2022-07-01 (FRIDAY) - MONSTER LIBRA (TA551) SVCREADY INFECTION
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
NOTES:
- Sometime in April 2022, Monster Libra (TA551) began distributing a new malware family named SVCready.
 - Today's infection used a Word document with an English language template.
 - More information on SVCready can be found here.
 - Some data on Monster Libra can be found here.
 - My previous post on this: https://www.malware-traffic-analysis.net/2022/06/08/index.html.
 
ASSOCIATED FILES:
- 2022-07-01-IOCs-for-SVCready-infection.txt.zip 2.1 kB (2,096 bytes)
 - 2022-07-01-SVCready-infection.pcap.zip 14.5 MB (14,483,482 bytes)
 - 2022-07-01-SVCready-malware-and-artifacts.zip 4.2 MB (4,161,163 bytes)
 
INDICATORS
MALWARE:
SHA256 hash: d75077838fc33ec2769f958b1035346cd67da083f77a2edaa01375b19ba960b2
- File size: 2,915,744 bytes
 - File name: dybb_document_07.01.2022.doc
 - File description: Example of English language template Word document with macros for SVCready
 
SHA256 hash: 6cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
- File size: 61,440 bytes
 - File location: C:\Users\[username]\AppData\Local\Temp\r78AD.tmp.exe
 - File description: Copy of rundll32.exe (not inherently malicious)
 
SHA256 hash: 64ea06acffb3905ff1f7255d45f8f333821bce10f6c40ab8121af72d74706907
- File size: 892,928 bytes
 - Initial saved location: C:\Users\[username]\AppData\Local\Temp\y6A72.tmp.dll
 - Persistent location: C:\Users\[username]\AppData\Roaming\Microsoft\1472CB9B-F02A-4372-A322-9EA6FA0E2E75.b9V
 - File description: SVCready DLL
 - Run method: rundll32.exe [filename], DllRegisterServer
 - Note 1: The persistent SVCready DLL is copied to a new name approximately every 30 to 45 minutes.
 - Note 2: The scheduled task is updated to relfect the new name of the SVCready DLL
 - Note 3: Old copies of the SVCready DLL remain under C:\Users\[username]\AppData\Roaming\Microsoft\
 
INFECTION TRAFFIC DOMAINS/IP ADDRESSES:
- 109.68.215[.]242 port 80 - foryousbissnesnet[.]quest
 - 109.68.215[.]242 port 80 - marinesss[.]su
 
INFECTION TRAFFIC URLS:
- foryousbissnesnet[.]quest - POST /xl/ruiohmc/uhgvrkr HTTP/1.1
 - foryousbissnesnet[.]quest - POST /xl/ruiohmc HTTP/1.1 (text/plain)
 - foryousbissnesnet[.]quest - POST /xl/ruiohmc HTTP/1.1
 - foryousbissnesnet[.]quest - POST /xl/ruiohmc/truheru HTTP/1.1
 - marinesss[.]su - POST /xl/ruiohmc/uhgvrkr HTTP/1.1
 - marinesss[.]su - POST /xl/ruiohmc HTTP/1.1 (text/plain)
 - marinesss[.]su - POST /xl/ruiohmc HTTP/1.1
 - marinesss[.]su - POST /xl/ruiohmc/truheru HTTP/1.1
 
IMAGES

Shown above:  Chain of events for this SVCready infection.

Shown above:  Word document with macros for SVCready.

Shown above:  Scheduled task and malware/artifacts from the infection.

Shown above:  Traffic from the infection filtered in Wireshark.

Shown above:  TCP stream of SVCready C2 traffic.
Click here to return to the main page.
