Malware families coverage: Misusing Coronavirus disease [COVID-19] scare

By

While the world is suffering from Coronavirus disease (COVID-19) pandemic, malware authors are not missing their chances to take advantage from the pandemic scare and making the situation worse for the people. The SonicWall Threats Research team first observed the corona scares used by malware authors on February 4, 2020 and then keeping an eye on the campaign. We observed that COVID-19 scare is not only used by one malware family, perhaps multiple malware families are using the scare to get into the victim’s machine. The malware authors majorly distributing the malware files as an email attachment, stating it as COVID-19 related document. We have listed malware families which are misusing COVID-19 scare since Jan 2020.

 

GOZ InfoStealer:

The GOZ InfoStealer is known for stealing user data from installed applications, along with victim’s system information, which is then sent to the threat actor over Simple Mail Transfer Protocol.

SHA256 faa7e2cbf2174401e13e18eaf50e43268db358a05d38c7c4bdbd9968e7f91221
Archive Name Executable Name Date
CoronaVirus_Safety_Measures.rar CoronaVirus_Safety_Measures.exe 5-Feb-2020
SHA256 cf8ff986bb8b64d1f310ea6c3bb42aee2d2ca25478dfcfca55764880129ca8a2
Archive Name Executable Name Date
FYR_COVID-19.CAB; COVID-19.exe 13-Mar-2020
SHA256 6bd5f8e80baeec88c836e465f39f779f4f638d538511c0f5effd3c7043ddad16
Archive Name Executable Name Date
Coronavirus (COVID-2019) Safety Measures.gz Coronavirus (COVID-2019) Safety Measures.exe 16-Mar-2020
SHA256 c172d41be2a7644dca00fac50821d7f783eddc662c4f2409a60ce193fb6fb72d
Archive Name Executable Name Date
Coronavirus (COVID-2019) Safety Measures(2).7z Coronavirus (COVID-2019) Safety Measures(2).exe 16-Mar-2020
SHA256 05da803235e16b1e372d722956b1626cc52b6947af53063259a4ef58ab8bb8c9
Archive Name Executable Name Date
COMUNICAT AGC COVID-19.tar COMUNICAT AGC COVID-19.exe 17-Mar-2020
SHA256 07279fec6937f9a4bdc913fc59c41f66fe30e9b575e999bad5ff5d03697218cc
Archive Name Executable Name Date
2020-03-17 COVID-19 Client Communication_VA.pdf.gz 2020-03-17 COVID-19 Client Communication_VA.pdf.exe 17-Mar-2020
SHA256 2d0b6f68767b4a71950fa19852bf10c78ea5de5b79552e2b0cfad217358df9cd
Archive Name Executable Name Date
dpcm 17-3-2020- COVID-19_pdf.rar dpcm 17-3-2020- COVID-19_pdf.exe 17-Mar-2020
SHA256 4b6e683ba34dfbd3d07ff18667cfaed341357d8839d10749bef31c05288a5690
Archive Name Executable Name Date
2020-03-17 COVID-19 Client Communication_VF.pdf.gz 2020-03-17 COVID-19 Client Communication_VF.pdf.exe  17-Mar-2020
SHA256 c89f28698c375ff47ac444eb912bd51cdedc28a934bcd5b83fbea3770e68e5fc
Archive Name Executable Name Date
Covid-19_Precaution.rar; Covid-19_Precaution.exe  17-Mar-2020
SHA256 ca70837758e2d70a91fae20396dfd80f93597d4e606758a02642ac784324eee6
Archive Name Executable Name Date
 17-Mar-2020
SHA256 e52d171b0a4b6a14374ac9d53c5950815b5a0cc5ad0f479ba044621b6a86d5c7
Archive Name Executable Name Date
W.H.O CUSTOMER ADVISORY COVID19.ace W.H.O CUSTOMER ADVISORY COVID19  17-Mar-2020
SHA256 e52d171b0a4b6a14374ac9d53c5950815b5a0cc5ad0f479ba044621b6a86d5c7
Archive Name Executable Name Date
W.H.O CUSTOMER ADVISORY COVID19.ace W.H.O CUSTOMER ADVISORY COVID19  17-Mar-2020
SHA256 0fdd79e3372701bf0f9c3e8ba30d72444000787993a7815764bc2b5693eebd40
Archive Name Executable Name Date
COVID- 19.tar COVID- 19.exe 18-Mar-2020
SHA256 2c464648ff97fd39dab054d0c3e1bd249e244fcc975b697e312796669c7763f1
Archive Name Executable Name Date
NA Covid 19 Immunity Tips.exe 18-Mar-2020
SHA256 15e029c3834435150c76741e714540fcb799662db8cc2c61ba4ef192a781727b
Archive Name Executable Name Date
Greek Greek 18-Mar-2020
SHA256 43670ae43df9e361fa15f09f611da32db104ee207ed5af3e7e7f098ad82a68e0
Archive Name Executable Name Date
COVID-19 WHO RECOMENDED V.gz COVID-19 WHO RECOMENDED V.exe 18-Mar-2020
SHA256 56552bdb4519ca608e20f4dde940a92353b5cde990cc93ad6e739602e0f09b7a
Archive Name Executable Name Date
#0302019 ITEMS SPECIFICATION.tar Solution_to_coronavirus.exe 18-Mar-2020
SHA256 b90ace49508a1cd157cb8885656dcef062d69cf9e9bc5dac87802487b21ddf78
Archive Name Executable Name Date
CIRCULAR MEDIDAS EXTRAORDINARIAS CORONAVIRUS.tar CIRCULAR MEDIDAS EXTRAORDINARIAS CORONAVIRUS.exe 19-Mar-2020

 

Remcos RAT:

REMCOS designed as Remote Control and Surveillance tool for legitimate purpose but it is being used by malware authors from a few years. The malware gathers and sends victim’s system information to its Command and Control (C&C) server and it is also capable of performing the tasks below:

  • Screen Capture
  • Remote CommandLine
  • Remote Registry Editor
  • Download, Upload and Execute files
  • Login cleaner
SHA256 d3cfdfed59ecbe333cc589d88151565721ad55c9ef5542c680fb5077d411386c
Archive Name Executable Name Date
CORONA VIRUS 1.uue CORONA VIRUS 1.exe  19-Feb-2020

 

NanoCore RAT:

NanoCore Remote Access Trojan (RAT) is known for spying and stealing victim’s machine information:

SHA256 87befa6cb254eee8f9d45671d8dbb015fbd8b04230fd590f084bcd26242930c8
Archive Name Executable Name Date
CORONA VIRUS 2.uue CORONA VIRUS 2.exe  19-Feb-2020

After looking into the delivery patterns and agent files involved in executing the Remcos and NanoCore on victim’s machine, we can say the malware families have somehow linked to each other.

 

NetWire RAT:

NetWire RAT enables access to the victim’s machine from the remote host:

SHA256 db5038d60d1f0ee2f57fe0b3ee12f80ff10a90e088bd3316632036f4238823bf
Archive Name Executable Name Date
UNICEF COVID-19 APP.arj UNICEF COVID-19 APP.exe  16-Mar-2020

 

HawkEye RebornX:

HawkEye has been active in the wild from the last few years. It has the features below:

  • Key-logging
  • Password stealing
  • Screen capture
  • Clipboard
SHA256 f3eac3b0b250ae5da352a6d1358e9729e79af9549bc04f53d83283b5b07679fd
Archive Name Executable Name Date
Coronavirus Disease (COVID-19) CURE.rar Coronavirus Disease (COVID-19) CURE.exe  19-Mar-2020
SHA256 d4bf55a016c9d5bf28b4945c682e5f998efddbffe5578600a070da12eb985d78
Archive Name Executable Name Date
Coronavirus Disease (COVID-19) CURE.rar Coronavirus Disease (COVID-19) CURE.exe  19-Mar-2020

 

Unclassified InfoStealer:

This InfoStealer’s behavior is very much similar to GOZ InfoStealer, it steals user data from installed application and clipboard:

SHA256 9df044870a8aaae7c5d11307f3bfb15887e5836a4e9cb5b6962cfddd7f8f7396
Archive Name Executable Name Date
Document Arrival COVID-19 Detection.zip Document Arrival COVID-19 Detection.zip  17-Mar-2020

 

Evidence of the detection by RTDMI(tm) engine for each malware family can be seen below in the Capture ATP reports:

GOZ InfoStealer

Remcos RAT

NanoCore RAT

NetWire RAT

HawkEye Reborn

Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.