
Support
In an investigation occurring in 2021, Stroz Friedberg Incident Response Services team (Stroz Friedberg) encountered a new payload associated with the Taurus loader. Typically, the information security community sees this loader associated with the Taurus Stealer malware. The Taurus Stealer has the ability to collect information from various web browsers, including passwords, cookies, autofill forms and history. However, in this instance, Stroz Friedberg identified a new payload named "AgentVX". This payload contains several functions outlined below. On September 19th, 2022, NSFOCUS Security Labs released an article attributing AgentVX to the group "Evilnum." Since 2021, Stroz Friedberg has not seen publicly available information relating this loader and payload. We are releasing this blog post to provide additional threat intelligence on the AgentVX payload and release a script to assist with the automated decoding of the Taurus loader.
In this investigation, the Taurus loader matched publicly available analysis and Minerva Labs posted analysis on it earlier in 2021. The execution chain begins with a self-extracting archive. This archive drops the following files to %AppData%\BueedgFYHdzEt\:
File | Description |
---|---|
Andate.xlm | Corrupt PE, used to build "Sapro.exe.com" |
Calpestare.pptm | Unused |
Poi.xltx | Obfuscated AutoIT loader is renamed to "x" and executed |
Sapro.exe.com | AutoIT executable used for injection of payload |
Seguente.mpg | Obfuscated batch file used to control the execution flow |
Sta.xll | Encrypted "AgentVX" payload that is injected into "Sapro.exe.com" |
Upon execution, the malware executes "Seguente.mpg," which conducts multiple kill-switch checks that are consistent with the Taurus loader including:
When the checks pass, the malware continues execution to execute the obfuscated AutoIT script, "Poi.xlxt." The AutoIT script conducts additional checks like the above, including checking for the same system name of DESKTOP-QO5QU33. If these checks pass, the malware injects a decrypted version of "Sta.xll" (AgentVX) into the newly created "Sapro.exe.com" process.
The Taurus AutoIT loader, "Poi.xlxt," obfuscates its strings by using an algorithm which takes an integer and an offset, then converts the integer and offset to its ASCII value. Below is an example of an encoded string that uses an offset value of 2:
Encoded String | Decoded String |
---|---|
"74>89>112>102>42>51>56>56>43",2 | HWnd(166) |
Performing the decoding manually for a sample is a very lengthy and cumbersome process. Stroz Friedberg has released code to assist with automatic extraction and decoding of the Taurus AutoIT loader strings. Decoding of the strings allows for quicker analysis of the Taurus loader, allowing an analyst to see de-obfuscated function calls to kernel32 and commands to be run by the script. The Python function described below will de-obfuscate AutoIT strings manually:
def decodeTaurus(string, integer, delim):
res = ''
tab = string.split(delim)
for character in tab:
res = res + chr(int(character)-int(integer))
return res
The execution chain of the self-extracting archive to AgentVX is described in the below figure, followed by a short description of each step in the chain:
Figure 1: Execution chain of self-extracting archive to final AgentVX payload.
A Execution of self-extracting archive
B Start of execution of extracting routine
C Execution of obfuscated batch script
D Identification of start of encrypted payload
E Execution of Taurus AutoIT loader which is renamed from "Poi.xlxt" to "x"
F Execution of AgentVX via injection into "Sapro.exe.com"
Once the loading steps complete, the malware attempts to establish a connection to the Command and Control (C2) server with the following details:
Type | IOC |
---|---|
Domain | cdn.nvbcloud[.]com |
URI | /timeout/voip.aspx |
User-Agent | Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36 |
AgentVX begins by dynamically resolving functions. The malware will gather fingerprint information to send to the C2 server, including:
Once the malware establishes C2 connectivity, it beacons out to the C2 every 6 seconds using the same details above. It waits to receive a "task list" from the server. The task list contains one or multiple tasks to complete and options for those tasks. The tasks within the task list can be any of the following:
This receives a payload from a server provided in the task options. The options allow for the operator to save the payload to disk and execute it, or to inject it into another process memory using calls to: NtMapViewOfSection, VirtualProtectEx, WriteProccessMemory, and ResumeThread. If the operator chooses process injection, they can specify if they wish the payload to be injected into one of the following:
If this task fails, the malware prints a debug string of "Download and execute failed."
This receives a base64 encoded payload from the task options. If the payload is an executable, it writes the executable to disk and names it a random number from 6 to 12 and appends a ".exe" on the end. If the payload is a DLL, it allows the operator to choose one of the following to inject the payload into:
This allows the operator to provide three base64 encoded payloads, at least one of which must be an executable. The malware downloads and writes the executable to disk. The executable is named with a random number between 6 and 12 and is given the ".exe" extension (e.g. "6.exe"). It will set this executable up with persistence by adding the following registry key:
The other two payloads use hardcoded file names:
This option removes the registry run key persistence set by the "Execute and setup persistence" option.
This function receives a base64 encoded DLL which the malware parses for the following exports:
The malware checks its version and if the version is less than "1.6d.1," it prints the debug string: "Bot version is too low to install."
This gets the list of running modules specific to the malware.
This allows the operator to specify another function of the malware to execute. In total, there are 156 functions that the malware can execute. Below are examples of the capabilities that four of these functions provide:
Stroz Friedberg captured an image of the threat actor's malware administration panel for AgentVX. The panel shows the title of "AgentVX from Cerberus" in the top left corner. Additionally, Stroz Friedberg observed the following similarities during our analysis of the malware:
Stroz Friedberg recommends alerting and blacklisting (where possible) the following indicators to help prevent and detect the AgentVX malware:
Type | IOC | Indicates | Notes |
---|---|---|---|
Domain | cdn.nvbcloud[.]com | Malware successfully initiated communications with C2 | |
Domain | QYLBUtMSCcIS.QYLBUtMSCcIS | Malware attempted an anti-sandbox check | |
URI | /timeout/voip.aspx | Malware successfully initiated communications with C2 | |
User-Agent | Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36 | Malware successfully initiated communications with C2 | Ensure to combine this with other IOCs to make this a higher fidelity indicator |
File | Update.exe | The initial dropper may exist on the system | Ensure to combine this with other IOCs to make this a higher fidelity indicator |
File | Andate.xlm | The initial dropper has executed | |
File | Calpestare.pptm | The initial dropper has executed | |
File | Poi.xltx | The initial dropper has executed | |
File | Sapro.exe.com | The initial dropper has executed | |
File | Seguente.mpg | The initial dropper has executed | |
File | Sta.xll | The initial dropper has executed | This file is deleted once it is injected into memory and decrypted |
Folder | %AppData%\XProfiles | The malware started collecting browser information | |
Folder | %AppData%\BueedgFYHdzEt\ | The initial dropper has executed | |
File | %TEMP%\\[0-9]\.png | The malware has loaded an additional module | Regex IOC |
File | Dbghelp.dll | The malware has loaded an additional module | |
File | Pic.png | The malware has loaded an additional module | |
SHA256 | e437a05b660338b5bf068d8cd17c08a9dbf6499cac7f709ccfbf2dcce0fc759b | Hash of update.exe | |
SHA256 | 7477aa86458346df14d8f7315391a28190c01a2caa5f3891eef0ffdb86072116 | Hash of Andate.xlm | |
SHA256 | 0f34cbd62be0b3024e6a630763e5952e1445f74e96d23f862f7845067b1a76f5 | Hash of Calpestare.pptm | |
SHA256 | 9c3d15cb8795e1d7e47d702c6530b960919c2de7bfe191a37b3ac2a2f5259d55 | Hash of Poi.xltx | |
SHA256 | 05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7 | Hash of Sapro.exe.com | |
SHA256 | e0f90d7c68e0aeff8b2932b0e7e2b04c6d44728b383b34d810e3b127ff9f91e3 | Hash of Seguente.mpg | |
SHA256 | 918a5954dc12b16b85900fd72fee1d76cef624b903d78f3ecc6d57a2a3840bb1 | Hash of Sta.xll |
Support
About Cyber Solutions:
Cyber security services are offered by Stroz Friedberg Inc., its subsidiaries and affiliates. Stroz Friedberg is part of Aon’s Cyber Solutions which offers holistic cyber risk management, unsurpassed investigative skills, and proprietary technologies to help clients uncover and quantify cyber risks, protect critical assets, and recover from cyber incidents.
General Disclaimer
While care has been taken in the preparation of this material and some of the information contained within it has been obtained from sources that Stroz Friedberg believes to be reliable, Stroz Friedberg does not warrant, represent or guarantee the accuracy, adequacy, completeness or fitness for any purpose of the article and accepts no liability for any loss incurred in any way whatsoever by any person or organization who may rely upon it. It is for informational purposes only. You should consult with your own professional advisors or IT specialists before implementing any recommendation or following the guidance provided herein. Further, we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. Further, this article has been compiled using information available to us up to 02/03/2023.
Terms of Use
The contents herein may not be reproduced, reused, reprinted or redistributed without the expressed written consent of Aon, unless otherwise authorized by Aon. To use information contained herein, please write to our team.
Our Better Being podcast series, hosted by Aon Chief Wellbeing Officer Rachel Fellowes, explores wellbeing strategies and resilience. This season we cover human sustainability, kindness in the workplace, how to measure wellbeing, managing grief and more.
Expert Views on Today's Risk Capital and Human Capital Issues
Expert Views on Today's Risk Capital and Human Capital Issues
Expert Views on Today's Risk Capital and Human Capital Issues
Better Decisions Across Interconnected Risk and People Issues.
The construction industry is under pressure from interconnected risks and notable macroeconomic developments. Learn how your organization can benefit from construction insurance and risk management.
Stay in the loop on today's most pressing cyber security matters.
Our Cyber Resilience collection gives you access to Aon’s latest insights on the evolving landscape of cyber threats and risk mitigation measures. Reach out to our experts to discuss how to make the right decisions to strengthen your organization’s cyber resilience.
Our Employee Wellbeing collection gives you access to the latest insights from Aon's human capital team. You can also reach out to the team at any time for assistance with your employee wellbeing needs.
Explore Aon's latest environmental social and governance (ESG) insights.
Our Global Insurance Market Insights highlight insurance market trends across pricing, capacity, underwriting, limits, deductibles and coverages.
How do the top risks on business leaders’ minds differ by region and how can these risks be mitigated? Explore the regional results to learn more.
Our Human Capital Analytics collection gives you access to the latest insights from Aon's human capital team. Contact us to learn how Aon’s analytics capabilities helps organizations make better workforce decisions.
Read our collection of human capital articles that explore in depth hot topics for HR and risk professionals, including using data and analytics to measure total rewards programs, how HR and finance can better partner and the impact AI will have on the workforce.
Explore our hand-picked insights for human resources professionals.
Our Workforce Collection provides access to the latest insights from Aon’s Human Capital team on topics ranging from health and benefits, retirement and talent practices. You can reach out to our team at any time to learn how we can help address emerging workforce challenges.
Our Mergers and Acquisitions (M&A) collection gives you access to the latest insights from Aon's thought leaders to help dealmakers make better decisions. Explore our latest insights and reach out to the team at any time for assistance with transaction challenges and opportunities.
The challenges in adopting renewable energy are changing with technological advancements, increasing market competition and numerous financial support mechanisms. Learn how your organization can benefit from our renewables solutions.
How do businesses navigate their way through new forms of volatility and make decisions that protect and grow their organizations?
Our Parametric Insurance Collection provides ways your organization can benefit from this simple, straightforward and fast-paying risk transfer solution. Reach out to learn how we can help you make better decisions to manage your catastrophe exposures and near-term volatility.
Our Pay Transparency and Equity collection gives you access to the latest insights from Aon's human capital team on topics ranging from pay equity to diversity, equity and inclusion. Contact us to learn how we can help your organization address these issues.
Forecasters are predicting an extremely active 2024 Atlantic hurricane season. Take measures to build resilience to mitigate risk for hurricane-prone properties.
Our Technology Collection provides access to the latest insights from Aon's thought leaders on navigating the evolving risks and opportunities of technology. Reach out to the team to learn how we can help you use technology to make better decisions for the future.
Trade, technology, weather and workforce stability are the central forces in today’s risk landscape.
Our Trade Collection gives you access to the latest insights from Aon's thought leaders on navigating the evolving risks and opportunities for international business. Reach out to our team to understand how to make better decisions around macro trends and why they matter to businesses.
Better Decisions Across Interconnected Risk and People Issues.
With a changing climate, organizations in all sectors will need to protect their people and physical assets, reduce their carbon footprint, and invest in new solutions to thrive. Our Weather Collection provides you with critical insights to be prepared.
Our Workforce Resilience collection gives you access to the latest insights from Aon's Human Capital team. You can reach out to the team at any time for questions about how we can assess gaps and help build a more resilience workforce.