Your Yello Ring Road To Success
GOOGLE LOGIN MY ADS MY SHOP

Researchers Shed Light on CatB Ransomware’s Evasion Techniques

Mar 20, 2023Ravie LakshmananEndpoint Security / Ransomware

CatB ransomware

The threat actors behind the CatB ransomware operation have been
observed using a technique called DLL search order hijacking[1] to evade detection and
launch the payload.

CatB, also referred to as CatB99 and Baxtoy, emerged late last
year and is said to be an “evolution or direct rebrand” of another
ransomware strain known as Pandora based on code-level
similarities.

It’s worth noting that the use of Pandora has been attributed to
Bronze Starlight[2]
(aka DEV-0401 or Emperor Dragonfly), a China-based threat actor
that’s known to employ short-lived ransomware families[3] as a ruse to likely
conceal its true objectives.

One of the key defining characteristics of CatB is its reliance
on DLL hijacking via a legitimate service called Microsoft
Distributed Transaction Coordinator (MSDTC[4]) to extract and launch
the ransomware payload.

“Upon execution, CatB payloads rely on DLL search order
hijacking to drop and load the malicious payload,” SentinelOne
researcher Jim Walter said[5]
in a report published last week. “The dropper (versions.dll) drops
the payload (oci.dll) into the System32 directory.”

CatB ransomware

The dropper is also responsible for carrying out anti-analysis
checks to determine if the malware is being executed within a
virtual environment, and ultimately abusing the MSDTC service to
inject the rogue oci.dll containing the ransomware into the
msdtc.exe executable upon system restart.

“The [MSDTC] configurations changed are the name of the account
under which the service should run, which is changed from Network
Service to Local System, and the service start option, which is
changed from Demand start to Auto start for persistency if a
restart occurs,” Minerva Labs researcher Natalie Zargarov explained[6]
in a previous analysis.

One striking aspect of the ransomware is its absence of a ransom
note. Instead, each encrypted file is updated with a message urging
the victims to make a Bitcoin payment.

WEBINAR

Discover the Hidden Dangers of Third-Party SaaS Apps

Are you aware of the risks associated with third-party app
access to your company’s SaaS apps? Join our webinar to learn about
the types of permissions being granted and how to minimize
risk.

RESERVE YOUR
SEAT
[7]

Another trait is the malware’s ability to harvest sensitive data
such as passwords, bookmarks, history from web browsers Google
Chrome, Microsoft Edge (and Internet Explorer), and Mozilla
Firefox.

CatB ransomware

“CatB joins a long line of ransomware families that embrace
semi-novel techniques and atypical behaviors such as appending
notes to the head of files,” Walter said. “These behaviors appear
to be implemented in the interest of detection evasion and some
level of anti-analysis trickery.”

This is not the first time the MSDTC service has been weaponized
for malicious purposes. In May 2021, Trustwave disclosed a novel
malware dubbed Pingback[8]
that leveraged the same technique to achieve persistence and bypass
security solutions.

Found this article interesting? Follow us on Twitter [9]
and LinkedIn[10] to read more exclusive
content we post.

References

  1. ^
    DLL
    search order hijacking
    (attack.mitre.org)
  2. ^
    Bronze
    Starlight
    (thehackernews.com)
  3. ^
    short-lived ransomware families
    (thehackernews.com)
  4. ^
    MSDTC
    (en.wikipedia.org)
  5. ^
    said
    (www.sentinelone.com)
  6. ^
    explained
    (minerva-labs.com)
  7. ^
    RESERVE YOUR SEAT
    (thn.news)
  8. ^
    Pingback
    (thehackernews.com)
  9. ^
    Twitter
    (twitter.com)
  10. ^
    LinkedIn
    (www.linkedin.com)

Read more