CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

GoldenSpy Chapter 5 : Multiple GoldenSpy Uninstaller Variants Discovered

Summary:

Trustwave identified a significant malicious campaign on mandatory tax invoice software, which is required to conduct business in China. The campaign, we dubbed GoldenSpy, is an embedded backdoor in the software package, which allows full remote command and control of the victim’s system via arbitrary code execution.

After GoldenSpy was made public, those behind the backdoor quickly scrambled to push an uninstaller to erase GoldenSpy from infected systems. The uninstaller was dropped from an updater module, cleaned GoldenSpy and finally deleted itself leaving no traces. Another uninstaller was issued right afterwards specifically designed to evade our YARA rules we published to help infected. 

Understanding the attackers were watching our every move to help organizations impacted by GoldenSpy, we waited a period-of-time and quietly kept tracking with our threat hunting strategy. What we found is that they are continuing to push new GoldenSpy uninstallers – so far we have discovered five variants totaling 24 uninstaller files.   

We observed some of the uninstallers were uploaded to public repositories causing the detection ratios to increase. Some of the uninstallers not found in any public repo’s, however, we will report all of them here.

Analysis:

All the variants conducted the exact same behavior, but utilized different execution flow, string obfuscation, and size to evade detection by security technologies. Detailed analysis of the behavior is available in GoldenSpy Chapter 2.

  • Stop the svm, svmm services
  • Stop the svm,svmm process
  • Uninstall the svm,svmm modules
  • Remove the SVM installed folder including logs
  • Remove the uninstaller (Self-delete)
  • Specifically checks for process ‘ZhuDongFangYu.exe,’ which is a China-based antivirus ‘Qihoo 360’ active defense module

Execution flow :

1_variants

 

Traffic Flow:

2_traffic_flow

From variant 3, after the GoldenSpy uninstaller clears its traces and before it self-delete, it will send a unique ID to ningzhidata[.]com to track the activity.

3_v3_checkin

 

Who is behind the GoldenSpy uninstaller development?

During reverse engineering a file from variant 5, We have observed the IP 39[.]98[.]110[.]234 was used for 3rd stage beacon as mentioned above, and as per the traffic, it does the same.

4_traffic_flow_3to5

We checked the above IP, It resolves to ‘Ningbo Digital Technology Co., Ltd’ hxxp[://]www[.]nbdigit[.]com/

5_ningbo

As stated in the description below, they provide professional software solutions and technical support.

6_ningbo_desc

From the active website, they are providing two files to download, The ‘QdfTools’ name is not relevant as it is actually the ‘GoldenSpy Uninstaller,’ and ‘iclient’ is a ‘GoldenSpy’ dropper, which we identified as svminstaller in the GoldenSpy technical report.

7_goldenspy download

hxxp[://]www[.]nbdigit[.]com/download/QdfTools[.]exe

hxxp[://]www[.]nbdigit [.]com/download/iclient[.]exe

From variant 5, The GoldenSpy uninstaller got downloaded with name ‘QdfTools.exe’ from 222[.]186[.]130[.]200:9006, They gave the product description for the uninstaller as ‘Enterprise service environment detection and cleaning software.’

Based on these findings, we can say that Ningbo Digital Technology Co., Ltd is involved with the development of the ‘GoldenSpy Uninstaller’ and ningzhidata[.]com serving from CDN servers.

Our GoldenSpy YARA rule successfully detected the ‘iclient.exe.’

Traffic comparisons:

Variant

Updater URL

Uninstaller download URL

1

hxxp[://]www[.]ningzhidata[.]com:9006

223[.]112[.]21[.]2:8090

2

hxxp[://]www[.]ningzhidata[.]com:9006

218[.]94[.]149[.]58:8090

3

hxxp[://]www[.]ningzhidata[.]com:9006

120[.]53[.]238[.]96:8090

4

hxxp[://]www[.]ningzhidata[.]com:9006

120[.]53[.]238[.]96:8090

5

hxxp[://]www[.]ningzhidata[.]com:9006

222[.]186[.]130[.]200:9006

GoldenSpy Uninstaller Variant’s Indicators of compromise:

Binaries:

FileName

FileSize

TimeStamp GMT

MD5

AWX.exe

20 kB

2020:06:28 16:15:19+00:00

735ac19b261dc66d5850bea21f3d54fe

BWXT.exe

25 kB

2020:06:29 10:38:38+00:00

f2a7363cf43b5900bb872b0d4c627a48

yund.exe

23 kB

2020:06:30 03:47:50+00:00

f52cc72959e7ed51c75d0b7f6b8611c0

yund.exe

25 kB

2020:07:01 12:03:45+00:00

08f803140ee607a12b15dca97df5864f

AWX.exe

26 kB

2020:07:01 15:52:46+00:00

573adb1569a08472094f0cfbb6264360

AWX.exe

26 kB

2020:07:02 01:18:11+00:00

429a1c5756efaab8af3bcee37cccc31f

ac9253

76 kB

2020:07:05 04:34:37+00:00

ddd85c9c8ec325bc2accce4365cb40de

AWX.exe

84 kB

2020:07:05 10:11:57+00:00

eb98b268164e405ba761eee87565d936

dfed

80 kB

2020:07:05 14:09:20+00:00

cc37004f5a1903523657810edb45272e

7b15

76 kB

2020:07:06 17:21:10+00:00

72cd43dc5ad0e55f6d26998ac62645e0

asd.exe

88 kB

2020:07:07 04:21:10+00:00

568042d040ed7fbbb802d847ef614a4d

d29f78

84 kB

2020:07:08 08:10:03+00:00

ed9ec3aec2e8aac13e5d3971f0d56d89

a9a61

84 kB

2020:07:08 10:00:00+00:00

a07ebcc316c49c6bbdf0a8d91bf4c546

953ce

81 kB

2020:07:08 10:37:33+00:00

c8342bbfadc6fb78ea00480e3f8d66e8

asd.exe

84 kB

2020:07:08 10:37:33+00:00

a4e39f608731d31fbcc17d98a3ec8508

iclient.exe

624 kB

2020:07:08 11:01:15+00:00

ab43e4815f1f6cf6d4ef1f7a5334d1ac

asd.exe

88 kB

2020:07:08 14:05:47+00:00

ba7cce6da078c2825b05ee305773edb6

63163

88 kB

2020:07:09 01:19:07+00:00

1484a597aee4850fcf13faac8f382a5c

82fb179

88 kB

2020:07:09 01:46:52+00:00

57af01112f6e277c69150f6d5fba51a9

envClean.exe

80 kB

2020:07:10 01:25:06+00:00

89e0b5e36a384eba8fb269b1da587f09

envClean.exe

80 kB

2020:07:10 01:35:08+00:00

aa3bc5d04e4daaa641dad4a16dba3df9

truck.exe

72 kB

2020:07:13 13:41:44+00:00

7fed28a7623fe421a732d538e87189f4

TrueQdf.exe

80 kB

2020:07:22 11:41:03+00:00

037fa9c57f9f9c62f12927fe44761408

QdfTools.exe

84 kB

2020:07:23 05:45:07+00:00

98818a0b268419a1ea652dd95d9437e1

QdfTools.exe

84 kB

2020:07:25 04:23:05+00:00

3500ee24b14f7c203a360442b680a1d7

Network:

URL's & IP's

hxxp[://]www[.]ningzhidata[.]com:9006

hxxp://222[.]186[.]130[.]200:9006/download/

hxxp://223[.]112[.]21[.]2:8090/download/

hxxp://218[.]94[.]149[.]58:8090/download/

hxxp://120[.]53[.]238[.]96:8090/download/

hxxp://39[.]98[.]110[.]234:8111/download/

223[.]112[.]21[.]2:8090

218[.]94[.]149[.]58:8090

120[.]53[.]238[.]96:8090

222[.]186[.]130[.]200:9006

39[.]98[.]110[.]234:8111

hxxp[://]www[.]nbdigit[.]com/download/QdfTools[.]exe

hxxp[://]www[.]nbdigit[.]com/download/iclient[.]exe

ATT&CK Mappings:

Tactic

Technique

Discovery

File and Directory Discovery [T1083]

 

Process Discovery [T1057] 

 

Query Registry [T1012] 

 

System Information Discovery [T1082]

Defense Evasion

Virtualization/Sandbox Evasion [T1497]

YARA:

rule Goldenspy_Uninstaller

{

meta:

            author = "SpiderLabs"

            malware_family = "GoldenSpy"

            filetype =  "exe_dll"

            version = "4.0"

strings:

            $str1 = "taskkill /IM svm.exe /IM svmm.exe /F" ascii          

            $str2 = "\\svm.exe -stopProtect" ascii                                                                        

            $str3 = "\\svmm.exe -u" ascii                                                                                     

            $str4 = "\\VCProject\\dgs\\Release\\" ascii                                        

            $str5 = "Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\svm" ascii

            $str6 = "\\svmm.exe -stopProtect" ascii

            $str7 = "\\svm.exe -u" ascii

            $str8 = "Software\\Microsoft\\Windows\\CurrentVersion\\App Paths\\svm.exe" ascii

            $str9 = "dGFza2tpbGwgL0lNIHN2bS5leGUgL0lNIHN2bW0uZXhlIC9GIA" ascii

            $str10 = "c3ZtLmV4ZSAtc3RvcFByb3RlY3Q" ascii

            $str11 = "XHN2bW0uZXhlIC11" ascii

            $str12 = "U29mdHdhcmVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cVW5pbnN0YWxsXHN2bQ" ascii

            $str13 = "U29mdHdhcmVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cQXBwIFBhdGhzXHN2bS5leGU" ascii

            $str14 = "XHN2bS5leGUgLXU" ascii

            $str15 = "c3ZtbS5leGUgLXN0b3BQcm90ZWN0" ascii

            $str16 = {4951538BCEE8[0-10]8D4C2424[0-10]8D44243C[0-4]68[0-20]83C4088B5004C644247404}

            $str17 = {535556578D4C2414[0-10]8D44242C68[0-10]50C744247C[0-10]83C4088B7004C64424[0-50]8BFE83C9FF33C0}

condition:       

            (uint16(0) == 0x5A4D) and 4 of ($str*)

}

This research depicting regular improvements of the GoldenSpy uninstaller should serve as a wakeup call for organizations because it proves any actions including implanting and extracting malware can be taken covertly and at the will of the attacker with the help of the updater module without impacting the functionality of the Golden Tax software.

Trustwave strongly recommends following best software practices when comes to 3rd party software installations. No matter where an organization operates, extra vigilance needs to be taken when adopting mandatory software (or any 3rd party software) in order to conduct business. GoldenSpy and what we have seen in terms of its continuous activities is a prime example.

Latest SpiderLabs Blogs

EDR – The Multi-Tool of Security Defenses

This is Part 8 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here.

Read More

The Invisible Battleground: Essentials of EASM

Know your enemy – inside and out. External Attack Surface Management tools are an effective way to understand externally facing threats and help plan cyber defenses accordingly. Let’s discuss what...

Read More

Fake Dialog Boxes to Make Malware More Convincing

Let’s explore how SpiderLabs created and incorporated user prompts, specifically Windows dialog boxes into its malware loader to make it more convincing to phishing targets during a Red Team...

Read More