PureCryptor Abuses Discord Network
Researchers have discovered an unknown threat group has been targeting government agencies in the Asia Pacific and North America regions via abuse of the popular Discord network and a hijacked website belonging to a non-profit.
The two-stage attacks include enticing victims to install the PureCrypter downloader, which then delivers a variety of possible malware payloads.
It is written in .Net and support all windows operating system, and the primary goal is to steal stored passwords from different browsers, clipboard logging, screen keylogging, and screen capturing.
PureCrypter campaign works by using the domain of a compromised non-profit organization as a command and control (C2) to deliver a secondary payload. This campaign delivered several types of malware, including Redline Stealer, Agent Tesla, Eternity, Blackmon, and Philadelphia ransomware.
The following steps were taken by the attacker to deliver the payload:
- An email with the Discord app URL pointing to a malicious password-protected zip file is sent to the victim (https://cdn[.]discordapp. com/attachments/1006638283645784218/1048923462128914512/Private_file__dont_share.zip , pwd – 1234)
- The ZIP extracts a loader written in .net called PureCrypter. The loader tries to download a secondary payload from the compromised non-profit organization shown in the below screenshot. At the time of investigation, the compromised non-profit organization’s website was down, and we didn’t get its secondary payload.
The researchers said that while leaving credentials in malware was an operational failure by the threat actor, it left a trace for analysts to follow. Hosting it on Discord is becoming a common TTP, and Discord responds quickly to malware takedown requests. Threat actors increasingly are using pay malware written and tested by third parties
This research was documented by researchers from Menlo Security
Indicators of Compromise
- Username: “ddd@mgcpakistan[.]com”