Malware families coverage: Misusing Coronavirus disease [COVID-19] scare

By

While the world is suffering from Coronavirus disease (COVID-19) pandemic, malware authors are not missing their chances to take advantage from the pandemic scare and making the situation worse for the people. The SonicWall Threats Research team first observed the corona scares used by malware authors on February 4, 2020 and then keeping an eye on the campaign. We observed that COVID-19 scare is not only used by one malware family, perhaps multiple malware families are using the scare to get into the victim’s machine. The malware authors majorly distributing the malware files as an email attachment, stating it as COVID-19 related document. We have listed malware families which are misusing COVID-19 scare since Jan 2020.

 

GOZ InfoStealer:

The GOZ InfoStealer is known for stealing user data from installed applications, along with victim’s system information, which is then sent to the threat actor over Simple Mail Transfer Protocol.

SHA256faa7e2cbf2174401e13e18eaf50e43268db358a05d38c7c4bdbd9968e7f91221
Archive NameExecutable NameDate
CoronaVirus_Safety_Measures.rarCoronaVirus_Safety_Measures.exe5-Feb-2020
SHA256cf8ff986bb8b64d1f310ea6c3bb42aee2d2ca25478dfcfca55764880129ca8a2
Archive NameExecutable NameDate
FYR_COVID-19.CAB;COVID-19.exe13-Mar-2020
SHA2566bd5f8e80baeec88c836e465f39f779f4f638d538511c0f5effd3c7043ddad16
Archive NameExecutable NameDate
Coronavirus (COVID-2019) Safety Measures.gzCoronavirus (COVID-2019) Safety Measures.exe16-Mar-2020
SHA256c172d41be2a7644dca00fac50821d7f783eddc662c4f2409a60ce193fb6fb72d
Archive NameExecutable NameDate
Coronavirus (COVID-2019) Safety Measures(2).7zCoronavirus (COVID-2019) Safety Measures(2).exe16-Mar-2020
SHA25605da803235e16b1e372d722956b1626cc52b6947af53063259a4ef58ab8bb8c9
Archive NameExecutable NameDate
COMUNICAT AGC COVID-19.tarCOMUNICAT AGC COVID-19.exe17-Mar-2020
SHA25607279fec6937f9a4bdc913fc59c41f66fe30e9b575e999bad5ff5d03697218cc
Archive NameExecutable NameDate
2020-03-17 COVID-19 Client Communication_VA.pdf.gz2020-03-17 COVID-19 Client Communication_VA.pdf.exe17-Mar-2020
SHA2562d0b6f68767b4a71950fa19852bf10c78ea5de5b79552e2b0cfad217358df9cd
Archive NameExecutable NameDate
dpcm 17-3-2020- COVID-19_pdf.rardpcm 17-3-2020- COVID-19_pdf.exe17-Mar-2020
SHA2564b6e683ba34dfbd3d07ff18667cfaed341357d8839d10749bef31c05288a5690
Archive NameExecutable NameDate
2020-03-17 COVID-19 Client Communication_VF.pdf.gz2020-03-17 COVID-19 Client Communication_VF.pdf.exe 17-Mar-2020
SHA256c89f28698c375ff47ac444eb912bd51cdedc28a934bcd5b83fbea3770e68e5fc
Archive NameExecutable NameDate
Covid-19_Precaution.rar;Covid-19_Precaution.exe 17-Mar-2020
SHA256ca70837758e2d70a91fae20396dfd80f93597d4e606758a02642ac784324eee6
Archive NameExecutable NameDate
 17-Mar-2020
SHA256e52d171b0a4b6a14374ac9d53c5950815b5a0cc5ad0f479ba044621b6a86d5c7
Archive NameExecutable NameDate
W.H.O CUSTOMER ADVISORY COVID19.aceW.H.O CUSTOMER ADVISORY COVID19 17-Mar-2020
SHA256e52d171b0a4b6a14374ac9d53c5950815b5a0cc5ad0f479ba044621b6a86d5c7
Archive NameExecutable NameDate
W.H.O CUSTOMER ADVISORY COVID19.aceW.H.O CUSTOMER ADVISORY COVID19 17-Mar-2020
SHA2560fdd79e3372701bf0f9c3e8ba30d72444000787993a7815764bc2b5693eebd40
Archive NameExecutable NameDate
COVID- 19.tarCOVID- 19.exe18-Mar-2020
SHA2562c464648ff97fd39dab054d0c3e1bd249e244fcc975b697e312796669c7763f1
Archive NameExecutable NameDate
NACovid 19 Immunity Tips.exe18-Mar-2020
SHA25615e029c3834435150c76741e714540fcb799662db8cc2c61ba4ef192a781727b
Archive NameExecutable NameDate
GreekGreek18-Mar-2020
SHA25643670ae43df9e361fa15f09f611da32db104ee207ed5af3e7e7f098ad82a68e0
Archive NameExecutable NameDate
COVID-19 WHO RECOMENDED V.gzCOVID-19 WHO RECOMENDED V.exe18-Mar-2020
SHA25656552bdb4519ca608e20f4dde940a92353b5cde990cc93ad6e739602e0f09b7a
Archive NameExecutable NameDate
#0302019 ITEMS SPECIFICATION.tarSolution_to_coronavirus.exe18-Mar-2020
SHA256b90ace49508a1cd157cb8885656dcef062d69cf9e9bc5dac87802487b21ddf78
Archive NameExecutable NameDate
CIRCULAR MEDIDAS EXTRAORDINARIAS CORONAVIRUS.tarCIRCULAR MEDIDAS EXTRAORDINARIAS CORONAVIRUS.exe19-Mar-2020

 

Remcos RAT:

REMCOS designed as Remote Control and Surveillance tool for legitimate purpose but it is being used by malware authors from a few years. The malware gathers and sends victim’s system information to its Command and Control (C&C) server and it is also capable of performing the tasks below:

  • Screen Capture
  • Remote CommandLine
  • Remote Registry Editor
  • Download, Upload and Execute files
  • Login cleaner
SHA256d3cfdfed59ecbe333cc589d88151565721ad55c9ef5542c680fb5077d411386c
Archive NameExecutable NameDate
CORONA VIRUS 1.uueCORONA VIRUS 1.exe 19-Feb-2020

 

NanoCore RAT:

NanoCore Remote Access Trojan (RAT) is known for spying and stealing victim’s machine information:

SHA25687befa6cb254eee8f9d45671d8dbb015fbd8b04230fd590f084bcd26242930c8
Archive NameExecutable NameDate
CORONA VIRUS 2.uueCORONA VIRUS 2.exe 19-Feb-2020

After looking into the delivery patterns and agent files involved in executing the Remcos and NanoCore on victim’s machine, we can say the malware families have somehow linked to each other.

 

NetWire RAT:

NetWire RAT enables access to the victim’s machine from the remote host:

SHA256db5038d60d1f0ee2f57fe0b3ee12f80ff10a90e088bd3316632036f4238823bf
Archive NameExecutable NameDate
UNICEF COVID-19 APP.arjUNICEF COVID-19 APP.exe 16-Mar-2020

 

HawkEye RebornX:

HawkEye has been active in the wild from the last few years. It has the features below:

  • Key-logging
  • Password stealing
  • Screen capture
  • Clipboard
SHA256f3eac3b0b250ae5da352a6d1358e9729e79af9549bc04f53d83283b5b07679fd
Archive NameExecutable NameDate
Coronavirus Disease (COVID-19) CURE.rarCoronavirus Disease (COVID-19) CURE.exe 19-Mar-2020
SHA256d4bf55a016c9d5bf28b4945c682e5f998efddbffe5578600a070da12eb985d78
Archive NameExecutable NameDate
Coronavirus Disease (COVID-19) CURE.rarCoronavirus Disease (COVID-19) CURE.exe 19-Mar-2020

 

Unclassified InfoStealer:

This InfoStealer’s behavior is very much similar to GOZ InfoStealer, it steals user data from installed application and clipboard:

SHA2569df044870a8aaae7c5d11307f3bfb15887e5836a4e9cb5b6962cfddd7f8f7396
Archive NameExecutable NameDate
Document Arrival COVID-19 Detection.zipDocument Arrival COVID-19 Detection.zip 17-Mar-2020

 

Evidence of the detection by RTDMI(tm) engine for each malware family can be seen below in the Capture ATP reports:

GOZ InfoStealer

Remcos RAT

NanoCore RAT

NetWire RAT

HawkEye Reborn

Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.