September 25, 2023

Threat actors from a state-backed Iranian Cobalt Mirage are using a new custom malware dubbed Drokbk to attack a variety of US organizations, using GitHub as a dead-drop resolver.

MITRE refers to this as the use of dead-drop resolvers, which refers to adversaries posting content on legitimate Web services with embedded malicious domains or IP addresses in an effort to hide their nefarious intent.

Drokbk, in this campaign, uses the dead-drop resolver technique to find its C2 server by connecting to GitHub.

Drokbk is written in .NET, and it’s made up of a dropper and a payload. It is used to install a web shell on a compromised server, after which additional tools are deployed as part of the lateral expansion phase.

According to the researchers, Drokbk surfaced in February after an intrusion at a US local government network. It begins its attack with a compromise of a VMware Horizon server using the two Log4j vulnerabilities (CVE-2021-44228 and CVE-2021-45046).

Drokbk provides the threat actors with arbitrary remote access and an additional foothold, alongside tunneling tools like Fast Reverse Proxy (FRP) and Ngrok. It’s also a relatively unknown piece of malware.

Organizations to patch Internet-facing systems, noting well-known and popular vulnerabilities such as ProxyShell and Log4Shell, have been favored by this group.

The established APT groups are expected to continue to operate against targets aligned with Iranian intelligence interests, both foreign and domestic. The increased use of hacktivist and cybercrime personas will be used as cover for both intelligence-focused and disruptive operations.

This research was documented by researchers from Secureworks

Indicators of Compromise

  • 372b1946907ab9897737799f3bc8c131
  • e26a66bfe0da89405e25a66baad95b05
  • 4eb5c832ce940739d6c0eb1b4fc7a78d
  • 64f39b858c1d784df1ca8eb895ac7eaf
  • 47bf39acf008ed4ae27a796ac90f841b
  • 8c8e184c280db126e6fcfcc507aea925
  • aefab35127292cbe0e1d8a1a2fa7c39c
  • 29dc4cae5f08c215d57893483b5b42cb
  • 00a2d0e7d8361cda9feeaf515f8b5d9e
  • 14a0e5665a95714ff4951bd35eb73606
  • 0426f65ea5bcff9e0dc48e236bbec293
  • a8e18a84898f46cd88813838f5e69f05
  • 240c4853af2aee5917dcee3a3e2a5d5a
  • b90f05b5e705e0b0cb47f51b985f84db
  • 5bd0690247dc1e446916800af169270f
  • 28332bdbfaeb8333dad5ada3c10819a1
  • a015db9106d5e8a74beaaf03797511aa
  • activate-microsoft.cf
  • dns-iprecords.tk
  • oracle-java.cf
  • 51.89.135.154
  • 142.44.149.199
  • 142.44.149.199/gsdi546gsja
  • universityofmhealth.biz
  • 142.44.198.202

Leave a Reply

%d bloggers like this: