top of page
Writer's picturealvin gitonga

🥷 New PHP stealer malware😈 targets Facebook accounts☠️

Updated: Dec 16, 2022

CyberMorans😋

🤨 A new Ducktail phishing campaign is spreading a new Windows info-stealer malware☠️ written in PHP used to steal Facebook accounts, browser data, and cryptocurrency wallets😰
 

Ducktail phishing campaigns were first revealed by researchers🧐 from WithSecure in July 2022, who linked the attacks to Vietnamese hackers😈


Those campaigns relied on social engineering attacks through LinkedIn, pushing .NET Core malware masquerading as a PDF document supposedly containing details about a marketing project🤨


The malware😈 targeted information stored in browsers, focusing on Facebook Business account data, and exfiltrated it to a private Telegram channel that acted as a C2 server. These stolen credentials are then used for financial fraud or to conduct malicious advertising. Zscaler now reports spotting signs of new activity involving a refreshed Ducktail campaign that uses a PHP script to act as a Windows information-stealing malware😈


PHP info-stealer malware💀

Ducktail has now replaced the older NET Core info-stealer malware used in previous campaigns with one written in PHP. Most of the fake lures for this campaign are related to games, subtitle files, adult videos, and cracked MS Office applications. These are hosted in ZIP format on legitimate file hosting services. When executed, the installation takes place in the background while the victim sees fake 'Checking Application Compatibility' pop-ups in the frontend, waiting for a fake application sent by the scammers to install.


The malware will ultimately be extracted to the 👇

 %LocalAppData%\Packages\PXT 

👆 folder, includes the PHP.exe local interpreter, various scripts used to steal information, and supporting tools, as shown below 👇

👆 Ducktail's PHP info-stealer malware: (BleepingComputer)


The PHP malware persistence💀

Done by adding scheduled tasks on the host to execute daily and at regular intervals. At the same time, a generated TMP file runs a parallel process to launch the stealer component😵‍💫. The stealer code is a heavily obfuscated (Base64) PHP script, which is deciphered directly on memory without touching the disk, minimizing the chances of being detected 👇

👆 Stealer code (Zscaler)


The targeted data💀

Extensive Facebook account details, sensitive data stored in browsers, browser cookies, cryptocurrency wallet and account information, and basic system data. The collected information isn't sent to Telegram anymore but instead stored in a JSON website that also hosts account tokens & data required to perform on-device fraud🤨


Enlarging the target radius💀

In the previous campaign, Ducktail targeted employees of organizations working in the financial or marketing department of companies who would likely have permission to create and run advertising campaigns on the social media platform. The goal was to take control of those accounts and direct payments to their bank accounts or run their own Facebook campaigns to promote Ducktail to more victims🥶


In the latest campaign, however, Zscaler noticed that the targeting scope has been broadened to include regular Facebook users and to siphon whatever valuable information they may have stored in their accounts😵‍💫. Still, if the account type is determined to be a business account, the malware will attempt to fetch additional information about payment methods, cycles, amounts spent, owner details, verification status, owned pages, PayPal address, and more 👇

👆Targeting Facebook details (Zscaler)


Ducktail's evolution and attempt to evade subsequent monitoring by security researchers indicates that the hackers aim to continue their profitable operations😣


Users are advised to be watchful with instant messages on LinkedIn and treat file download requests with extra caution, especially cracked software, game mods, and cheats😨


Sourced: Bleepingcomputer

 

Conclusion💀

Subscribe to receive notifications of similar posts 😋 where we will be reverse engineering malware and the technical aspect of vulnerabilities as well as how an attacker may use this vulnerability as an attack vector and other Infosec stuff...😋


Morans,

Thank you for your time, Like and leave a comment/review and as always, stay awesome! 😋👊 💪

45 views0 comments

Recent Posts

See All

Comments


Post: Blog2_Post
bottom of page