🚀 CloudSEK has raised $19M Series B1 Round – Powering the Future of Predictive Cybersecurity
Read More
Protect your organization from external threats like data leaks, brand threats, dark web originated threats and more. Schedule a demo today!
Schedule a DemoA new malware, dubbed “Blister,” by the Elastic Security team that identified it, is leveraging valid code-signing certificates in Windows systems, to avoid detection by antivirus software. The malware is named after one of its payloads, Blister, which further deploys second-stage payloads.
The threat actors orchestrating the Blister campaigns have been active since 15 September 2021, and have been using code-signing certificates that were validated on 23 August 2021. These certificates were issued by Sectigo to Blist LLC’s mail.ru email address. It is notable that mail.ru is a widely used Russian email service provider.
The malware masquerades malicious components as genuine executable files, due to which it has a low detection rate. Apart from using code-signing certificates, the threat actors are also leveraging other techniques, such as binding Blister to a legitimate library on the infected system, to stay under the radar.
Threat actors are known to use code-signing to circumvent basic static security checks to compromise the victim systems. The Blister malware is no different in that it uses a Sectigo issued certificate to make the loader malware program look genuine to security products. It then deploys a Remote Access Trojan (RAT) on the target system to gain unauthorized access.
A .dll file is used as a second stage payload to execute the encoded RAT/ CobaltStrike beacon. Since the .dll file has no malicious traces there have been very few detections on VirusTotal. However, the loader uses Rundll32.exe to execute the LaunchColorCpl function exported by the malicious .dll file.
Note: The content inside the .dll is the same despite having different names
In the part 2 of this article we will cover the internal working of the .dll payload in detail.
e6404260b4e42b7aa75bb0a96627ed3a | 304921a919ab5228687a4932bb66fab9 |
db8827d0d7b2addc05719e407216da14 | 1b33c1f232b2ed68ac108519caa2d35f |
755f50457416aeb7fee95a67abfea9fe | 1896e6b20128e85a9851b94753eabbdf |
6f76505a91c91c29238f0ed70b369417 | a91ba8f4a339a98fa94e810831e83d96 |
5a7dea7aa86ccd600f5a97e3b53f7338 | b8c9c560c6970a877a7ad359f37811d7 |
3efcd76417a185e48da71e22d230c547 |
fe7357d48906b68f094a81d19cc0ff93f56cc40454ac5f00e2e2d9c8ccdbc388 | fa885e9ea1293552cb45a89e740426fa9c313225ff77ad1980dfea83b6c4a91c |
f5104d0ead2f178711b1e23db3c16846de7d1a3ac04dbe09bacebb847775d76d | ed6910fd51d6373065a2f1d3580ad645f443bf0badc398aa77185324b0284db8 |
ed241c92f9bc969a160da2c4c0b006581fa54f9615646dd46467d24fe5526c7a | df8142e5cf897af65972041024ebe74c7915df0e18c6364c5fb9b2943426ed1a |
d54dfedda0efa36ed445d501845b61ab73c2102786be710ac19f697fc8d4ca5c | d0f934fd5d63a1524616bc13b51ce274539a8ead9b072e7f7fe1a14bb8b927a6 |
cc31c124fc39025f5c3a410ed4108a56bb7c6e90b5819167a06800d02ef1f028 | cb949ebe87c55c0ba6cf0525161e2e6670c1ae186ab83ce46047446e9753a926 |
ca09d9cd2f3cfcc06b33eff91d55602cb33a66ab3fd4f540b9212fce5ddae54a | c61d2ba1e001c137533cd7fb6b38fe71fee489d61dbcfea45c37c5ec1bcf845c |
c0f3b27ae4f7db457a86a38244225cca35aa0960eb6a685ed350e99a36c32b61 | bee3210360c5d0939c5d38b7b9f0c232cf9fbf93b46a19e53930a1606bda28a5 |
ba3a50930e7a144637faf88a98f2990a27532bfd20a93dc160eb2db4fbc17b58 | afb77617a4ca637614c429440c78da438e190dd1ca24dc78483aa731d80832c2 |
af555d61becfcf0c13d4bc8ea7ab97dcdc6591f8c6bb892290898d28ebce1c5d | a486e836026e184f7d3f30eaa4308e2f0c381c070af1f525118a484a987827c1 |
a34821b50aadee0dd85c382c43f44dae1e5fef0febf2f7aed6abf3f3e21f7994 | 9bccc1862e3e5a6c89524f2d76144d121d0ee95b1b8ba5d0ffcaa23025318a60 |
96bf7bd5f405d3b4c9a71bcd1060395f28f2466fdb91cafc6e261a31d41eb37a | 9472d4cb393256a62a466f6601014e5cb04a71f115499c320dc615245c7594d4 |
923b2f90749da76b997e1c7870ae3402aba875fdbdd64f79cbeba2f928884129 | 8e22cf159345852be585bc5a8e9af476b00bc91cdda98fd6a3244219a90ac9d9 |
8ae2c205220c95f0f7e1f67030a9027822cc18e941b669e2a52a5dbb5af74bc9 | 8a414a40419e32282d33af3273ff73a596a7ac8738e9cdca6e7db0e41c1a7658 |
863228efa55b54a8d03a87bb602a2e418856e0028ae409357454a6303b128224 | 84a67f191a93ee827c4829498d2cb1d27bdd9e47e136dc6652a5414dab440b74 |
81edf3a3b295b0189e54f79387e7df61250cc8eab4f1e8f42eb5042102df8f1f | 7cd03b30cfeea07b5ea4c8976e6456cb65e09f6b8e7dcc68884379925681b1c4 |
7b9091c41525f1721b12dcef601117737ea990cee17a8eecf81dcfb25ccb5a8f | 6c6f808f9b19e1fab1c1b83dc99386f0ceee8593ddfd461ac047eae812df8733 |
696f6274af4b9e8db4727269d43c83c350694bd1ef4bd5ccdc0806b1f014568a | 56ca9ea3f7870561ed3c6387daf495404ed3827f212472501d2541d5ccf8b941 |
5651e8a8e6f9c63c4c1162efadfcb4cdd9ad634c5e00a5ab03259fcdeaa225ac | 516cac58a6bfec5b9c214b6bba0b724961148199d32fb42c01b12ac31f6a6099 |
4fe551bcea5e07879ec84a7f1cea1036cfd0a3b03151403542cab6bd8541f8e5 | 44e5770751679f178f90ef7bd57e8e4ccfb6051767d8e906708c52184bf27f32 |
3c7480998ade344b74e956f7d3a3f1a989aaf43446163a62f0a8ed34b0c010d0 | 359ffa33784cb357ddabc42be1dcb9854ddb113fd8d6caf3bf0391380f9d640a |
2d049f7658a8dccd930f7010b32ed1bc9a5cc0f8109b511ca2a77a2104301369 | 294c710f4074b37ade714c83b6b7bf722a46aef61c02ba6543de5d59edc97b60 |
25a0d6a839c4dc708dcdd1ef9395570cc86d54d4725b7daf56964017f66be3c1 | 216cb4f2caeaf59f297f72f7f271b084637e5087d59411ac77ddd3b87e7a90aa |
1a10a07413115c254cb7a5c4f63ff525e64adfe8bb60acef946bb7656b7a2b3d | 17ea84d547e97a030d2b02ac2eaa9763ffb4f96f6c54659533a23e17268aabab |
00eb2f75822abeb2e222d007bdec464bfbc3934b8be12983cc898b37c6ace081 | 0a7778cf6f9a1bd894e89f282f2e40f9d6c9cd4b72be97328e681fe32a1b1a00 |
Explore the escalating wave of cyber threats on platforms like Google Groups and Usenet, uncovering the pivotal role of cybersecurity in safeguarding online discussion forums.
Threat actors have been abusing advertisement services to serve malware to users and redirect traffic to websites purchasing services from them.
A detailed blog on Analysis of the Global Malware Trend: Exploiting Undocumented OAuth2 Functionality to Regenerate Google Service Cookies Regardless of IP or Password Reset.
Take action now
CloudSEK Platform is a no-code platform that powers our products with predictive threat analytic capabilities.
Digital Risk Protection platform which gives Initial Attack Vector Protection for employees and customers.
Software and Supply chain Monitoring providing Initial Attack Vector Protection for Software Supply Chain risks.
Creates a blueprint of an organization's external attack surface including the core infrastructure and the software components.
Instant Security Score for any Android Mobile App on your phone. Search for any app to get an instant risk score.
min read
Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1)
A new malware, dubbed “Blister,” by the Elastic Security team that identified it, is leveraging valid code-signing certificates in Windows systems, to avoid detection by antivirus software. The malware is named after one of its payloads, Blister, which further deploys second-stage payloads.
The threat actors orchestrating the Blister campaigns have been active since 15 September 2021, and have been using code-signing certificates that were validated on 23 August 2021. These certificates were issued by Sectigo to Blist LLC’s mail.ru email address. It is notable that mail.ru is a widely used Russian email service provider.
The malware masquerades malicious components as genuine executable files, due to which it has a low detection rate. Apart from using code-signing certificates, the threat actors are also leveraging other techniques, such as binding Blister to a legitimate library on the infected system, to stay under the radar.
Threat actors are known to use code-signing to circumvent basic static security checks to compromise the victim systems. The Blister malware is no different in that it uses a Sectigo issued certificate to make the loader malware program look genuine to security products. It then deploys a Remote Access Trojan (RAT) on the target system to gain unauthorized access.
A .dll file is used as a second stage payload to execute the encoded RAT/ CobaltStrike beacon. Since the .dll file has no malicious traces there have been very few detections on VirusTotal. However, the loader uses Rundll32.exe to execute the LaunchColorCpl function exported by the malicious .dll file.
Note: The content inside the .dll is the same despite having different names
In the part 2 of this article we will cover the internal working of the .dll payload in detail.
e6404260b4e42b7aa75bb0a96627ed3a | 304921a919ab5228687a4932bb66fab9 |
db8827d0d7b2addc05719e407216da14 | 1b33c1f232b2ed68ac108519caa2d35f |
755f50457416aeb7fee95a67abfea9fe | 1896e6b20128e85a9851b94753eabbdf |
6f76505a91c91c29238f0ed70b369417 | a91ba8f4a339a98fa94e810831e83d96 |
5a7dea7aa86ccd600f5a97e3b53f7338 | b8c9c560c6970a877a7ad359f37811d7 |
3efcd76417a185e48da71e22d230c547 |
fe7357d48906b68f094a81d19cc0ff93f56cc40454ac5f00e2e2d9c8ccdbc388 | fa885e9ea1293552cb45a89e740426fa9c313225ff77ad1980dfea83b6c4a91c |
f5104d0ead2f178711b1e23db3c16846de7d1a3ac04dbe09bacebb847775d76d | ed6910fd51d6373065a2f1d3580ad645f443bf0badc398aa77185324b0284db8 |
ed241c92f9bc969a160da2c4c0b006581fa54f9615646dd46467d24fe5526c7a | df8142e5cf897af65972041024ebe74c7915df0e18c6364c5fb9b2943426ed1a |
d54dfedda0efa36ed445d501845b61ab73c2102786be710ac19f697fc8d4ca5c | d0f934fd5d63a1524616bc13b51ce274539a8ead9b072e7f7fe1a14bb8b927a6 |
cc31c124fc39025f5c3a410ed4108a56bb7c6e90b5819167a06800d02ef1f028 | cb949ebe87c55c0ba6cf0525161e2e6670c1ae186ab83ce46047446e9753a926 |
ca09d9cd2f3cfcc06b33eff91d55602cb33a66ab3fd4f540b9212fce5ddae54a | c61d2ba1e001c137533cd7fb6b38fe71fee489d61dbcfea45c37c5ec1bcf845c |
c0f3b27ae4f7db457a86a38244225cca35aa0960eb6a685ed350e99a36c32b61 | bee3210360c5d0939c5d38b7b9f0c232cf9fbf93b46a19e53930a1606bda28a5 |
ba3a50930e7a144637faf88a98f2990a27532bfd20a93dc160eb2db4fbc17b58 | afb77617a4ca637614c429440c78da438e190dd1ca24dc78483aa731d80832c2 |
af555d61becfcf0c13d4bc8ea7ab97dcdc6591f8c6bb892290898d28ebce1c5d | a486e836026e184f7d3f30eaa4308e2f0c381c070af1f525118a484a987827c1 |
a34821b50aadee0dd85c382c43f44dae1e5fef0febf2f7aed6abf3f3e21f7994 | 9bccc1862e3e5a6c89524f2d76144d121d0ee95b1b8ba5d0ffcaa23025318a60 |
96bf7bd5f405d3b4c9a71bcd1060395f28f2466fdb91cafc6e261a31d41eb37a | 9472d4cb393256a62a466f6601014e5cb04a71f115499c320dc615245c7594d4 |
923b2f90749da76b997e1c7870ae3402aba875fdbdd64f79cbeba2f928884129 | 8e22cf159345852be585bc5a8e9af476b00bc91cdda98fd6a3244219a90ac9d9 |
8ae2c205220c95f0f7e1f67030a9027822cc18e941b669e2a52a5dbb5af74bc9 | 8a414a40419e32282d33af3273ff73a596a7ac8738e9cdca6e7db0e41c1a7658 |
863228efa55b54a8d03a87bb602a2e418856e0028ae409357454a6303b128224 | 84a67f191a93ee827c4829498d2cb1d27bdd9e47e136dc6652a5414dab440b74 |
81edf3a3b295b0189e54f79387e7df61250cc8eab4f1e8f42eb5042102df8f1f | 7cd03b30cfeea07b5ea4c8976e6456cb65e09f6b8e7dcc68884379925681b1c4 |
7b9091c41525f1721b12dcef601117737ea990cee17a8eecf81dcfb25ccb5a8f | 6c6f808f9b19e1fab1c1b83dc99386f0ceee8593ddfd461ac047eae812df8733 |
696f6274af4b9e8db4727269d43c83c350694bd1ef4bd5ccdc0806b1f014568a | 56ca9ea3f7870561ed3c6387daf495404ed3827f212472501d2541d5ccf8b941 |
5651e8a8e6f9c63c4c1162efadfcb4cdd9ad634c5e00a5ab03259fcdeaa225ac | 516cac58a6bfec5b9c214b6bba0b724961148199d32fb42c01b12ac31f6a6099 |
4fe551bcea5e07879ec84a7f1cea1036cfd0a3b03151403542cab6bd8541f8e5 | 44e5770751679f178f90ef7bd57e8e4ccfb6051767d8e906708c52184bf27f32 |
3c7480998ade344b74e956f7d3a3f1a989aaf43446163a62f0a8ed34b0c010d0 | 359ffa33784cb357ddabc42be1dcb9854ddb113fd8d6caf3bf0391380f9d640a |
2d049f7658a8dccd930f7010b32ed1bc9a5cc0f8109b511ca2a77a2104301369 | 294c710f4074b37ade714c83b6b7bf722a46aef61c02ba6543de5d59edc97b60 |
25a0d6a839c4dc708dcdd1ef9395570cc86d54d4725b7daf56964017f66be3c1 | 216cb4f2caeaf59f297f72f7f271b084637e5087d59411ac77ddd3b87e7a90aa |
1a10a07413115c254cb7a5c4f63ff525e64adfe8bb60acef946bb7656b7a2b3d | 17ea84d547e97a030d2b02ac2eaa9763ffb4f96f6c54659533a23e17268aabab |
00eb2f75822abeb2e222d007bdec464bfbc3934b8be12983cc898b37c6ace081 | 0a7778cf6f9a1bd894e89f282f2e40f9d6c9cd4b72be97328e681fe32a1b1a00 |