2022-06-08 (WEDNESDAY) - MONSTER LIBRA (TA551) SVCREADY INFECTION
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
NOTES:
- Sometime in April 2022, Monster Libra (TA551) began distributing a new malware family named SVCready.
 - Today's infection used a Word document with an Italian language template.
 - More information on SVCready can be found here.
 - Some data on Monster Libra can be found here.
 
ASSOCIATED FILES:
- 2022-06-08-IOCs-for-SVCready-infection.txt.zip 1.8 kB (1,846 bytes)
 - 2022-06-08-SVCready-infection.pcap.zip 4.8 MB (4,818,874 bytes)
 - 2022-06-08-SVCready-malware-and-artifacts.zip 5.0 MB (4,995,727 bytes)
 
INDICATORS
MALWARE:
SHA256 hash: d74c9ebf3a09df2fccd47265ddab693862b09a4d1cfea336675baff32bc83c93
- File size: 1,986,318 bytes
 - File name: coreinsrl.document.08.06.2022.doc
 - File description: Example of Italian language template Word document with macros for SVCready
 
SHA256 hash: 6cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
- File size: 61,440 bytes
 - File location: C:\Users\[username]\AppData\Local\Temp\r78AD.tmp.exe
 - File description: Copy of rundll32.exe (not inherently malicious)
 
SHA256 hash: d1fd5c38787affe3b1a09039baff4f4be3a8a7045927fd32536db3310a886b0c
- File size: 835,584 bytes
 - File location: hxxp[:]//marinesss[.]su/xd/DE8dTPMvW1_oSwAuyl6sWTbkxj7zUB0TbQ~~/XXIuljLT2yw6c132eukG9J3jqz470HZ8jw~~/
 - Initial saved location: C:\Users\[username]\AppData\Local\Temp\y7021.tmp.dll
 - Persistent saved location:
 - C:\Users\[username]\AppData\Roaming\Microsoft\03111A6F-4EE9-4DD1-B29C-98A365C3A188.mLT
 - C:\Users\[username]\AppData\Roaming\Microsoft\A7618B65-1624-4887-901E-B5C83235DE38.GD8
 - C:\Users\[username]\AppData\Roaming\Microsoft\E63A728C-39AA-4C37-8760-C11049F7B898.XcT
 - C:\Users\[username]\AppData\Roaming\Microsoft\F0610BAA-2BD0-494E-A3C9-EA29C25A8FFB.88B
 - File description: SVCready DLL
 - Run method: rundll32.exe [filename], DllRegisterServer
 - Note 1: The persistent SVCready DLL is copied to a new name approximately every 30 to 45 minutes.
 - Note 2: The scheduled task is updated to relfect the new name of the SVCready DLL
 - Note 3: Old copies of the SVCready DLL remain under C:\Users\[username]\AppData\Roaming\Microsoft\
 
INFECTION TRAFFIC DOMAINS/IP ADDRESSES:
- 5.188.90[.]154 port 80 - marinesss[.]su
 - 5.188.90[.]154 port 80 - galmerts[.]art
 
INFECTION TRAFFIC URLS:
- marinesss[.]su - GET /xd/DE8dTPMvW1_oSwAuyl6sWTbkxj7zUB0TbQ~~/XXIuljLT2yw6c132eukG9J3jqz470HZ8jw~~/ HTTP/1.1
 - marinesss[.]su - POST /xl/gate/check HTTP/1.1
 - marinesss[.]su - POST /xl/gate HTTP/1.1 (text/plain)
 - marinesss[.]su - POST /xl/gate HTTP/1.1
 - marinesss[.]su - POST /xl/gate/task HTTP/1.1
 - galmerts[.]art - POST /xl/gate/check HTTP/1.1
 - galmerts[.]art - POST /xl/gate HTTP/1.1 (text/plain)
 - galmerts[.]art - POST /xl/gate HTTP/1.1
 - galmerts[.]art - POST /xl/gate/task HTTP/1.1
 
IMAGES

Shown above:  Chain of events for this SVCready infection.

Shown above:  Word document with macros for SVCready.

Shown above:  TCP stream of SVCready DLL retrieved in network traffic.

Shown above:  SVCready DLL saved to the local host, run with a copy of rundll32.exe in teh same directory.

Shown above:  TCP stream of SVCready C2 traffic.

Shown above:  Scheduled task to keep SVCready persistent on the infected Windows host.

Shown above:  Alerts on the traffic from Security Onion using the EmergingThreats open ruleset.

Shown above:  Traffic from the infection filtered in Wireshark.
Click here to return to the main page.
