HomeCyber BalkansThreat Actors Utilizing AES Encryption for Covert Payload Protection

Threat Actors Utilizing AES Encryption for Covert Payload Protection

Published on

spot_img

Cybersecurity researchers have recently discovered a concerning trend in the use of Advanced Encryption Standard (AES) encryption by threat actors to conceal malicious payloads from detection. This encryption technique, when combined with code virtualization and staged payload delivery, is proving to be particularly effective in evading static analysis tools and sandbox environments. Malicious software families like Agent Tesla, XWorm, and FormBook/XLoader are utilizing these tactics to stay under the radar and avoid detection.

Malware developers have become increasingly adept at employing sophisticated obfuscation methods to protect their payloads. AES encryption, a powerful symmetric block cipher that uses a shared key, is at the forefront of these tactics. Unlike simpler encryption methods like XOR, AES ensures robust security by transforming plaintext data into ciphertext through multiple rounds of substitution and permutation. In the observed samples, AES operates in Cipher Block Chaining (CBC) mode, encrypting each block of plaintext with a unique initialization vector (IV) to make decryption more challenging.

The initial stage of these malware samples involves embedding encrypted payloads within the Portable Executable (PE) overlay, a tactic that often goes unnoticed by static analysis tools. Critical cryptographic parameters such as the AES key and IV are stored in this section of the file, alongside specific markers and arbitrary padding sequences to evade signature-based detection systems. Upon decryption, the second stage employs code virtualization using KoiVM, a plugin for the ConfuserEx obfuscation tool, which converts traditional code into a custom intermediate language that can only be executed by a specialized virtual machine (VM).

The VM’s dispatcher is responsible for routing instructions to specific handlers, making reverse engineering a daunting task for analysts. In the Stage 2 payload, a dropper is used to decrypt and load the final malicious code into memory, ensuring that the malware remains hidden from traditional file-based detection methods. The final stage involves executing the decrypted payload directly in memory, bypassing common detection techniques.

The payloads analyzed primarily belong to the Agent Tesla and XWorm families, with some samples containing FormBook/XLoader shellcode. XWorm goes a step further by encrypting its configuration parameters using AES in Electronic Codebook (ECB) mode, with hardcoded keys stored within the malware’s variables. According to Unit 42 researchers, these multi-staged techniques enable threat actors to dynamically load and execute malicious code while evading detection mechanisms.

By leveraging .NET reflection capabilities, malware can introduce new objects or manipulate existing ones at runtime, further complicating analysis efforts. As cyber threats continue to evolve, the adoption of advanced obfuscation techniques highlights the need for security solutions to adapt and incorporate behavioral analytics and machine learning to detect anomalies during runtime. Behavioral threat protection and anti-exploitation modules can help identify and neutralize threats before they have a chance to execute.

As threat actors become more innovative, collaboration between cybersecurity researchers and vendors is crucial in effectively countering these advanced techniques. It is essential for security teams to stay vigilant and continuously update their detection methods to keep up with the evolving threat landscape. By working together and sharing knowledge, the cybersecurity community can stay one step ahead of malicious actors and protect against sophisticated cyber threats.

Source link

Latest articles

Malicious Browser Add-on Targets Private Keys of imToken Users

Deceptive Chrome Extension Targeting Cryptocurrency Users Uncovered Socket’s Threat Research Team has brought to light...

WCSO Investigates Cyber Attack on Network

Warren County Sheriff’s Office Investigates Cyber Attack on Employee Data In a concerning development for...

OpenAI’s Codex Security Designed to Automate Vulnerability Discovery and Remediation

OpenAI Unveils Codex Security: A Breakthrough in Application Security OpenAI has made a significant stride...

Hackers Distribute Fake Rocket Alert App to Spy on Israeli Users

Deceptive Mobile Phone Campaign Discovered in Israel A recent study conducted by the research firm...

More like this

Malicious Browser Add-on Targets Private Keys of imToken Users

Deceptive Chrome Extension Targeting Cryptocurrency Users Uncovered Socket’s Threat Research Team has brought to light...

WCSO Investigates Cyber Attack on Network

Warren County Sheriff’s Office Investigates Cyber Attack on Employee Data In a concerning development for...

OpenAI’s Codex Security Designed to Automate Vulnerability Discovery and Remediation

OpenAI Unveils Codex Security: A Breakthrough in Application Security OpenAI has made a significant stride...