Arming WinRAR: deep dive into APTs exploiting WinRARโ€™s 0-day vulnerability - a SideCopy case study

By Sathwik RAM Prakki on 02 Oct 2024 @ Virus Bulletin
๐Ÿ“Š Presentation ๐Ÿ“„ Whitepaper ๐Ÿ“น Video ๐Ÿ”— Link
reverse-engineering vulnerability-management apt malware-reverse-engineering
Focus Areas: Malware Analysis , Reverse Engineering , Threat Intelligence , Vulnerability Management

Presentation Material

Abstract

In the aftermath of the disclosure of vulnerabilities within WinRAR, a concerning trend has emerged wherein multiple advanced persistent threat (APT) groups and malicious actors have leveraged these weaknesses to launch targeted attacks on critical sectors spanning various nations. This presentation delves into the exploitation of a specific WinRAR vulnerability, CVE-2023-38831, offering insights into the vulnerability and the tactics employed by threat actors who disseminate malicious ZIP archives through phishing campaigns. Focusing on a notable case study involving the SideCopy APT, this talk explores the intricacies of how WinRAR is weaponized to compromise the security of entities in India. The examination includes a detailed dissection of payloads such as AllaKore RAT, DRat, Key RAT, Double Action and Ares RAT, strategically deployed in a sophisticated multi-platform attack campaign featuring diverse decoys and a consistent naming convention. Furthermore, this presentation sheds light on the discovery of the infrastructure utilized by SideCopy APT, revealing insights into the group’s modus operandi. Specific aspects of interest include the systematic reuse of IP addresses across multiple campaigns throughout the year, the utilization of various compromised domains as hosts for payloads, and the identification of shared code with the parent APT group Transparent Tribe (APT36).