streamline operations such as spear phishing, credential harvesting and scaling attacks.

Capability

The adversary exhibits the following key capabilities:

  • Malware deployment: Leveraging malicious software to infiltrate and control target systems.
  • Social engineering: Manipulating individuals to gain unauthorized access to accounts or systems.
  • Account takeovers: Gaining unauthorized access to victim accounts for exploitation.
  • Credential and cookie harvesting: Stealing login information and session cookies for unauthorized account access or lateral movement.

Victims

  • Industry: Focus on social media platforms and associated organizations.
  • Platforms: YouTube is a primary target, indicating an intent to exploit its user base or platform features.
  • Organizations: Entities have been targeted, likely for phishing, fraud, or impersonation purposes.

Geography: The campaign has a global impact, with no specific regional focus.

MITRE ATT&CK Tactics and Techniques:

MITRE Tactics and Techniques

MITRE ATT&CK Framework: Tactics and Techniques

Tactic Techniques
Reconnaissance Gather Victim Identity Information (T1589.002), Gather Victim Network Information (T1590)
Resource Development Valid Accounts (T1078), Default Accounts (T1078.001), Email Addresses (T1589.001), Employee Names (T1589.003), DNS Server (T1589.004)
Initial Access Drive-by Compromise (T1189), Spearphishing Link (T1566.002)
Execution Windows Management Instrumentation (T1047), Scripting (T1059), Process Injection (T1055)
Persistence Scheduled Task/Job (T1053), DLL Side-Loading (T1574.002)
Privilege Escalation DLL Side-Loading (T1574.002), Process Injection (T1055), Logon Script (Windows) (T1037.001), Security Account Manager (T1003.003), NTDS (T1003.006)
Defense Evasion Process Injection (T1055), Masquerading (T1036), Virtualization/Sandbox Evasion (T1497), Disable or Modify Tools (T1562), Deobfuscate/Decode Files or Information (T1140)
Credential Access OS Credential Dumping (T1003), Security Account Manager (T1003.003)
Discovery Process Discovery (T1057), System Information Discovery (T1082), Internet Connection Discovery (T1016), File and Directory Discovery (T1083), Browser Information Discovery (T1217)
Lateral Movement Remote Services (T1021), SMB/Windows Admin Shares (T1021.002), Distributed Component Object Model (T1021.003)
Collection Data from Local System (T1005), Data from Removable Media (T1025), Input Capture (T1056), Keylogging (T1056.001), Data from Network Shared Drive (T1039)
Command and Control Application Layer Protocol (T1071)
Exfiltration Exfiltration Over C2 Channel (T1041)

Indicators of Compromise (IoCs):

Hashes, URLs, and IPv4 Table

Hashes, URLs, and IPv4 Data

Hash's
564de0f055afa822add5e46761cba0c422f6a5e060ab7d2133599d8759598d50 Sha256
C49ef71c9ac46cbb859d171985a5bf69565517b6 Sha1
1cdd0761807ae68a8090e67a63529e07 MD5
d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd Sha256
URL
ukCmCsVdaZGZaOh.ukCmCsVdaZGZaOh http://vm95039.vps.client-server.site:27105/
IPv4
89.105.223.80:27105 34.149.100.209:443
142.251.184.94:443 218.85.157.99:53
20.99.186.246:443 152.195.19.97:443

References