Saudi Arabian Government Hit by Stealthy Macro Malware
- Actor Motivations: Espionage
- Attack Vectors: Malicious Macro,Malware
- Attack Complexity: Low
- Threat Risk: Low Impact/High Probability
Threat Overview
A Saudi Arabian Government entity has been targeted by an innovative attack that relies on macros within malicious Word documents and leverages various scripts rather than a binary payload. The attack uses a VBScript to lower security settings within Microsoft Word and Excel and fetches data from Pastebin. A PowerShell script then communicates with the C2 server and exfiltrates data, persistently remaining undetected and continuing to collect information from the targeted system. The primary targeted sector is the Government.
Detected Targets
Type | Description | Confidence |
---|---|---|
Sector | Government Agencies and Services | Verified |
Region | Saudi Arabia | Verified |
Extracted IOCs
- arch-tech[.]net
- heartmade[.]ae
- itcdubai[.]net
- larsson-elevator[.]com
- projac.co[.]uk
- romix-group[.]com
- spearhead-training[.]com
- taxconsultantsdubai[.]ae
- wmg-global[.]com
- 144[.]76.109.88
- 144[.]76.109.88/al/
- arch-tech[.]net/components/com_layer_slider/senditem.php?c=
- heartmade[.]ae/plugins/content/contact/senditem.php?c=
- itcdubai[.]net/action/contact_gtc.php?c=
- larsson-elevator[.]com/plugins/xmap/com_k2/com.php?c=
- projac.co[.]uk/senditem.php?c=
- romix-group[.]com/modules/mod_wrapper/senditem.php?c=
- spearhead-training[.]com/action/point2.php?c=
- taxconsultantsdubai[.]ae/wp-content/themes/config.php?c=
- wmg-global[.]com/wp-content/wp_fast_cache/wmg-global.com/senditem.php?c=
Tip: 20 related IOCs (1 IP, 9 domain, 10 URL, 0 email, 0 file hash) to this threat have been found.
Overlaps
Source: Reaqta - November 2017
Detection (eight cases): 144[.]76.109.88, arch-tech[.]net, heartmade[.]ae, itcdubai[.]net, larsson-elevator[.]com, projac.co[.]uk, romix-group[.]com, taxconsultantsdubai[.]ae
Source: Unit 42 - Palo Alto Networks - November 2017
Detection (one case): 144[.]76.109.88
Source: Security 0wnage - October 2017
Detection (one case): 144[.]76.109.88
Hint: Overlaps are extracted automatically by examining the IOCs associated with all indexed threats and actors.