{"id":8288,"date":"2023-12-06T14:31:34","date_gmt":"2023-12-06T14:31:34","guid":{"rendered":"https:\/\/fortgale.com\/blog\/?p=8288"},"modified":"2023-12-20T11:33:12","modified_gmt":"2023-12-20T11:33:12","slug":"nebula-broker-offensive-operations-italy","status":"publish","type":"post","link":"https:\/\/fortgale.com\/blog\/featured\/nebula-broker-offensive-operations-italy\/","title":{"rendered":"Nebula Broker: offensive operations made in Italy"},"content":{"rendered":"\n<p><strong>Fortgale has been tracking an Italian Threat Actor, internally dubbed as Nebula Broker, since March 2022.<\/strong><\/p>\n\n\n\n<p>The actor uses self-made malware (<strong><em>BrokerLoader<\/em><\/strong>) to compromise <strong>Italian systems<\/strong>. Further analysis revealed that the attacker has been operating since the end of 2020. Although this threat is not well-known, the number of compromises is particularly extensive. Indeed, Fortgale has observed several cases of this malware\u2019s presence in companies across various sectors, such as <strong>Transport <\/strong>and <strong>Aeronautics.<\/strong><\/p>\n\n\n\n<p>Given these findings, we believe that the attacker is not conducting targeted offensive activities, especially considering the malware\u2019s USB propagation capabilities. A notable aspect of the offensive activity is the use of <strong>unique and curious Tactics, Techniques, and Procedures<\/strong> (TTPs) that have evolved over time. These include unique obfuscation and encoding techniques, such as using empty spaces and tabs in an intermediate file hosted on <strong>GitHub<\/strong>, and the use of platforms like <strong>Vimeo<\/strong> and <strong>ArsTechnica<\/strong> to host code.<\/p>\n\n\n\n<p>A detailed analysis of the threat follows.<\/p>\n\n\n\n<p>For any further information, contact us at <a href=\"mailto:info@fortgale.com\">info@fortgale.com<\/a><\/p>\n\n\n\n<div style=\"height:68px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-text-color has-link-color has-large-font-size wp-elements-6d24ea0585f915b675997fa7e17f8a76\" id=\"h-attack-flow-evolution\" style=\"color:#000000;font-style:normal;font-weight:700\">Attack Flow Evolution<\/h1>\n\n\n\n<p>N-Broker is following a precise pattern of tactics, techniques, and procedures (TTPs). Recently, after a brief period of limited activities, its <strong>operations started rising again.<\/strong><\/p>\n\n\n\n<p>We are releasing an analysis and <strong>comparison of the activites between<\/strong> March 2022 and November 2023. Over the last few days, a <strong>new variant<\/strong> has been observed, with small new changes as reported <a href=\"https:\/\/twitter.com\/Tac_Mangusta\/status\/1732116846889845064?t=1V8QqJrxmn879Z0T7jXLyw&amp;s=35\">here<\/a>. These changes are also reported in the table below.<\/p>\n\n\n\n<figure class=\"wp-block-table has-small-font-size\"><table class=\"has-text-color has-link-color\" style=\"color:#000000\"><thead><tr><th><\/th><th><strong>March 2022<\/strong><\/th><th><strong>November 2023<\/strong><\/th><th><strong>December 2023<\/strong><\/th><\/tr><\/thead><tbody><tr><td><strong>Infection Chain<\/strong><\/td><td>USB (.lnk)<\/td><td>USB (.lnk)<\/td><td>USB (.lnk)<\/td><\/tr><tr><td><strong>Stage 1<\/strong><\/td><td>Powershell (explorer.ps1): RuntimeBroker.exe download (external file on GitHub)<\/td><td>PowerShell (explorer.ps1): Download and execution of PowerShell code from Vimeo<\/td><td>PowerShell (explorer.ps1): Download and execution of PowerShell code from ArsTechnica<\/td><\/tr><tr><td><strong>Stage 2<\/strong><\/td><td>RuntimeBroker.exe Execution<\/td><td>Powershell: RuntimeBroker.exe Download<\/td><td>Powershell: RuntimeBroker.exe Download<\/td><\/tr><tr><td><strong>Stage 3<\/strong><\/td><td>\/<\/td><td>RuntimeBroker.exe Execution<\/td><td>RuntimeBroker.exe Execution<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Campaigns evolution<\/figcaption><\/figure>\n\n\n\n<p>We provide a technical analysis of the entire compromise chain, <strong>comparing each step of the March 2022 and November 2023 campaigns.<\/strong><\/p>\n\n\n\n<div style=\"height:68px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-text-color has-link-color has-large-font-size wp-elements-45f174c5e8990737d8e8a711062904a0\" id=\"h-technical-analysis\" style=\"color:#000000;font-style:normal;font-weight:700\">Technical Analysis<\/h1>\n\n\n\n<p>The infection vector is an USB drive, containing a .lnk file.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color has-medium-font-size wp-elements-0e687d8d1eaa64dc3725a73e8efc5e83\" id=\"h-file-pendrivename-lnk\" style=\"color:#000000\"><strong>File &#8220;pendrivename&#8221;.lnk<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-text-color has-link-color has-medium-font-size wp-elements-7e9e06c58a14b8b2c880c7d137bf9b1a\" id=\"h-march-2022-november-2023\" style=\"color:#000000\"><em>March 2022 &amp; November 2023<\/em><\/h3>\n\n\n\n<p>The file \u201c<strong>penndrivename.lnk<\/strong>\u201d (where \u201cpendrivename\u201d varies with the USB device used) is located within the removable USB device. This file holds the inital command for the compromise in its <strong>Destination field.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/image-3.png\" alt=\"\" loading=\"lazy\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Technical information:<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter has-small-font-size\"><table class=\"has-text-color has-link-color\" style=\"color:#000000\"><tbody><tr><td><strong>NAME<\/strong><\/td><td><strong>Pendrivename.lnk<\/strong><\/td><\/tr><tr><td><strong>MD5<\/strong><\/td><td>9C72F27AABF97782734C7620A445A5DB<\/td><\/tr><tr><td><strong>SHA1<\/strong><\/td><td>6257313E5B2A9A714A2E3ABCC0BC60CACABEB299<\/td><\/tr><tr><td><strong>SHA256<\/strong><\/td><td>7A8DF9FC056835A659BE9E5B9F6F34D0ED8CA548B26CB41C14C76ADB78FAF0E7<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>From the properties of the link, it can be observed that the file \u201cKINGSTON (124GB).lnk\u201d executes the <strong>PowerShell<\/strong> command for the initiation of the <strong>explorer.ps1<\/strong> script:<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter has-small-font-size\"><table class=\"has-text-color has-link-color\" style=\"color:#000000\"><tbody><tr><td>C:\\WINDOWS\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -windowstyle hidden -nologo -NoProfile -ExecutionPolicy ByPass -File explorer.ps1<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color has-medium-font-size wp-elements-b486bbc7025c0322879b55c33ad55f45\" id=\"h-file-explorer-ps1\" style=\"color:#000000\"><strong>File &#8220;explorer.ps1&#8221;<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-text-color has-link-color has-medium-font-size wp-elements-d462c0d2d4ee0483ae49bf0100ce5bd4\" id=\"h-march-2022\" style=\"color:#000000\">March 2022<\/h3>\n\n\n\n<p>The <strong>PowerShell<\/strong> script executed by the .lnk file contains a series of instructions on a single line. The values of the variables used are encoded in base64 to <strong>evade any checks by protection software.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter has-small-font-size\"><table class=\"has-text-color has-link-color\" style=\"color:#000000\"><tbody><tr><td><strong>NAME<\/strong><\/td><td>explorer.ps1<\/td><\/tr><tr><td><strong>MD5<\/strong><\/td><td>6B51E7F335BEDB7F66B31C24750F0619<\/td><\/tr><tr><td><strong>SHA1<\/strong><\/td><td>748BC66D21B77BB8DE7EB8A624FDC6C976901E96<\/td><\/tr><tr><td><strong>SHA256<\/strong><\/td><td>99D9DFD8F1C11D055E515A02C1476BD9036C788493063F08B82BB5F34E19DFD6<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/image-5.png\" alt=\"\" loading=\"lazy\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Content of the script duly formatted for better reading:<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/image-6.png\" alt=\"\" loading=\"lazy\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>The variables <em>$d, $f,<\/em> and <em>$aa<\/em> contain the information of the system paths where the Worm places the malicious files. These have been <strong>obfuscated to prevent the identification of compromise indicators by protection software.<\/strong><\/p>\n\n\n\n<p>Their content is used for the creation of the variables <em>$bb<\/em>,<em> $h<\/em>, and <em>$mn<\/em>. By executing the first 9 lines of the script, it is possible to obtain the decoded content of the final variables:<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/contenut-variabile-decoedificat.png\" alt=\"\" loading=\"lazy\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Upon examining the content of the variable <em>$bb<\/em>, it is possible to notice an &#8220;empty&#8221; character at the end of the path (highlighted in yellow). Following the way the path is constructed, it is possible to trace back to the invisible value in the variable <em>$aa<\/em>. The initial value is the <strong>base64<\/strong> string &#8220;44wk&#8221;. Decoding the value yields the <strong>Unicode Hangul Filler character (U+3164).<\/strong><\/p>\n\n\n\n<p>The path contained in the variable <em>$bb<\/em> is therefore valid as it <strong>contains a character &#8220;rendered&#8221; by an &#8220;empty space&#8221;<\/strong>. This technique allows the attacker to hide elements in the system from the Windows graphical interface and makes identification from the command line difficult.<\/p>\n\n\n\n<p>The second part of the script performs a <strong>check on the actual presence of the hidden folder in the system<\/strong>. If the folder is present, the default action is invoked, which is the opening of the same via explorer.exe. In this way, the victim user actually sees the folder containing the data saved on the device.<br>Subsequently, a file is downloaded and saved to the path specified by the variable <em>$mn<\/em>. The URL of the file is created from a string, which in turn is downloaded from the URL contained in the variable <em>$f<\/em>: \u201c<strong>src.txt<\/strong>\u201d contained in a <strong>GitHub repository<\/strong> (which is no longer available as of today, <strong><em>hxxps:\/\/eldi8[.]github.io\/src.txt<\/em><\/strong>).<\/p>\n\n\n\n<p><strong>The content of the file appears empty.<\/strong> However, it contains a series of spaces, tabs, and &#8220;newline&#8221; characters:<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/contenutosrctext.png\" alt=\"\" loading=\"lazy\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The &#8220;empty&#8221; spaces in the document are replaced by the script with the characters &#8220;0&#8221;, &#8220;1&#8221;, and &#8221; &#8221; (space):<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/passaggiodecodificasrctxt.png\" alt=\"\" loading=\"lazy\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The downloaded content, on which substitutions are applied, appears to be a <strong>series of binary strings.<\/strong> The decoding process involved several steps: From Base 2 to Base 10, and then to ASCII String. Continuing with the decoding, we <strong>obtain the following URL: <em>hxxps:\/\/wjecpujpanmwm[.]tk\/updater.php?from=USB1<\/em><\/strong><\/p>\n\n\n\n<p>After downloading and saving the malicious executable, the script <strong>halts its execution for 5 seconds<\/strong> (Start-Sleep -s 5), checks for the presence of the file C:\\Program Files (x86)\\WinSoft Update Service\\pythonw.exe (the variable <em>$h<\/em>), and if the check is negative, it executes the just downloaded file. At the end of the execution, the script again halts its execution for 1 second (Start-Sleep -s 1) and re-executes the file if the previously checked path still does not exist. <strong>These last steps are repeated indefinitely, until the file C:\\Program Files (x86)\\WinSoft Update Service\\pythonw.exe is created.<\/strong><\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-color has-link-color has-medium-font-size wp-elements-bc39b915f5c3d3782905ee0822f65809\" id=\"h-november-2023\" style=\"color:#000000\">November 2023<\/h3>\n\n\n\n<p>In the most recent version of the malware, the content of the file is <strong>entirely encoded in base64<\/strong>. The content is decoded and executed upon opening.<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/explorerps1contentnew.png\" alt=\"\" loading=\"lazy\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The executed script is the following:<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/deobscript1.png\" alt=\"\" loading=\"lazy\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Once deobfuscated, its functionalities can be evaluated:<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/deobscript2.png\" alt=\"\" loading=\"lazy\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>In this version, the script <strong>downloads the metadata of a video present on the Vimeo streaming platform in JSON format from which to extract additional PowerShell code to execute.<\/strong> Below is the decrypted and deobfuscated content.<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/laststage1.png\" alt=\"\" loading=\"lazy\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Several similarities can be noticed with the script from the previous year. In particular, <strong>the final stage consists of executing a file called RuntimeBroker.exe, and the domain wjecpujpanmwm[.]tk is present in both files. <\/strong><\/p>\n\n\n\n<p>The behavior of the malware from the execution of RuntimeBroker.exe <strong>is almost identical<\/strong> to the behavior identified the previous year, as it is reported below.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color has-medium-font-size wp-elements-1846ef83358f945ea42c69ec3b5a0a4d\" id=\"h-brokerloader-insights\" style=\"color:#000000\"><strong>BrokerLoader Insights<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-text-color has-link-color has-medium-font-size wp-elements-b45c0395c743cd02ae9cd94ec6239bb5\" id=\"h-march-2022-1\" style=\"color:#000000\">March 2022<\/h3>\n\n\n\n<p>During the execution of the PowerShell of explorer.ps1, a file is downloaded from the link hxxps:\/\/wjecpujpanmwm[.]tk\/updater.php?from=USB1, which is then saved as &#8220;Runtime Broker.exe&#8221; at the path specified by the variable <em>$mn<\/em>.<\/p>\n\n\n\n<p>Technical information about the malicious file:<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter has-small-font-size\"><table class=\"has-text-color has-link-color\" style=\"color:#000000\"><tbody><tr><td><strong>NAME<\/strong><strong><\/strong><\/td><td>Runtime Broker.exe<\/td><\/tr><tr><td><strong>MD5<\/strong><strong><\/strong><\/td><td>abc7a9c5b732b72a8f47fd85ee638c09<\/td><\/tr><tr><td><strong>SHA1<\/strong><strong><\/strong><\/td><td>9876415085f95c02d6bcea9b1fc990d5b5c50d1c<\/td><\/tr><tr><td><strong>SHA256<\/strong><strong><\/strong><\/td><td>d9ebb6958afcd1907651487062108ec56a2af9eb935f2437156584081cb56b2f<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-color has-link-color has-medium-font-size wp-elements-5630130c321e7d6dec873803da5cfec7\" id=\"h-november-2023-1\" style=\"color:#000000\">November 2023<\/h3>\n\n\n\n<p>Once RuntimeBroker.exe is deobfuscated, it is possible to <strong>highlight some fundamental characteristics of the malware.<\/strong><\/p>\n\n\n\n<p>The malware performs a check for its presence on the machine and, if not found, it may create a <strong>Mutex.<\/strong> Then it enumerates the content of the connected removable devices to search for a folder with the same name as the removable device in which it is located.<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/blck1.png\" alt=\"\" loading=\"lazy\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The malware downloads, loads into memory, and executes an additional payload.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"472\" height=\"382\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/carosello1.png\" alt=\"\" class=\"wp-image-8490\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/carosello1.png 472w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/carosello1-300x243.png 300w\" sizes=\"(max-width: 472px) 100vw, 472px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"487\" height=\"340\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/carosello2.png\" alt=\"\" class=\"wp-image-8491\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/carosello2.png 487w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/carosello2-300x209.png 300w\" sizes=\"(max-width: 487px) 100vw, 487px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"366\" height=\"397\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/carosello3.png\" alt=\"\" class=\"wp-image-8492\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/carosello3.png 366w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/carosello3-277x300.png 277w\" sizes=\"(max-width: 366px) 100vw, 366px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>After the payload is downloaded and the commands are executed, any results are<strong> sent to the serve<\/strong>r along with some <strong>information about the host and the currently executing payload<\/strong>. The configuration is downloaded from the URL <strong><em>hxxps:\/\/bobsmith[.]apiworld[.]cf\/license[.]php<\/em><\/strong>, to which information about the host is sent.<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/blck2.png\" alt=\"\" loading=\"lazy\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:68px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-text-color has-link-color has-large-font-size wp-elements-50868cac8cdf6d09a74e76f9d77e3df1\" id=\"h-malware-classification\" style=\"color:#000000;font-style:normal;font-weight:700\">Malware Classification<\/h1>\n\n\n\n<p>We consider this malware, dubbed internally as \u201c<strong>BrokerLoader<\/strong>\u201d, to have been specifically created by <strong>Nebula Broker<\/strong> for use in <strong>campaigns targeting Italy<\/strong>.<br>During the past years, <strong>domains related to the malware remained substantially the same.<\/strong><br>In the last registered incident, instead, was noted a complete substitution of the domains used to download RuntimeBroker and the final payload.<\/p>\n\n\n\n<div style=\"height:68px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-text-color has-link-color has-large-font-size wp-elements-973a05624d493d31dc1e84c7075e7bac\" id=\"h-threat-actor-attribution\" style=\"color:#000000;font-style:normal;font-weight:700\">Threat Actor Attribution<\/h1>\n\n\n\n<p>Fortgale, with a substantial degree of certainty, identifies Nebula Broker as an <strong>italian-speaking threat actor.<\/strong> This conclusion is drawn based on several pieces of supporting evidence:<\/p>\n\n\n\n<ul style=\"color:#000000\" class=\"has-text-color has-link-color wp-block-list wp-elements-f864e0173310aa6e2d47f1b2adb8fe8f\">\n<li><strong>Analysis of the RuntimeBroker Executable<\/strong>: The examination of the RuntimeBroker executable has provided significant insights that reinforce this belief;<\/li>\n\n\n\n<li><strong>Characteristics of the C2s Used in Initial Campaigns (2020-2021)<\/strong>: Certain distinctive features of the Command and Control servers (C2s) utilized in the early operations further affirm this viewpoint;<\/li>\n\n\n\n<li><strong>Specific Naming Conventions in Observed Samples (2020-2021)<\/strong>: The unique naming patterns in some of the samples observed during 2020-2021 also point towards the Italian-speaking nature of the actor.<\/li>\n<\/ul>\n\n\n\n<p>In the following section, we will delve into a detailed analysis of the RuntimeBroker\u2019s features:<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/12\/attribution.png\" alt=\"\" loading=\"lazy\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>The manifest file of RuntimeBroker.exe generated by Visual Studio is in Italian, indicating that an Italian version of the development suite was used.<\/strong><\/p>\n\n\n\n<p>With a low level of uncertainty, it can be assumed that the person who compiled the malware is of Italian language. There are several other elements that create a strict <strong>link between the threat actor and Italy,<\/strong> such as open-source intelligence (OSINT) information we collected by analyzing the GitHub repository used in the March 2022 campaign. <\/p>\n\n\n\n<p>With a high level of confidence, we consider <strong>N-Broker to be a group of e-crime actors of Italian language. It targets Italian companies and individuals with large-scale and non-targeted malware campaigns, that are evolving over time.<\/strong><\/p>\n\n\n\n<div style=\"height:68px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-text-color has-link-color has-large-font-size wp-elements-95e38b30df05fc719c0df1f3bda6eaab\" id=\"h-indicators-of-compromise\" style=\"color:#000000;font-style:normal;font-weight:700\">Indicators of Compromise<\/h1>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color has-medium-font-size wp-elements-0c95e1acd51e1679a57912b65a5a81e7\" id=\"h-march-2022-2\" style=\"color:#000000\"><strong>March 2022<\/strong><\/h2>\n\n\n\n<p><strong>HASH<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table has-small-font-size\"><table class=\"has-text-color has-link-color\" style=\"color:#000000\"><tbody><tr><td><strong>NAME<\/strong><\/td><td><strong>KINGSTON (124GB).lnk<\/strong><\/td><\/tr><tr><td><strong>MD5<\/strong><\/td><td>9C72F27AABF97782734C7620A445A5DB<\/td><\/tr><tr><td><strong>SHA1<\/strong><\/td><td>6257313E5B2A9A714A2E3ABCC0BC60CACABEB299<\/td><\/tr><tr><td><strong>SHA256<\/strong><\/td><td>7A8DF9FC056835A659BE9E5B9F6F34D0ED8CA548B26CB41C14C76ADB78FAF0E7<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">KINGSTON (124GB).lnk<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-table has-small-font-size\"><table class=\"has-text-color has-link-color\" style=\"color:#000000\"><tbody><tr><td><strong>NAME<\/strong><\/td><td>explorer.ps1<\/td><\/tr><tr><td><strong>MD5<\/strong><\/td><td>6B51E7F335BEDB7F66B31C24750F0619<\/td><\/tr><tr><td><strong>SHA1<\/strong><\/td><td>748BC66D21B77BB8DE7EB8A624FDC6C976901E96<\/td><\/tr><tr><td><strong>SHA256<\/strong><\/td><td>99D9DFD8F1C11D055E515A02C1476BD9036C788493063F08B82BB5F34E19DFD6<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">explorer.ps1<\/figcaption><\/figure>\n\n\n\n<p><strong>Domains &amp; URLs<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table has-small-font-size\"><table class=\"has-text-color has-link-color\" style=\"color:#000000\"><tbody><tr><td>hxxps:\/\/eldi8[.]github.io\/src.txt<\/td><\/tr><tr><td>https:\/\/wjecpujpanmwm[.]tk\/updater[.]php?from=USB1<\/td><\/tr><tr><td>https:\/\/lucaespo[.]altervista[.]org<\/td><\/tr><tr><td>https:\/\/studiofotografico35mm[.]altervista[.]org<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color has-medium-font-size wp-elements-b250beaabef93ef8cb8c243468764a6b\" id=\"h-november-2023-2\" style=\"color:#000000\"><strong>November 2023<\/strong><\/h2>\n\n\n\n<p><strong>HASH<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table has-small-font-size\"><table class=\"has-text-color has-link-color\" style=\"color:#000000\"><tbody><tr><td><strong>NAME<\/strong><\/td><td>Explorer.ps1<\/td><\/tr><tr><td><strong>MD5<\/strong><\/td><td>EB2DF3C33F102A792068A28B122832EE<\/td><\/tr><tr><td><strong>SHA1<\/strong><\/td><td>223AA8C734913B982826600EFC10A1E298D1D337<\/td><\/tr><tr><td><strong>SHA256<\/strong><\/td><td>218A819360DF70ECC4CDBDFAC4FBC0E49BE3F4CADBAD04D591A3DE992617DAC2<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">explorer.ps1<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-table has-small-font-size\"><table class=\"has-text-color has-link-color\" style=\"color:#000000\"><tbody><tr><td><strong>NAME<\/strong><\/td><td>RuntimeBroker.exe<\/td><\/tr><tr><td><strong>MD5<\/strong><\/td><td>730F84805B3B815BF5F11B4EF0E60EE2<\/td><\/tr><tr><td><strong>SHA1<\/strong><\/td><td>E5A8E615F69BDAE35160B8BCC8DD7D5F272B2FEB<\/td><\/tr><tr><td><strong>SHA256<\/strong><\/td><td>8A492973B12F84F49C52216D8C29755597F0B92A02311286B1F75EF5C265C30D<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">explorer.ps1<\/figcaption><\/figure>\n\n\n\n<p><strong>Domains &amp; URLs<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table has-small-font-size\"><table class=\"has-text-color has-link-color\" style=\"color:#000000\"><tbody><tr><td>hxxps:\/\/vimeo[.]com\/api\/v2\/video\/804838895[.]json<\/td><\/tr><tr><td>hxxps:\/\/bobsmith[.]apiworld[.]cf\/license[.]php<\/td><\/tr><tr><td>https:\/\/wjecpujpanmwm[.]tk\/updater[.]php?from=USB1<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Fortgale has been tracking an Italian Threat Actor, internally dubbed as Nebula Broker, since March 2022. The actor uses self-made malware (BrokerLoader) to compromise Italian systems. Further analysis revealed that the attacker has been operating since the end of 2020. Although this threat is not well-known, the number of compromises is particularly extensive. Indeed, Fortgale [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":8393,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2515],"tags":[3068,3063,1439,3062,3064],"class_list":["post-8288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","tag-attention","tag-brokerloader","tag-malware-it","tag-nebulabroker","tag-threatactor"],"_links":{"self":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/8288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/comments?post=8288"}],"version-history":[{"count":39,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/8288\/revisions"}],"predecessor-version":[{"id":8528,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/8288\/revisions\/8528"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/media\/8393"}],"wp:attachment":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/media?parent=8288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/categories?post=8288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/tags?post=8288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}