One of several new activity clusters we identified last year, Rose Flamingo targets victims who are looking to download licensed software without having to pay for it. A “password” text file is this adversary’s power, pleasure, and pain.
Rose Flamingo is an activity cluster named by Red Canary that focuses on opportunistic, financially motivated malware as an initial access broker. Rose Flamingo targets victims who are looking to download licensed software without having to pay for it. Payloads related to Rose Flamingo typically arrive as archive files that are distributed via phony file-sharing websites purporting to provide users with “free” cracked software packages. To lure potential victims, the adversaries behind Rose Flamingo use search engine optimization (SEO) poisoning to elevate a malicious site’s search ranking.
Rose Flamingo victims will typically download a ZIP archive file containing two files at a minimum. Archives related to Rose Flamingo may contain words like free, key, download, license, latest, ISO, and crack. While these archives usually appear as ZIP files, they infrequently appear as other compressed archive formats as well. The files in a typical Rose Flamingo archive are a “password” text file and one password-protected archive. Some iterations of these “password” files contain the password and some classic ASCII art, as shown below, though the purpose behind the art is unknown. This type of delivery method conceals the malicious payloads that are contained within the password-protected archive from any prying security software.
While we created the Rose Flamingo naming convention to help us track activity we consider to be related, there’s a growing body of external research documenting components that partially overlap with what we define as Rose Flamingo. Much of this emerging research dropped in 2021, and it’s worth reviewing for anyone who is interested in learning more about related activity:
In January 2021, CSIS Security Group released research referencing infrastructure and payloads that overlap with Rose Flamingo.
In March 2021, Fortinet detailed a threat called Netbounce, which uses a similar file-naming convention and has some overlapping infrastructure.
Just about a week later in March 2021, Proofpoint published research about a threat they call CopperStealer (Mingloa), describing infrastructure and payload-naming conventions that are very similar to Rose Flamingo’s.
In June 2021, an Ahnlab report described a threat called Cryptbot, detailing files used for delivery that appear to overlap with Rose Flamingo’s file-naming conventions.
In late July 2021, BitDefender joined the party, helping corroborate many of our own observations with their MosaicLoader whitepaper, a great report that touches on much of the initial loader activity we’ve observed in Rose Flamingo-related incidents.
Last but not least, in September 2021, SophosLabs released research that focuses on a content delivery network that has many infrastructure and payload overlaps with our analysis.
Because none of us have perfect visibility, we appreciate that other teams share their perspective and how they track these threats.
As seen in our Intelligence Insights rankings from month to month, Rose Flamingo made our top 10 list for the first time in July 2021, climbing to eighth place for most prevalent threats that month. It also made our top 10 in September and October 2021. Red Canary has observed Rose Flamingo delivering various stealers such as Cryptbot, RedLine, and Raccoon, in addition to more concerning payloads such as STOP ransomware. We will continue birdwatching as we look for new opportunities to observe and take action when threats like Rose Flamingo find a new place to roost.
Archive containing ZIP and TXT files containing password
This detection analytic will identify processes making file modifications for ZIP archive files and TXT files with the string password in them, which we commonly observe in Rose Flamingo activity. The password files may contain different naming variations, such as p@ssword or passw0rd. Detecting TXT files with these strings may generate fewer false positives. If you have trouble getting this detection opportunity to work, you may find further success focusing on application processes that are responsible for handling archives in your organization, such as 7zip.
All 2021 Threat Detection Report content is fully available through this website. If you prefer to download a PDF, just fill out this form and let us know what email to send it to.
Thanks for your interest!
Check your inbox, the 2021 Threat Detection Report is headed your way.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.