BendyBear

BendyBear
(Type: Backdoor)

(Palo Alto) The BendyBear sample was determined to be x64 shellcode for a stage-zero implant whose sole function is to download a more robust implant from a command and control (C2) server. Shellcode, despite its name, is used to describe the small piece of code loaded onto the target immediately following exploitation, regardless of whether or not it actually spawns a command shell. At 10,000+ bytes, BendyBear is noticeably larger than most, and uses its size to implement advanced features and anti-analysis techniques, such as modified RC4 encryption, signature block verification, and polymorphic code.

[News Analysis] Trends:

Total Trend: 0

Trend Per Year


Trend Per Month



[News Analysis] News Mention Another Threat Name:



[TTP Analysis] Technique Performance:

reconnaissance
0/43
resource development
0/45
initial access
0/19
execution
1/36
persistence
0/113
privilege escalation
0/96
defense evasion
3/184
credential access
0/63
discovery
3/44
lateral movement
0/22
collection
0/37
command and control
4/39
exfiltration
0/18
impact
0/26


[TTP Analysis] Mitre Attack Matrix:

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1106
Native Api
T1140
Deobfuscate/decode Files Or Information
T1027
Obfuscated Files Or Information
T1497.003
Virtualization/sandbox Evasion : Time Based Evasion
T1012
Query Registry
T1124
System Time Discovery
T1497.003
Virtualization/sandbox Evasion : Time Based Evasion
T1001.001
Data Obfuscation : Junk Data
T1573.001
Encrypted Channel : Symmetric Cryptography
T1105
Ingress Tool Transfer
T1571
Non-standard Port


[Infrastructure Analysis] Based on Related IOC:

IP:Port Timestamp
Domain Timestamp
URL Timestamp


[Target Analysis] Region/Sector:

No information


References:

Basic Information (Credit @etda.or.th)

Tool: BendyBear

Names: BendyBear

Description: (Palo Alto) The BendyBear sample was determined to be x64 shellcode for a stage-zero implant whose sole function is to download a more robust implant from a command and control (C2) server. Shellcode, despite its name, is used to describe the small piece of code loaded onto the target immediately following exploitation, regardless of whether or not it actually spawns a command shell. At 10,000+ bytes, BendyBear is noticeably larger than most, and uses its size to implement advanced features and anti-analysis techniques, such as modified RC4 encryption, signature block verification, and polymorphic code.

Category: Malware

Type: Backdoor

Information: https://unit42.paloaltonetworks.com/bendybear-shellcode-blacktech/

Mitre-attack: https://attack.mitre.org/software/S0574/

Playbook: https://pan-unit42.github.io/playbook_viewer/?pb=bendybear

Last-card-change: 2022-12-30

Source: https://apt.etda.or.th/cgi-bin/listtools.cgi

TTP Info (Credit @Mitre)

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1106
NATIVE API
bendybear can load and execute modules and windows application programming (api) calls using standard shellcode api hashing.
T1140
DEOBFUSCATE/DECODE FILES OR INFORMATION
bendybear has decrypted function blocks using a xor key during runtime to evade detection.
T1027
OBFUSCATED FILES OR INFORMATION
bendybear has encrypted payloads using rc4 and xor.
T1497.003
VIRTUALIZATION/SANDBOX EVASION : TIME BASED EVASION
bendybear can check for analysis environments and signs of debugging using the windows api kernel32!gettickcountkernel32 call.
T1012
QUERY REGISTRY
bendybear can query the host's registry key at hkey_current_user\console\quickedit to retrieve data.
T1124
SYSTEM TIME DISCOVERY
bendybear has the ability to determine local time on a compromised host.
T1497.003
VIRTUALIZATION/SANDBOX EVASION : TIME BASED EVASION
bendybear can check for analysis environments and signs of debugging using the windows api kernel32!gettickcountkernel32 call.
T1001.001
DATA OBFUSCATION : JUNK DATA
bendybear has used byte randomization to obscure its behavior.
T1573.001
ENCRYPTED CHANNEL : SYMMETRIC CRYPTOGRAPHY
bendybear communicates to a c2 server over port 443 using modified rc4 and xor-encrypted chunks.
T1105
INGRESS TOOL TRANSFER
bendybear is designed to download an implant from a c2 server.
T1571
NON-STANDARD PORT
bendybear has used a custom rc4 and xor encrypted protocol over port 443 for c2.