Volgmer

Volgmer, Manuscrypt
(Type: Reconnaissance, Backdoor, Info stealer, Exfiltration, Botnet)

(US-CERT) Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. Since at least 2013, HIDDEN COBRA actors have been observed using Volgmer malware in the wild to target the government, financial, automotive, and media industries. It is suspected that spear phishing is the primary delivery mechanism for Volgmer infections; however, HIDDEN COBRA actors use a suite of custom tools, some of which could also be used to initially compromise a system. Therefore, it is possible that additional HIDDEN COBRA malware may be present on network infrastructure compromised with Volgmer. As a backdoor Trojan, Volgmer has several capabilities including: gathering system information, updating service registry keys, downloading and uploading files, executing commands, terminating processes, and listing directories. In one of the samples received for analysis, the US-CERT Code Analysis Team observed botnet controller functionality.

[News Analysis] Trends:

Total Trend: 19

Trend Per Year
1
2017
1
2018
8
2020
5
2021
4
2023


Trend Per Month
1
Nov 2017
1
Aug 2018
1
2020
2
Feb 2020
1
May 2020
1
Jul 2020
1
Oct 2020
1
Nov 2020
1
Dec 2020
2
Jan 2021
1
Feb 2021
1
Mar 2021
1
Sep 2021
1
Apr 2023
2
Aug 2023
1
Oct 2023



[News Analysis] News Mention Another Threat Name:

2 - JessieConTea2 - Scout89 - Volgmer5 - Andardoor3 - BlackRemote5 - Tiger RAT50 - MimiKatz4 - QuiteRAT27 - Bankshot6 - BLINDINGCAN7 - LPEClient6 - NedDnLoader6 - Racket Downloader21 - Bashlite21 - FritzFrog21 - IPStorm21 - Mirai21 - Tsunami36 - elf.wellmess94 - AppleJeus79 - Dacls21 - EvilQuest21 - Manuscrypt21 - Astaroth21 - BazarBackdoor21 - Cerber79 - Cobalt Strike21 - Emotet21 - FinFisher RAT21 - Kwampirs21 - NjRAT21 - Ryuk21 - SmokeLoader66 - TrickBot2 - HTTP(S) uploader18 - PhantomLance18 - Penquin Turla18 - AcidBox18 - EternalPetya18 - Godlike1218 - Olympic Destroyer18 - PlugX18 - shadowhammer18 - ShadowPad18 - Sinowal18 - VHD Ransomware18 - WellMess62 - X-Agent18 - XTunnel23 - FastCash23 - BADCALL63 - Brambul63 - Dtrack23 - Duuzer23 - DYEPACK63 - ELECTRICFISH23 - HARDRAIN23 - Hermes63 - HOPLIGHT63 - Joanap63 - KEYMARBLE23 - Kimsuky23 - MyDoom23 - NACHOCHEESE23 - NavRAT63 - PowerRatankba23 - RokRAT23 - Sierra(Alfa,Bravo, ...)23 - WannaCryptor48 - Chrysaor48 - Exodus48 - VPNFilter48 - DNSRat48 - Griffon48 - KopiLuwak48 - More_eggs48 - SQLRat48 - BONDUPDATER48 - Agent.BTZ48 - Anchor48 - AndroMut48 - BOOSTWRITE48 - Carbanak48 - DistTrack48 - DNSpionage48 - FlawedAmmyy48 - FlawedGrace48 - Get248 - Grateful POS48 - Imminent Monitor RAT48 - jason48 - KerrDown48 - Lambert48 - LightNeuron48 - LoJax48 - MiniDuke48 - PolyglotDuke48 - Rising Sun48 - SDBbot48 - ServHelper48 - Snatch48 - Stuxnet48 - TinyMet48 - tRat48 - Zebrocy2 - Lazarus Group


[TTP Analysis] Technique Performance:

reconnaissance
0/43
resource development
0/45
initial access
0/19
execution
2/36
persistence
1/113
privilege escalation
1/96
defense evasion
6/184
credential access
0/63
discovery
7/44
lateral movement
0/22
collection
0/37
command and control
3/39
exfiltration
0/18
impact
0/26


[TTP Analysis] Mitre Attack Matrix:

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1059.003
Command And Scripting Interpreter : Windows Command Shell
T1106
Native Api
T1543.003
Create Or Modify System Process : Windows Service
T1543.003
Create Or Modify System Process : Windows Service
T1140
Deobfuscate/decode Files Or Information
T1070.004
Indicator Removal : File Deletion
T1036.004
Masquerading : Masquerade Task Or Service
T1112
Modify Registry
T1027
Obfuscated Files Or Information
T1027.011
Obfuscated Files Or Information : Fileless Storage
T1083
File And Directory Discovery
T1057
Process Discovery
T1012
Query Registry
T1082
System Information Discovery
T1016
System Network Configuration Discovery
T1049
System Network Connections Discovery
T1007
System Service Discovery
T1573.001
Encrypted Channel : Symmetric Cryptography
T1573.002
Encrypted Channel : Asymmetric Cryptography
T1105
Ingress Tool Transfer


[Infrastructure Analysis] Based on Related IOC:

IP:Port Timestamp
Domain Timestamp
URL Timestamp


[Target Analysis] Region/Sector:

No information


References:

News Article (Credit @Malpedia)

Analysis Report on Lazarus Threat Group’s Volgmer and Scout Malware

2023-10-13 by ASEC Analysis Team from AhnLab

Analysis of Andariel’s New Attack Activities

2023-08-31 by Sanseo from AhnLab

Analyzing the new attack activity of the Andariel group

2023-08-22 by ASEC Analysis Team from AhnLab

Following the Lazarus group by tracking DeathNote campaign

2023-04-12 by Seongsu Park from Kaspersky Labs

A Detailed Analysis of Lazarus’ RAT Called FALLCHILL

2021-09-07 by Vlad Pasca from LIFARS

2021 Threat Report

2021-03-21 by Blackberry Research from Blackberry

Lazarus targets defense industry with ThreatNeedle

2021-02-25 by Vyacheslav Kopeytsev from Kaspersky Labs

How to communicate between RAT infected devices (White paper)

2021-01-27 by Sojun Ryu from S2W LAB Inc.

Analysis of THREATNEEDLE C&C Communication (feat. Google TAG Warning to Researchers)

2021-01-27 by Sojun Ryu from S2W LAB Inc.

Tweet on macOS Manuscypt samples

2020-12-11 by Twitter (@BitsOfBinary) from PWC UK

钱包黑洞:Lazarus 组织近期在加密货币方面的隐蔽攻击活动

2020-11-27 by Microstep online research response team from Microstep Intelligence Bureau

Tweet on macOS version of Manuscrypt

2020-10-28 by John from Twitter (@BitsOfBinary)

APT trends report Q2 2020

2020-07-29 by GReAT from Kaspersky Labs

The North Korean AV Anthology: a unique look on DPRK’s Anti-Virus market

2020-05-07 by Mark Lechtik from AVAR

The Lazarus Constellation A study on North Korean malware

2020-02-19 by Lexfo from Lexfo

APT Report 2019

2020-02-13 by Qi Anxin Threat Intelligence Center from Qianxin

NICKEL ACADEMY

2020 by SecureWorks from Secureworks

Operation AppleJeus: Lazarus hits cryptocurrency exchange with fake installer and macOS malware

2018-08-23 by GReAT from Kaspersky Labs

Alert (TA17-318B): HIDDEN COBRA – North Korean Trojan: Volgmer

2017-11-14 by US-CERT from US-CERT

Basic Information (Credit @etda.or.th)

Tool: Volgmer

Names: Volgmer, Manuscrypt

Description: (US-CERT) Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. Since at least 2013, HIDDEN COBRA actors have been observed using Volgmer malware in the wild to target the government, financial, automotive, and media industries. It is suspected that spear phishing is the primary delivery mechanism for Volgmer infections; however, HIDDEN COBRA actors use a suite of custom tools, some of which could also be used to initially compromise a system. Therefore, it is possible that additional HIDDEN COBRA malware may be present on network infrastructure compromised with Volgmer. As a backdoor Trojan, Volgmer has several capabilities including: gathering system information, updating service registry keys, downloading and uploading files, executing commands, terminating processes, and listing directories. In one of the samples received for analysis, the US-CERT Code Analysis Team observed botnet controller functionality.

Category: Malware

Type: Reconnaissance, Backdoor, Info stealer, Exfiltration, Botnet

Information: https://www.us-cert.gov/ncas/alerts/TA17-318B

Information: https://securelist.com/operation-applejeus/87553/

Mitre-attack: https://attack.mitre.org/software/S0180/

Malpedia: https://malpedia.caad.fkie.fraunhofer.de/details/win.volgmer

Alienvault-otx: https://otx.alienvault.com/browse/pulses?q=tag:volgmer

Last-card-change: 2020-05-14

Source: https://apt.etda.or.th/cgi-bin/listtools.cgi

TTP Info (Credit @Mitre)

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1059.003
COMMAND AND SCRIPTING INTERPRETER : WINDOWS COMMAND SHELL
volgmer can execute commands on the victim's machine.
T1106
NATIVE API
volgmer executes payloads using the windows api call createprocessw().
T1543.003
CREATE OR MODIFY SYSTEM PROCESS : WINDOWS SERVICE
volgmer installs a copy of itself in a randomly selected service, then overwrites the servicedll entry in the service's registry entry. some volgmer variants also install .dll files as services with names generated by a list of hard-coded strings.
T1543.003
CREATE OR MODIFY SYSTEM PROCESS : WINDOWS SERVICE
volgmer installs a copy of itself in a randomly selected service, then overwrites the servicedll entry in the service's registry entry. some volgmer variants also install .dll files as services with names generated by a list of hard-coded strings.
T1140
DEOBFUSCATE/DECODE FILES OR INFORMATION
volgmer deobfuscates its strings and apis once its executed.
T1070.004
INDICATOR REMOVAL : FILE DELETION
volgmer can delete files and itself after infection to avoid analysis.
T1036.004
MASQUERADING : MASQUERADE TASK OR SERVICE
some volgmer variants add new services with display names generated by a list of hard-coded strings such as application, background, security, and windows, presumably as a way to masquerade as a legitimate service.
T1112
MODIFY REGISTRY
volgmer modifies the registry to store an encoded configuration file in hkey_local_machine\system\currentcontrolset\control\wmi\security.
T1027
OBFUSCATED FILES OR INFORMATION
a volgmer variant is encoded using a simple xor cipher.
T1027.011
OBFUSCATED FILES OR INFORMATION : FILELESS STORAGE
volgmer stores an encoded configuration file in hkey_local_machine\system\currentcontrolset\control\wmi\security.
T1083
FILE AND DIRECTORY DISCOVERY
volgmer can list directories on a victim.
T1057
PROCESS DISCOVERY
volgmer can gather a list of processes.
T1012
QUERY REGISTRY
volgmer checks the system for certain registry keys.
T1082
SYSTEM INFORMATION DISCOVERY
volgmer can gather system information, the computer name, os version, drive and serial information from the victim's machine.
T1016
SYSTEM NETWORK CONFIGURATION DISCOVERY
volgmer can gather the ip address from the victim's machine.
T1049
SYSTEM NETWORK CONNECTIONS DISCOVERY
volgmer can gather information about tcp connection state.
T1007
SYSTEM SERVICE DISCOVERY
volgmer queries the system to identify existing services.
T1573.001
ENCRYPTED CHANNEL : SYMMETRIC CRYPTOGRAPHY
volgmer uses a simple xor cipher to encrypt traffic and files.
T1573.002
ENCRYPTED CHANNEL : ASYMMETRIC CRYPTOGRAPHY
some volgmer variants use ssl to encrypt c2 communications.
T1105
INGRESS TOOL TRANSFER
volgmer can download remote files and additional payloads to the victim's machine.