Site icon TheCyberThrone

PureCryptor Abuses Discord Network

Advertisements

Researchers have discovered an unknown threat group has been targeting government agencies in the Asia Pacific and North America regions via abuse of the popular Discord network and a hijacked website belonging to a non-profit.

The two-stage attacks include enticing victims to install the PureCrypter downloader, which then delivers a variety of possible malware payloads.

It is written in .Net and support all windows operating system, and the primary goal is to steal stored passwords from different browsers, clipboard logging, screen keylogging, and screen capturing.

Advertisements

PureCrypter campaign works by using the domain of a compromised non-profit organization as a command and control (C2) to deliver a secondary payload. This campaign delivered several types of malware, including Redline Stealer, Agent Tesla, Eternity, Blackmon, and Philadelphia ransomware.

The following steps were taken by the attacker to deliver the payload:

The researchers said that while leaving credentials in malware was an operational failure by the threat actor, it left a trace for analysts to follow. Hosting it on Discord is becoming a common TTP, and Discord responds quickly to malware takedown requests. Threat actors increasingly are using pay malware written and tested by third parties

Advertisements

This research was documented by researchers from Menlo Security

Indicators of Compromise

FTP

HTTP

email

Malware

Exit mobile version