Bloody Wolf evolution: new targets, new tools

BI.ZONE

--

The notorious cluster changes its toolkit by switching from malware to a legitimate remote administration tool

BI.ZONE Threat Intelligence continues to monitor Bloody Wolf’s activity. While previously the attackers primarily used STRRAT malware, they have now opted for the legitimate remote administration tool NetSupport. Additionally, a retrospective analysis of the campaigns reveals that the attacks targeted organizations not only in Kazakhstan but also in Russia. In their latest activity, the criminals compromised more than 400 systems.

Key findings

  • Attackers tend to replace malware with legitimate solutions to minimize detection by conventional defenses.
  • Widespread telecommuting encourages the proliferation of remote administration software: attackers exploit such software on a target system and can deploy their own.
  • Legitimate remote administration tools often give attackers full access to a compromised system, allowing them to manipulate it in any way they want.

Kazakhstan campaign

In December 2024, BI.ZONE Threat Intelligence detected new activity from Bloody Wolf targeting organizations in Kazakhstan. As before, the attackers used phishing to distribute PDF documents masquerading as compliance notices.

Decoy document sent by the attackers

Such documents would contain phishing links that could catch a victim off guard and result in the download of a malicious JAR file, NCALayerUpdatedRU.jar.

This file was a loader that performed the following operations:

  • checked for the folder %APPDATA%\NCALayerUpdated and created one if not found
  • used the link hxxps://pastebin[.]com/raw/pruy96p1 to retrieve a list of URLs for loading NetSupport components
  • loaded the NetSupport components into the folder %APPDATA%\NCALayerUpdated
  • ran the component %APPDATA%\NCALayerUpdated\update.bat
  • ran the component %APPDATA%\NCALayerUpdated\run.bat
  • sent the name of the compromised system to a dedicated Telegram chat
Decompiled code of the method getFileUrlsFromPastebin
Decompiled code of the method downloadFile
Decompiled code of the method sendTelegramMessage

The update.bat file launched the NetSupport client, while run.bat ensured its persistence on the compromised system.

run.bat file contents

In this specific campaign, Bloody Wolf used NetSupport client version 11.42.

NetSupport is designed for remote control, monitoring, support, and learning. The software is used in educational institutions for remote training and in corporate IT departments.

Russian campaign

A retrospective analysis of the Bloody Wolf activity also revealed a campaign targeting Russian organizations.

As in the case with Kazakhstan, the attackers used phishing emails to distribute PDF documents.

Phishing letter

The PDF document with phishing links was disguised as a ruling on liability for a tax offense.

Decoy attachment containing phishing links

Similar to the Kazakhstan campaign, the phishing links led to a malicious JAR file, such as ReshenieJCP.jar.

The file was a loader that performed the following actions:

  • checked for the folder %APPDATA%\CryptoProJCP and created one if not found
  • used the link hxxps://pastebin[.]com/raw/hLUWEXTH to retrieve a list of URLs for loading NetSupport components
  • loaded the NetSupport components into the folder %APPDATA%\CryptoProJCP
  • ran the component %APPDATA%\CryptoProJCP\update.bat
  • ran the component %APPDATA%\CryptoProJCP\run.bat
  • sent the name of the compromised system to a dedicated Telegram chat

Thus, we can note that the process of compromising a system is essentially the same as described above.

Indicators of compromise

  • 473596b2f09910b0484bac76190de4868b7d4ac756c46c102dc3bd91609d239e
  • 10cd57a425b72d4f21c8f88b5d4033fad4477dd147cdf13b013f6391168c63bb
  • b2c776a9554e2919f7a7e287f2954674fc5dbd6a10f342558ad98b606d664075
  • 6ae7b754e74a6aa9f803037a8252cf5acfe5b8e8d82ae4b9b9a38826c4586702
  • salyk-notofocations[.]com
  • 1994Collective[.]com
  • 1994Collective13[.]com
  • yessenov[.]com
  • ozhet[.]com
  • kazsrv[.]online

More indicators of compromise, information on other campaigns and a profile of the Bloody Wolf cluster are available on the BI.ZONE Threat Intelligence portal.

MITRE ATT&CK

Detection

The described malicious activity can be detected using the following rules from BI.ZONE EDR:

  • win_access_to_paste_services_from_nonbrowsers
  • win_netsupport_client_detected

How to protect your company from such threats

Attacks similar to those by Bloody Wolf are not only critical to detect but also to neutralize before they affect the infrastructure. To protect your company against advanced threats, we recommend implementing endpoint detection and response practices, for instance, BI.ZONE EDR. The service enables early detection of attacks and immediate incident response, either automated or manual.

To stay ahead of threat actors, you need to be aware of the methods they use when attacking various infrastructures. Understanding the real threat landscape is a massive advantage against adversity. For this purpose, we would recommend that you leverage the data from the BI.ZONE Threat Intelligence portal. The solution provides information about the current attacks, threat actors, their methods and tools. This data helps to ensure the precision of your security solutions, which in turn accelerates incident response and protects your company from the most critical threats.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

BI.ZONE
BI.ZONE

Written by BI.ZONE

BI.ZONE: an expert in digital risks management. We help organizations around the world to develop their businesses safely in the digital age

No responses yet

Write a response